{"id":"https://openalex.org/W4321372624","doi":"https://doi.org/10.1145/3582574","title":"Toward Interpretable Graph Tensor Convolution Neural Network for Code Semantics Embedding","display_name":"Toward Interpretable Graph Tensor Convolution Neural Network for Code Semantics Embedding","publication_year":2023,"publication_date":"2023-02-20","ids":{"openalex":"https://openalex.org/W4321372624","doi":"https://doi.org/10.1145/3582574"},"language":"en","primary_location":{"id":"doi:10.1145/3582574","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3582574","pdf_url":null,"source":{"id":"https://openalex.org/S142627899","display_name":"ACM Transactions on Software Engineering and Methodology","issn_l":"1049-331X","issn":["1049-331X","1557-7392"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Software Engineering and Methodology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101657623","display_name":"Jia Yang","orcid":"https://orcid.org/0000-0003-1469-0789"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jia Yang","raw_affiliation_strings":["Hubei Key Laboratory of Distributed System Security, Hubei EngineeringResearch Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"Hubei Key Laboratory of Distributed System Security, Hubei EngineeringResearch Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038034507","display_name":"Cai Fu","orcid":"https://orcid.org/0000-0003-4536-3537"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cai Fu","raw_affiliation_strings":["Hubei Key Laboratory of Distributed System Security, Hubei EngineeringResearch Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"Hubei Key Laboratory of Distributed System Security, Hubei EngineeringResearch Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014339796","display_name":"Fengyang Deng","orcid":"https://orcid.org/0000-0003-3352-4065"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fengyang Deng","raw_affiliation_strings":["Huazhong University of Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003031253","display_name":"Ming Wen","orcid":"https://orcid.org/0000-0001-5588-9618"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ming Wen","raw_affiliation_strings":["Huazhong University of Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101813746","display_name":"Xiaowei Guo","orcid":"https://orcid.org/0000-0001-7239-7471"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaowei Guo","raw_affiliation_strings":["Huazhong University of Science and Technology"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055411812","display_name":"Chuanhao Wan","orcid":"https://orcid.org/0000-0002-5428-290X"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chuanhao Wan","raw_affiliation_strings":["Huazhong University of Science and Technology"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology","institution_ids":["https://openalex.org/I47720641"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5101657623"],"corresponding_institution_ids":["https://openalex.org/I47720641"],"apc_list":null,"apc_paid":null,"fwci":2.7399,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.91294052,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"32","issue":"5","first_page":"1","last_page":"40"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9882000088691711,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.980400025844574,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8138138055801392},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.6189815402030945},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.6065862774848938},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5419190526008606},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4832251965999603},{"id":"https://openalex.org/keywords/code-generation","display_name":"Code generation","score":0.47862333059310913},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.24495184421539307}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8138138055801392},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.6189815402030945},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.6065862774848938},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5419190526008606},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4832251965999603},{"id":"https://openalex.org/C133162039","wikidata":"https://www.wikidata.org/wiki/Q1061077","display_name":"Code generation","level":3,"score":0.47862333059310913},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.24495184421539307},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3582574","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3582574","pdf_url":null,"source":{"id":"https://openalex.org/S142627899","display_name":"ACM Transactions on Software Engineering and Methodology","issn_l":"1049-331X","issn":["1049-331X","1557-7392"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Software Engineering and Methodology","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/4","display_name":"Quality Education","score":0.6100000143051147}],"awards":[{"id":"https://openalex.org/G3022733058","display_name":"Construction of Auditory Research Laboratories;","funder_award_id":"6220214","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":57,"referenced_works":["https://openalex.org/W2043571470","https://openalex.org/W2051061727","https://openalex.org/W2052300369","https://openalex.org/W2052336971","https://openalex.org/W2096634748","https://openalex.org/W2117642462","https://openalex.org/W2119412403","https://openalex.org/W2138110817","https://openalex.org/W2142403498","https://openalex.org/W2167453047","https://openalex.org/W2168135317","https://openalex.org/W2361194808","https://openalex.org/W2533383364","https://openalex.org/W2603258515","https://openalex.org/W2604314403","https://openalex.org/W2604687138","https://openalex.org/W2781189798","https://openalex.org/W2789143659","https://openalex.org/W2799848529","https://openalex.org/W2962960733","https://openalex.org/W2981036845","https://openalex.org/W2997162759","https://openalex.org/W3010305562","https://openalex.org/W3011564318","https://openalex.org/W3015810308","https://openalex.org/W3033186130","https://openalex.org/W3033433288","https://openalex.org/W3035254312","https://openalex.org/W3043267069","https://openalex.org/W3047327326","https://openalex.org/W3080802004","https://openalex.org/W3085192122","https://openalex.org/W3089022684","https://openalex.org/W3090668753","https://openalex.org/W3094987082","https://openalex.org/W3096365805","https://openalex.org/W3098605233","https://openalex.org/W3107418514","https://openalex.org/W3111602563","https://openalex.org/W3112246944","https://openalex.org/W3114154324","https://openalex.org/W3121707215","https://openalex.org/W3122465122","https://openalex.org/W3125487026","https://openalex.org/W3161071537","https://openalex.org/W3162689995","https://openalex.org/W3174048467","https://openalex.org/W3177116043","https://openalex.org/W3194346579","https://openalex.org/W3194668998","https://openalex.org/W4205616158","https://openalex.org/W4207001967","https://openalex.org/W4213053623","https://openalex.org/W4221033043","https://openalex.org/W4287214381","https://openalex.org/W4287764383","https://openalex.org/W4301329292"],"related_works":["https://openalex.org/W2081900870","https://openalex.org/W2183306018","https://openalex.org/W2549990292","https://openalex.org/W2345479200","https://openalex.org/W2951819827","https://openalex.org/W3122369893","https://openalex.org/W2932872266","https://openalex.org/W2407476586","https://openalex.org/W2750654225","https://openalex.org/W1977905671"],"abstract_inverted_index":{"Intelligent":[0],"deep":[1,132],"learning-based":[2],"models":[3],"have":[4],"made":[5],"significant":[6],"progress":[7],"for":[8,148],"automated":[9],"source":[10,39,51,172],"code":[11,52,80,92,96,112,151,156,173],"semantics":[12,97],"embedding,":[13,81],"and":[14,23,41,94,134,175],"current":[15,128,180],"research":[16],"works":[17],"mainly":[18],"leverage":[19],"natural":[20,27],"language-based":[21,28],"methods":[22,29,43],"graph-based":[24,42,131],"methods.":[25],"However,":[26],"do":[30,44],"not":[31,45],"capture":[32],"the":[33,55,88,127,155,166,191],"rich":[34,47,95],"semantic":[35,152],"structural":[36,98],"information":[37,49,90],"of":[38,50,58,85,91,130],"code,":[40],"utilize":[46,104],"distant":[48,89],"due":[53],"to":[54,77,103,108,190],"high":[56],"cost":[57],"message-passing":[59],"steps.":[60],"In":[61],"this":[62],"article,":[63],"we":[64,101,138,160],"propose":[65,102,139],"a":[66,105,140],"novel":[67,141],"interpretable":[68,142],"model,":[69],"called":[70],"graph":[71,143,157],"tensor":[72,107,136,144],"convolution":[73,145],"neural":[74,146],"network":[75,147],"(GTCN),":[76],"generate":[78],"accurate":[79,150],"which":[82],"is":[83],"capable":[84],"comprehensively":[86],"capturing":[87],"sequences":[93],"information.":[99],"First,":[100],"high-dimensional":[106],"integrate":[109],"various":[110],"heterogeneous":[111],"graphs":[113],"with":[114,179,188],"node":[115],"sequence":[116],"features,":[117],"such":[118],"as":[119],"control":[120],"flow,":[121],"data":[122],"flow.":[123],"Second,":[124],"inspired":[125],"by":[126],"advantages":[129],"learning":[133,149],"efficient":[135],"computations,":[137],"embedding":[153],"from":[154],"tensor.":[158],"Finally,":[159],"evaluate":[161],"three":[162],"popular":[163],"applications":[164],"on":[165],"GTCN":[167],"model:":[168],"variable":[169],"misuse":[170],"detection,":[171],"prediction,":[174],"vulnerability":[176],"detection.":[177],"Compared":[178],"state-of-the-art":[181],"methods,":[182],"our":[183],"model":[184],"achieves":[185],"higher":[186],"scores":[187],"respect":[189],"top-1":[192],"accuracy":[193],"while":[194],"costing":[195],"less":[196],"training":[197],"time.":[198]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
