{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:40:24Z","timestamp":1757619624538,"version":"3.44.0"},"publisher-location":"Singapore","reference-count":14,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819699209"},{"type":"electronic","value":"9789819699216"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-9921-6_22","type":"book-chapter","created":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T06:15:30Z","timestamp":1753424130000},"page":"263-274","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["KERMIT: A BERT-Based Classification Method for Linux Kernel Crashes Through Stack Trace"],"prefix":"10.1007","author":[{"given":"Yunshan","family":"Yang","sequence":"first","affiliation":[]},{"given":"Pan","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Renshuang","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Xiaoxiang","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Qirui","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Bao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jianfeng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Ding","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,26]]},"reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Mu, D., et al.: An in-depth analysis of duplicated linux kernel bug reports. In: Network and Distributed Systems Security Symposium (NDSS) (2022)","DOI":"10.14722\/ndss.2022.24159"},{"key":"22_CR2","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1109\/TDSC.2023.3246170","volume":"21","author":"Z Liu","year":"2023","unstructured":"Liu, Z., et al.: Towards unveiling exploitation potential with multiple error behaviors for kernel bugs. IEEE Trans. Dependable Secure Comput. 21, 93\u2013109 (2023)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Krasniqi, R., Do, H.: Automatically capturing quality-related concerns in bug report descriptions for efficient bug triaging. In: Proceedings of the 26th International Conference on Evaluation and Assessment in Software Engineering, pp. 10\u201319 (2022)","DOI":"10.1145\/3530019.3530021"},{"key":"22_CR4","doi-asserted-by":"publisher","first-page":"8788","DOI":"10.3390\/app13158788","volume":"13","author":"C Qian","year":"2023","unstructured":"Qian, C., Zhang, M., Nie, Y., Lu, S., Cao, H.: A survey on bug deduplication and triage methods from multiple points of view. Appl. Sci. 13, 8788 (2023)","journal-title":"Appl. Sci."},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Jiang, Z., Jiang, X., Hazimeh, A., Tang, C., Zhang, C., Payer, M.: Igor: Crash deduplication through root-cause clustering. In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pp. 3318\u20133336 (2021)","DOI":"10.1145\/3460120.3485364"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Su, X., Huang, Z., Su, Y., Trisedya, B.D., Dou, Y., Zhao, Y.: Hierarchical shared encoder with task-specific transformer layer selection for emotion-cause pair extraction. IEEE Trans. Affect. Comput. (2024)","DOI":"10.1109\/TAFFC.2024.3390223"},{"key":"22_CR7","doi-asserted-by":"publisher","unstructured":"Chen, Y., et al.: Cross-layer convolutional Siamese network for visual tracking. In: Cheng, L., Leung, A., Ozawa, S. (eds.) Neural Information Processing. ICONIP 2018. Lecture Notes in Computer Science(), vol. 11302. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-04179-3_13","DOI":"10.1007\/978-3-030-04179-3_13"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Wang, H., Li, Q.: Effective bug triage based on a hybrid neural network. In: 2021 28th Asia-Pacific Software Engineering Conference (APSEC), pp. 82\u201391. IEEE (2021)","DOI":"10.1109\/APSEC53868.2021.00016"},{"key":"22_CR9","doi-asserted-by":"publisher","unstructured":"Yu, X., Wan, F., Du, J., Jiang, F., Guo, L., Lin, J.: Bug triage model considering cooperative and sequential relationship. In: Liu, Z., Wu, F., Das, S.K. (eds.) Wireless Algorithms, Systems, and Applications. WASA 2021. Lecture Notes in Computer Science(), vol. 12938. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-86130-8_13","DOI":"10.1007\/978-3-030-86130-8_13"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Isotani, H., Washizaki, H., Fukazawa, Y., Nomoto, T., Ouji, S., Saito, S.: Duplicate bug report detection by using sentence embedding and fine-tuning. In: 2021 IEEE International Conference on Software Maintenance and Evolution (ICSME), pp. 535\u2013544. IEEE (2021)","DOI":"10.1109\/ICSME52107.2021.00054"},{"key":"22_CR11","doi-asserted-by":"publisher","first-page":"44610","DOI":"10.1109\/ACCESS.2021.3066283","volume":"9","author":"TM Rocha","year":"2021","unstructured":"Rocha, T.M., Carvalho, A.L.D.C.: Siameseqat: a semantic context-based duplicate bug report detection using replicated cluster information. IEEE Access. 9, 44610\u201344630 (2021)","journal-title":"IEEE Access."},{"key":"22_CR12","doi-asserted-by":"publisher","first-page":"846","DOI":"10.1109\/TR.2022.3193645","volume":"72","author":"MB Messaoud","year":"2022","unstructured":"Messaoud, M.B., Miladi, A., Jenhani, I., Mkaouer, M.W., Ghadhab, L.: Duplicate bug report detection using an attention-based neural language model. IEEE Trans. Reliab. 72, 846\u2013858 (2022)","journal-title":"IEEE Trans. Reliab."},{"key":"22_CR13","first-page":"926","volume":"45","author":"H He","year":"2024","unstructured":"He, H., Wei, Q., Wang, Y., Guo, Z.: Research on object-driven Linux kernel crash classification technology. J. Chin. Comput. Syst. 45, 926\u2013932 (2024)","journal-title":"J. Chin. Comput. Syst."},{"key":"22_CR14","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1016\/j.jpdc.2022.06.003","volume":"168","author":"H Shi","year":"2022","unstructured":"Shi, H., et al.: Abaci-finder: Linux kernel crash classification through stack trace similarity learning. J. Parallel Distrib. Comput. 168, 70\u201379 (2022)","journal-title":"J. Parallel Distrib. Comput."}],"container-title":["Lecture Notes in Computer Science","Advanced Intelligent Computing Technology and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-9921-6_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,7]],"date-time":"2025-09-07T22:44:58Z","timestamp":1757285098000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-9921-6_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819699209","9789819699216"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-9921-6_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"26 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ningbo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ic-icc.cn\/icg\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}