{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T13:56:06Z","timestamp":1772114166292,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":33,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819606160","type":"print"},{"value":"9789819606177","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-96-0617-7_7","type":"book-chapter","created":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T14:47:41Z","timestamp":1732805261000},"page":"106-124","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["LRNN: A Formal Logic Rules-Based Neural Network for\u00a0Software Defect Prediction"],"prefix":"10.1007","author":[{"given":"Yuxiang","family":"Shang","sequence":"first","affiliation":[]},{"given":"Shaoying","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,29]]},"reference":[{"issue":"4","key":"7_CR1","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1002\/wics.101","volume":"2","author":"H Abdi","year":"2010","unstructured":"Abdi, H., Williams, L.J.: Principal component analysis. Wiley Interdisciplinary Rev. Comput. Stat. 2(4), 433\u2013459 (2010)","journal-title":"Wiley Interdisciplinary Rev. Comput. Stat."},{"key":"7_CR2","unstructured":"Boetticher, G.: The promise repository of empirical software engineering data (2007). http:\/\/promisedata.org\/repository"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Cohen, W.W.: Fast effective rule induction. In: Machine Learning Proceedings 1995, pp. 115\u2013123. Elsevier (1995)","DOI":"10.1016\/B978-1-55860-377-6.50023-2"},{"key":"7_CR4","doi-asserted-by":"publisher","first-page":"765","DOI":"10.1613\/jair.1.13507","volume":"74","author":"A Cropper","year":"2022","unstructured":"Cropper, A., Duman\u010di\u0107, S.: Inductive logic programming at 30: a new introduction. J. Artif. Intell. Res. 74, 765\u2013850 (2022)","journal-title":"J. Artif. Intell. Res."},{"issue":"1","key":"7_CR5","doi-asserted-by":"publisher","first-page":"1040","DOI":"10.1038\/s41598-021-04590-0","volume":"12","author":"T Dash","year":"2022","unstructured":"Dash, T., Chitlangia, S., Ahuja, A., Srinivasan, A.: A review of some techniques for inclusion of domain-knowledge into deep neural networks. Sci. Rep. 12(1), 1040 (2022)","journal-title":"Sci. Rep."},{"issue":"4","key":"7_CR6","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1049\/iet-sen.2019.0149","volume":"14","author":"J Deng","year":"2020","unstructured":"Deng, J., Lu, L., Qiu, S.: Software defect prediction via lstm. IET Softw. 14(4), 443\u2013450 (2020)","journal-title":"IET Softw."},{"key":"7_CR7","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1007\/s10664-011-9173-9","volume":"17","author":"M D\u2019Ambros","year":"2012","unstructured":"D\u2019Ambros, M., Lanza, M., Robbes, R.: Evaluating defect prediction approaches: a benchmark and an extensive comparison. Empir. Softw. Eng. 17, 531\u2013577 (2012)","journal-title":"Empir. Softw. Eng."},{"issue":"3","key":"7_CR8","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1016\/S0165-0114(01)00098-7","volume":"124","author":"F Esteva","year":"2001","unstructured":"Esteva, F., Godo, L.: Monoidal t-norm based logic: towards a logic for left-continuous t-norms. Fuzzy Sets Syst. 124(3), 271\u2013288 (2001)","journal-title":"Fuzzy Sets Syst."},{"key":"7_CR9","unstructured":"Fagin, R., Riegel, R., Gray, A.: Foundations of reasoning with uncertainty via real-valued logics. arXiv preprint arXiv:2008.02429 (2020)"},{"key":"7_CR10","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/3-540-36169-3_22","volume-title":"Algorithmic Learning Theory","author":"J F\u00fcrnkranz","year":"2002","unstructured":"F\u00fcrnkranz, J.: A pathology of bottom-up hill-climbing in inductive rule learning. In: Cesa-Bianchi, N., Numao, M., Reischuk, R. (eds.) ALT 2002. LNCS (LNAI), vol. 2533, pp. 263\u2013277. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-36169-3_22"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"F\u00fcrnkranz, J., Gamberger, D., Lavra\u010d, N.: Foundations of rule learning. Springer Science & Business Media (2012)","DOI":"10.1007\/978-3-540-75197-7"},{"key":"7_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/978-3-319-21542-6_4","volume-title":"Rule Technologies: Foundations, Tools, and Applications","author":"J F\u00fcrnkranz","year":"2015","unstructured":"F\u00fcrnkranz, J., Kliegr, T.: A brief overview of rule learning. In: Bassiliades, N., Gottlob, G., Sadri, F., Paschke, A., Roman, D. (eds.) RuleML 2015. LNCS, vol. 9202, pp. 54\u201369. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-21542-6_4"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"F\u00fcrnkranz, J., Widmer, G.: Incremental reduced error pruning. In: Machine Learning Proceedings 1994, pp. 70\u201377. Elsevier (1994)","DOI":"10.1016\/B978-1-55860-335-6.50017-9"},{"key":"7_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.105480","volume":"194","author":"A Gudy\u015b","year":"2020","unstructured":"Gudy\u015b, A., Sikora, M., Wr\u00f3bel, \u0141: Rulekit: a comprehensive suite for rule-based learning. Knowl.-Based Syst. 194, 105480 (2020)","journal-title":"Knowl.-Based Syst."},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Gudy\u015b, A., Sikora, M., Wr\u00f3bel, \u0141.: Separate and conquer heuristic allows robust mining of contrast sets in classification, regression, and survival data. Expert Systems with Applications, p. 123376 (2024)","DOI":"10.1016\/j.eswa.2024.123376"},{"issue":"5","key":"7_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3236009","volume":"51","author":"R Guidotti","year":"2018","unstructured":"Guidotti, R., Monreale, A., Ruggieri, S., Turini, F., Giannotti, F., Pedreschi, D.: A survey of methods for explaining black box models. ACM Comput. Surv. (CSUR) 51(5), 1\u201342 (2018)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Hitzler, P., Sarker, M.K.: Neuro-symbolic artificial intelligence: The state of the art (2022)","DOI":"10.3233\/FAIA342"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Hu, Z., Ma, X., Liu, Z., Hovy, E., Xing, E.: Harnessing deep neural networks with logic rules. arXiv preprint arXiv:1603.06318 (2016)","DOI":"10.18653\/v1\/P16-1228"},{"key":"7_CR19","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1007\/s10664-008-9079-3","volume":"13","author":"Y Jiang","year":"2008","unstructured":"Jiang, Y., Cukic, B., Ma, Y.: Techniques for evaluating fault prediction models. Empir. Softw. Eng. 13, 561\u2013595 (2008)","journal-title":"Empir. Softw. Eng."},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Li, J., He, P., Zhu, J., Lyu, M.R.: Software defect prediction via convolutional neural network. In: 2017 IEEE International Conference on Software Quality, Reliability and Security (QRS), pp. 318\u2013328. IEEE (2017)","DOI":"10.1109\/QRS.2017.42"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Li, T., Srikumar, V.: Augmenting neural networks with first-order logic. arXiv preprint arXiv:1906.06298 (2019)","DOI":"10.18653\/v1\/P19-1028"},{"issue":"1","key":"7_CR22","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TSE.2007.256941","volume":"33","author":"T Menzies","year":"2006","unstructured":"Menzies, T., Greenwald, J., Frank, A.: Data mining static code attributes to learn defect predictors. IEEE Trans. Softw. Eng. 33(1), 2\u201313 (2006)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"7_CR23","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1016\/0743-1066(94)90035-3","volume":"19","author":"S Muggleton","year":"1994","unstructured":"Muggleton, S., De Raedt, L.: Inductive logic programming: theory and methods. J. Logic Programm. 19, 629\u2013679 (1994)","journal-title":"J. Logic Programm."},{"issue":"2","key":"7_CR24","doi-asserted-by":"publisher","first-page":"516","DOI":"10.1109\/TR.2012.2183912","volume":"61","author":"L Pelayo","year":"2012","unstructured":"Pelayo, L., Dick, S.: Evaluating stratification alternatives to improve software defect prediction. IEEE Trans. Reliab. 61(2), 516\u2013525 (2012)","journal-title":"IEEE Trans. Reliab."},{"key":"7_CR25","unstructured":"Qu, M., Tang, J.: Probabilistic logic neural networks for reasoning. Advances in neural information processing systems 32 (2019)"},{"key":"7_CR26","unstructured":"Riegel, R., et\u00a0al.: Logical neural networks. arXiv preprint arXiv:2006.13155 (2020)"},{"issue":"5","key":"7_CR27","first-page":"1","volume":"1","author":"Y Sasaki","year":"2007","unstructured":"Sasaki, Y., et al.: The truth of the f-measure. Teach Tutor Mater 1(5), 1\u20135 (2007)","journal-title":"Teach Tutor Mater"},{"issue":"9","key":"7_CR28","doi-asserted-by":"publisher","first-page":"1208","DOI":"10.1109\/TSE.2013.11","volume":"39","author":"M Shepperd","year":"2013","unstructured":"Shepperd, M., Song, Q., Sun, Z., Mair, C.: Data quality: some comments on the nasa software defect datasets. IEEE Trans. Software Eng. 39(9), 1208\u20131215 (2013)","journal-title":"IEEE Trans. Software Eng."},{"key":"7_CR29","doi-asserted-by":"crossref","unstructured":"Song, W., Gan, L., Bao, T.: Software defect prediction via code language models. In: 2023 3rd International Conference on Communication Technology and Information Technology (ICCTIT), pp. 97\u2013102. IEEE (2023)","DOI":"10.1109\/ICCTIT60726.2023.10435711"},{"key":"7_CR30","doi-asserted-by":"crossref","unstructured":"Streiner, D.L., Norman, G.R.: \u201cprecision\u201d and \u201caccuracy\u201d: two terms that are neither. J. Clin. Epidemiol. 59(4), 327\u2013330 (2006)","DOI":"10.1016\/j.jclinepi.2005.09.005"},{"key":"7_CR31","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1016\/j.infsof.2018.10.004","volume":"106","author":"Z Xu","year":"2019","unstructured":"Xu, Z., et al.: Software defect prediction based on kernel pca and weighted extreme learning machine. Inf. Softw. Technol. 106, 182\u2013200 (2019)","journal-title":"Inf. Softw. Technol."},{"key":"7_CR32","doi-asserted-by":"crossref","unstructured":"Zhang, Q., Wu, B.: Software defect prediction via transformer. In: 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), vol.\u00a01, pp. 874\u2013879. IEEE (2020)","DOI":"10.1109\/ITNEC48623.2020.9084745"},{"key":"7_CR33","doi-asserted-by":"crossref","unstructured":"Zhou, Z.H.: Machine learning. Springer Nature (2021)","DOI":"10.1007\/978-981-15-1967-3"}],"container-title":["Lecture Notes in Computer Science","Formal Methods and Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0617-7_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T15:08:30Z","timestamp":1732806510000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0617-7_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819606160","9789819606177"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0617-7_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"29 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICFEM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Formal Engineering Methods","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hiroshima","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icfem2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.icfem2024.info\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}