2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR) 2019
DOI: 10.1109/msr.2019.00013
|View full text |Cite
|
Sign up to set email alerts
|

PathMiner: A Library for Mining of Path-Based Representations of Code

Abstract: One recent, significant advance in modeling source code for machine learning algorithms has been the introduction of path-based representation-an approach consisting in representing a snippet of code as a collection of paths from its syntax tree. Such representation efficiently captures the structure of code, which, in turn, carries its semantics and other information. Building the path-based representation involves parsing the code and extracting the paths from its syntax tree; these steps build up to a subst… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 34 publications
(27 citation statements)
references
References 13 publications
0
27
0
Order By: Relevance
“…Several studies [2,3,23,35] account for structural information but differ from our work. Hu et al [23] proposed an approach to use Sequence-to-Sequence Neural Machine Translation to generate method-level code comments.…”
Section: Related Workmentioning
confidence: 73%
“…Several studies [2,3,23,35] account for structural information but differ from our work. Hu et al [23] proposed an approach to use Sequence-to-Sequence Neural Machine Translation to generate method-level code comments.…”
Section: Related Workmentioning
confidence: 73%
“…We design this workflow as follows: First, we collected the dataset including suspect file pairs and related reasons. Then, we employ state-of-the-art code embedding techniques such as PathMiner [86] to extract features for a file pair. Finally, we use classification techniques like CNN and RNN to implement automatic classification of reasons for suspect file pairs.…”
Section: A the Rationale Of Our Methodsmentioning
confidence: 99%
“…To make performance comparison with the code2vec for vulnerability prediction, we used two open source implementations called code2vec 4 and astminer 5 [38]. The former requires the latter to extract path context of the C codes considered in our own work, as the publicised implementation of the code2vec currently supports only Java and C# as the input languages.…”
Section: ) Comparison With the Code2vecmentioning
confidence: 99%