{"id":"https://openalex.org/W4415746248","doi":"https://doi.org/10.1109/icsme64153.2025.00102","title":"Leakagedetector 2.0: Analyzing Data Leakage in Jupyter-Driven Machine Learning Pipelines","display_name":"Leakagedetector 2.0: Analyzing Data Leakage in Jupyter-Driven Machine Learning Pipelines","publication_year":2025,"publication_date":"2025-09-07","ids":{"openalex":"https://openalex.org/W4415746248","doi":"https://doi.org/10.1109/icsme64153.2025.00102"},"language":null,"primary_location":{"id":"doi:10.1109/icsme64153.2025.00102","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsme64153.2025.00102","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Software Maintenance and Evolution (ICSME)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5119811143","display_name":"Owen Truong","orcid":null},"institutions":[{"id":"https://openalex.org/I108468826","display_name":"Stevens Institute of Technology","ror":"https://ror.org/02z43xh36","country_code":"US","type":"education","lineage":["https://openalex.org/I108468826"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Owen Truong","raw_affiliation_strings":["Stevens Institute of Technology,Hoboken,New Jersey,USA"],"affiliations":[{"raw_affiliation_string":"Stevens Institute of Technology,Hoboken,New Jersey,USA","institution_ids":["https://openalex.org/I108468826"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009904864","display_name":"Terrence Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I108468826","display_name":"Stevens Institute of Technology","ror":"https://ror.org/02z43xh36","country_code":"US","type":"education","lineage":["https://openalex.org/I108468826"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Terrence Zhang","raw_affiliation_strings":["Stevens Institute of Technology,Hoboken,New Jersey,USA"],"affiliations":[{"raw_affiliation_string":"Stevens Institute of Technology,Hoboken,New Jersey,USA","institution_ids":["https://openalex.org/I108468826"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5119811144","display_name":"Arnav Marchareddy","orcid":null},"institutions":[{"id":"https://openalex.org/I108468826","display_name":"Stevens Institute of Technology","ror":"https://ror.org/02z43xh36","country_code":"US","type":"education","lineage":["https://openalex.org/I108468826"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Arnav Marchareddy","raw_affiliation_strings":["Stevens Institute of Technology,Hoboken,New Jersey,USA"],"affiliations":[{"raw_affiliation_string":"Stevens Institute of Technology,Hoboken,New Jersey,USA","institution_ids":["https://openalex.org/I108468826"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Ryan Lee","orcid":null},"institutions":[{"id":"https://openalex.org/I108468826","display_name":"Stevens Institute of Technology","ror":"https://ror.org/02z43xh36","country_code":"US","type":"education","lineage":["https://openalex.org/I108468826"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ryan Lee","raw_affiliation_strings":["Stevens Institute of Technology,Hoboken,New Jersey,USA"],"affiliations":[{"raw_affiliation_string":"Stevens Institute of Technology,Hoboken,New Jersey,USA","institution_ids":["https://openalex.org/I108468826"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5119811145","display_name":"Jeffery Busold","orcid":null},"institutions":[{"id":"https://openalex.org/I108468826","display_name":"Stevens Institute of Technology","ror":"https://ror.org/02z43xh36","country_code":"US","type":"education","lineage":["https://openalex.org/I108468826"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jeffery Busold","raw_affiliation_strings":["Stevens Institute of Technology,Hoboken,New Jersey,USA"],"affiliations":[{"raw_affiliation_string":"Stevens Institute of Technology,Hoboken,New Jersey,USA","institution_ids":["https://openalex.org/I108468826"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5119811146","display_name":"Michael Socas","orcid":null},"institutions":[{"id":"https://openalex.org/I108468826","display_name":"Stevens Institute of Technology","ror":"https://ror.org/02z43xh36","country_code":"US","type":"education","lineage":["https://openalex.org/I108468826"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michael Socas","raw_affiliation_strings":["Stevens Institute of Technology,Hoboken,New Jersey,USA"],"affiliations":[{"raw_affiliation_string":"Stevens Institute of Technology,Hoboken,New Jersey,USA","institution_ids":["https://openalex.org/I108468826"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084727991","display_name":"Eman Abdullah AlOmar","orcid":"https://orcid.org/0000-0003-1800-9268"},"institutions":[{"id":"https://openalex.org/I108468826","display_name":"Stevens Institute of Technology","ror":"https://ror.org/02z43xh36","country_code":"US","type":"education","lineage":["https://openalex.org/I108468826"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Eman Abdullah AlOmar","raw_affiliation_strings":["Stevens Institute of Technology,Hoboken,New Jersey,USA"],"affiliations":[{"raw_affiliation_string":"Stevens Institute of Technology,Hoboken,New Jersey,USA","institution_ids":["https://openalex.org/I108468826"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5119811143"],"corresponding_institution_ids":["https://openalex.org/I108468826"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.32135607,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"895","last_page":"899"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.39079999923706055,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.39079999923706055,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.1525000035762787,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.1354999989271164,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.6015999913215637},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.5644000172615051},{"id":"https://openalex.org/keywords/preprocessor","display_name":"Preprocessor","score":0.5623999834060669},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5351999998092651},{"id":"https://openalex.org/keywords/plug-in","display_name":"Plug-in","score":0.5210999846458435},{"id":"https://openalex.org/keywords/pipeline-transport","display_name":"Pipeline transport","score":0.5023999810218811},{"id":"https://openalex.org/keywords/microsoft-visual-studio","display_name":"Microsoft Visual Studio","score":0.49140000343322754},{"id":"https://openalex.org/keywords/test-data","display_name":"Test data","score":0.4431000053882599},{"id":"https://openalex.org/keywords/software-quality","display_name":"Software quality","score":0.42879998683929443}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6777999997138977},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.6015999913215637},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.5644000172615051},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.5623999834060669},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5351999998092651},{"id":"https://openalex.org/C4924752","wikidata":"https://www.wikidata.org/wiki/Q184148","display_name":"Plug-in","level":2,"score":0.5210999846458435},{"id":"https://openalex.org/C175309249","wikidata":"https://www.wikidata.org/wiki/Q725864","display_name":"Pipeline transport","level":2,"score":0.5023999810218811},{"id":"https://openalex.org/C512115632","wikidata":"https://www.wikidata.org/wiki/Q134067","display_name":"Microsoft Visual Studio","level":3,"score":0.49140000343322754},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4546000063419342},{"id":"https://openalex.org/C16910744","wikidata":"https://www.wikidata.org/wiki/Q7705759","display_name":"Test data","level":2,"score":0.4431000053882599},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.44209998846054077},{"id":"https://openalex.org/C117447612","wikidata":"https://www.wikidata.org/wiki/Q1412670","display_name":"Software quality","level":4,"score":0.42879998683929443},{"id":"https://openalex.org/C10551718","wikidata":"https://www.wikidata.org/wiki/Q5227332","display_name":"Data pre-processing","level":2,"score":0.4205000102519989},{"id":"https://openalex.org/C137287247","wikidata":"https://www.wikidata.org/wiki/Q1329550","display_name":"Static program analysis","level":4,"score":0.4104999899864197},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4088999927043915},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3905999958515167},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.38199999928474426},{"id":"https://openalex.org/C51929080","wikidata":"https://www.wikidata.org/wiki/Q2425187","display_name":"Codebase","level":3,"score":0.3538999855518341},{"id":"https://openalex.org/C132964779","wikidata":"https://www.wikidata.org/wiki/Q2110223","display_name":"Raw data","level":2,"score":0.3504999876022339},{"id":"https://openalex.org/C133237599","wikidata":"https://www.wikidata.org/wiki/Q2295111","display_name":"Code smell","level":5,"score":0.3199999928474426},{"id":"https://openalex.org/C172367668","wikidata":"https://www.wikidata.org/wiki/Q6504956","display_name":"Data visualization","level":3,"score":0.31290000677108765},{"id":"https://openalex.org/C150292731","wikidata":"https://www.wikidata.org/wiki/Q1342704","display_name":"Code review","level":5,"score":0.310699999332428},{"id":"https://openalex.org/C24756922","wikidata":"https://www.wikidata.org/wiki/Q1757694","display_name":"Data quality","level":3,"score":0.30730000138282776},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.29820001125335693},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.2809999883174896},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.2791000008583069},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.2745000123977661},{"id":"https://openalex.org/C519991488","wikidata":"https://www.wikidata.org/wiki/Q28865","display_name":"Python (programming language)","level":2,"score":0.26989999413490295},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.2685999870300293},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.2678000032901764},{"id":"https://openalex.org/C162319229","wikidata":"https://www.wikidata.org/wiki/Q175263","display_name":"Data structure","level":2,"score":0.2596000134944916},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.25690001249313354},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.25519999861717224}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icsme64153.2025.00102","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsme64153.2025.00102","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Software Maintenance and Evolution (ICSME)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W2796040126","https://openalex.org/W4313563767","https://openalex.org/W4376606571","https://openalex.org/W4379878829","https://openalex.org/W4400606419","https://openalex.org/W4404609282","https://openalex.org/W4410552881"],"related_works":[],"abstract_inverted_index":{"In":[0,79],"software":[1],"development":[2],"environments,":[3],"code":[4,20,150],"quality":[5],"is":[6,40],"crucial.":[7],"This":[8],"study":[9],"aims":[10],"to":[11,71],"assist":[12],"Machine":[13],"Learning":[14],"(ML)":[15],"engineers":[16],"in":[17,43,54],"enhancing":[18],"their":[19,29,63,77],"by":[21],"identifying":[22],"and":[23,68,102,130,147],"correcting":[24],"Data":[25,31,74,96],"Leakage":[26,32,75,97],"issues":[27],"within":[28],"models.":[30],"occurs":[33],"when":[34,47],"information":[35],"from":[36,106],"the":[37,44,128],"test":[38,69],"dataset":[39],"inadvertently":[41],"included":[42,113],"training":[45],"data":[46,50,64],"preparing":[48],"a":[49,84,117,122],"science":[51],"model,":[52],"resulting":[53],"misleading":[55],"performance":[56],"evaluations.":[57],"ML":[58,136,143],"developers":[59,137],"must":[60],"carefully":[61],"separate":[62],"into":[65,76],"training,":[66],"evaluation,":[67],"sets":[70],"avoid":[72],"introducing":[73],"code.":[78],"this":[80],"paper,":[81],"we":[82,112],"develop":[83],"new":[85],"Visual":[86],"Studio":[87],"Code":[88],"(VS":[89],"Code)":[90],"extension,":[91],"called":[92],"leakagedetector,":[93],"that":[94,134],"detects":[95],"-":[98,105],"mainly":[99],"Overlap,":[100],"Preprocessing":[101],"Multi-test":[103],"leakage":[104],"Jupyter":[107],"Notebook":[108],"files.":[109],"Beyond":[110],"detection,":[111],"two":[114],"correction":[115],"mechanisms:":[116],"conventional":[118],"approach,":[119],"known":[120],"as":[121],"quick":[123],"fix,":[124],"which":[125],"manually":[126],"fixes":[127],"leakage,":[129],"an":[131],"LLM-driven":[132],"approach":[133],"guides":[135],"toward":[138],"best":[139],"practices":[140],"for":[141],"building":[142],"pipelines.":[144],"The":[145,158,167],"plugin":[146],"its":[148],"source":[149],"are":[151],"publicly":[152],"available":[153],"on":[154,164],"GitHub":[155],"at":[156,172],"https://github.com/SE4AIResearch/DataLeakage_JupyterNotebook_Fall2024.":[157],"demonstration":[159],"video":[160],"can":[161,169],"be":[162,170],"found":[163,171],"YouTube:":[165],"https://youtu.be/7YiYVBiID_8.":[166],"website":[168],"https://leakage-detector.vercel.app/.":[173]},"counts_by_year":[],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-31T00:00:00"}
