{"id":"https://openalex.org/W3090891670","doi":"https://doi.org/10.1145/3410463.3414670","title":"Deep Program Structure Modeling Through Multi-Relational Graph-based Learning","display_name":"Deep Program Structure Modeling Through Multi-Relational Graph-based Learning","publication_year":2020,"publication_date":"2020-09-30","ids":{"openalex":"https://openalex.org/W3090891670","doi":"https://doi.org/10.1145/3410463.3414670","mag":"3090891670"},"language":"en","primary_location":{"id":"doi:10.1145/3410463.3414670","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3410463.3414670","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM International Conference on Parallel Architectures and Compilation Techniques","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013951362","display_name":"Guixin Ye","orcid":"https://orcid.org/0000-0003-2074-4253"},"institutions":[{"id":"https://openalex.org/I37802460","display_name":"Northwest University","ror":"https://ror.org/00z3td547","country_code":"CN","type":"education","lineage":["https://openalex.org/I37802460"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Guixin Ye","raw_affiliation_strings":["Northwest University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Northwest University, Xi'an, China","institution_ids":["https://openalex.org/I37802460"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069158506","display_name":"Zhanyong Tang","orcid":"https://orcid.org/0000-0002-4333-2334"},"institutions":[{"id":"https://openalex.org/I37802460","display_name":"Northwest University","ror":"https://ror.org/00z3td547","country_code":"CN","type":"education","lineage":["https://openalex.org/I37802460"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhanyong Tang","raw_affiliation_strings":["Northwest University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Northwest University, Xi'an, China","institution_ids":["https://openalex.org/I37802460"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101484881","display_name":"Huanting Wang","orcid":"https://orcid.org/0000-0003-0579-4295"},"institutions":[{"id":"https://openalex.org/I37802460","display_name":"Northwest University","ror":"https://ror.org/00z3td547","country_code":"CN","type":"education","lineage":["https://openalex.org/I37802460"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huanting Wang","raw_affiliation_strings":["Northwest University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Northwest University, Xi'an, China","institution_ids":["https://openalex.org/I37802460"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065103224","display_name":"Dingyi Fang","orcid":"https://orcid.org/0000-0002-5816-6922"},"institutions":[{"id":"https://openalex.org/I37802460","display_name":"Northwest University","ror":"https://ror.org/00z3td547","country_code":"CN","type":"education","lineage":["https://openalex.org/I37802460"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dingyi Fang","raw_affiliation_strings":["Northwest University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Northwest University, Xi'an, China","institution_ids":["https://openalex.org/I37802460"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083171604","display_name":"Jianbin Fang","orcid":"https://orcid.org/0000-0003-3542-4869"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianbin Fang","raw_affiliation_strings":["National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047856952","display_name":"Songfang Huang","orcid":"https://orcid.org/0000-0001-8084-0904"},"institutions":[{"id":"https://openalex.org/I45928872","display_name":"Alibaba Group (China)","ror":"https://ror.org/00k642b80","country_code":"CN","type":"company","lineage":["https://openalex.org/I45928872"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Songfang Huang","raw_affiliation_strings":["Alibaba DAMO Academy, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Alibaba DAMO Academy, Hangzhou, China","institution_ids":["https://openalex.org/I45928872"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100401045","display_name":"Zheng Wang","orcid":"https://orcid.org/0000-0001-6157-0662"},"institutions":[{"id":"https://openalex.org/I130828816","display_name":"University of Leeds","ror":"https://ror.org/024mrxd33","country_code":"GB","type":"education","lineage":["https://openalex.org/I130828816"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Zheng Wang","raw_affiliation_strings":["University of Leeds, Leeds, United Kingdom"],"affiliations":[{"raw_affiliation_string":"University of Leeds, Leeds, United Kingdom","institution_ids":["https://openalex.org/I130828816"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5013951362"],"corresponding_institution_ids":["https://openalex.org/I37802460"],"apc_list":null,"apc_paid":null,"fwci":5.5633,"has_fulltext":false,"cited_by_count":31,"citation_normalized_percentile":{"value":0.9623379,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"111","last_page":"123"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8201903104782104},{"id":"https://openalex.org/keywords/control-flow-graph","display_name":"Control flow graph","score":0.5870504975318909},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.5823252201080322},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.561694324016571},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.5309585928916931},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5270229578018188},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5218518972396851},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.5195767879486084},{"id":"https://openalex.org/keywords/semantics","display_name":"Semantics (computer science)","score":0.47543811798095703},{"id":"https://openalex.org/keywords/data-structure","display_name":"Data structure","score":0.4730885624885559},{"id":"https://openalex.org/keywords/external-data-representation","display_name":"External Data Representation","score":0.4710780680179596},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4692993760108948},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4403754770755768},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4327091574668884},{"id":"https://openalex.org/keywords/program-optimization","display_name":"Program optimization","score":0.4249446392059326},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.41311293840408325},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.3100232481956482},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.17029783129692078},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.10831323266029358}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8201903104782104},{"id":"https://openalex.org/C27458966","wikidata":"https://www.wikidata.org/wiki/Q1187693","display_name":"Control flow graph","level":2,"score":0.5870504975318909},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.5823252201080322},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.561694324016571},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.5309585928916931},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5270229578018188},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5218518972396851},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.5195767879486084},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.47543811798095703},{"id":"https://openalex.org/C162319229","wikidata":"https://www.wikidata.org/wiki/Q175263","display_name":"Data structure","level":2,"score":0.4730885624885559},{"id":"https://openalex.org/C116409475","wikidata":"https://www.wikidata.org/wiki/Q1385056","display_name":"External Data Representation","level":2,"score":0.4710780680179596},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4692993760108948},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4403754770755768},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4327091574668884},{"id":"https://openalex.org/C139571649","wikidata":"https://www.wikidata.org/wiki/Q1156793","display_name":"Program optimization","level":3,"score":0.4249446392059326},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.41311293840408325},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3100232481956482},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.17029783129692078},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.10831323266029358},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3410463.3414670","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3410463.3414670","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM International Conference on Parallel Architectures and Compilation Techniques","raw_type":"proceedings-article"},{"id":"pmh:oai:eprints.whiterose.ac.uk:164551","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306400854","display_name":"White Rose Research Online (University of Leeds, The University of Sheffield, University of York)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I2800616092","host_organization_name":"White Rose University Consortium","host_organization_lineage":["https://openalex.org/I2800616092"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Proceedings Paper"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6399999856948853,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":68,"referenced_works":["https://openalex.org/W1583837637","https://openalex.org/W1595275604","https://openalex.org/W1686420892","https://openalex.org/W1924770834","https://openalex.org/W1982020565","https://openalex.org/W1989562524","https://openalex.org/W2000873501","https://openalex.org/W2033139628","https://openalex.org/W2052391539","https://openalex.org/W2052902739","https://openalex.org/W2056579078","https://openalex.org/W2064675550","https://openalex.org/W2076290291","https://openalex.org/W2090268225","https://openalex.org/W2102605133","https://openalex.org/W2102976251","https://openalex.org/W2118937112","https://openalex.org/W2128120785","https://openalex.org/W2143161696","https://openalex.org/W2147370410","https://openalex.org/W2149933564","https://openalex.org/W2150476673","https://openalex.org/W2153579005","https://openalex.org/W2160241055","https://openalex.org/W2187089797","https://openalex.org/W2282821441","https://openalex.org/W2468907370","https://openalex.org/W2565684518","https://openalex.org/W2586408124","https://openalex.org/W2604314403","https://openalex.org/W2618440624","https://openalex.org/W2618564128","https://openalex.org/W2624431344","https://openalex.org/W2749008552","https://openalex.org/W2783614532","https://openalex.org/W2784409032","https://openalex.org/W2788264912","https://openalex.org/W2808279976","https://openalex.org/W2809662498","https://openalex.org/W2884276923","https://openalex.org/W2887364112","https://openalex.org/W2890194927","https://openalex.org/W2946120105","https://openalex.org/W2949607454","https://openalex.org/W2951861246","https://openalex.org/W2955238243","https://openalex.org/W2962724414","https://openalex.org/W2963499994","https://openalex.org/W2963759070","https://openalex.org/W2963935794","https://openalex.org/W2963960923","https://openalex.org/W2976184969","https://openalex.org/W2990323480","https://openalex.org/W2998249817","https://openalex.org/W3007205676","https://openalex.org/W3008788679","https://openalex.org/W3009601136","https://openalex.org/W3098583774","https://openalex.org/W3098602506","https://openalex.org/W3105926539","https://openalex.org/W3122749996","https://openalex.org/W3163667142","https://openalex.org/W4210257598","https://openalex.org/W4214583996","https://openalex.org/W4232751114","https://openalex.org/W4236491543","https://openalex.org/W4256402776","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2124153277","https://openalex.org/W2804175851","https://openalex.org/W2144921123","https://openalex.org/W2531660186","https://openalex.org/W1516632679","https://openalex.org/W4248762140","https://openalex.org/W2049597200","https://openalex.org/W2040634065","https://openalex.org/W3101664573","https://openalex.org/W3138119557"],"abstract_inverted_index":{"Deep":[0],"learning":[1],"is":[2,34],"emerging":[3],"as":[4,58],"a":[5,30,59,80],"promising":[6],"technique":[7],"for":[8,44,76],"building":[9,29],"predictive":[10,32],"models":[11],"to":[12,39,64],"support":[13],"code-related":[14],"tasks":[15],"like":[16],"performance":[17],"optimization":[18],"and":[19,72],"code":[20],"vulnerability":[21],"detection.":[22],"One":[23],"of":[24,28,70],"the":[25,36,41,45,51,55,67],"critical":[26],"aspects":[27],"successful":[31],"model":[33,42],"having":[35],"right":[37],"representation":[38,82],"characterize":[40],"input":[43],"given":[46],"task.":[47],"Existing":[48],"approaches":[49],"in":[50],"area":[52],"typically":[53],"treat":[54],"program":[56],"structure":[57],"sequential":[60],"sequence":[61],"but":[62],"fail":[63],"capitalize":[65],"on":[66],"rich":[68],"semantics":[69],"data":[71],"control":[73],"flow":[74],"information,":[75],"which":[77],"graphs":[78],"are":[79],"proven":[81],"structure.":[83]},"counts_by_year":[{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":9},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
