{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T23:14:57Z","timestamp":1771024497334,"version":"3.50.1"},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2021,9,20]],"date-time":"2021-09-20T00:00:00Z","timestamp":1632096000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,20]],"date-time":"2021-09-20T00:00:00Z","timestamp":1632096000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1007\/s10489-021-02822-4","type":"journal-article","created":{"date-parts":[[2021,9,20]],"date-time":"2021-09-20T22:03:16Z","timestamp":1632175396000},"page":"7113-7135","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Fault centrality: boosting spectrum-based fault localization via local influence calculation"],"prefix":"10.1007","volume":"52","author":[{"given":"Guyu","family":"Zhao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8801-8349","authenticated-orcid":false,"given":"Hongdou","family":"He","sequence":"additional","affiliation":[]},{"given":"Yifang","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,20]]},"reference":[{"key":"2822_CR1","unstructured":"Ghanavati M (2019) Automated Fault Localization in Large Java Applications (Doctoral dissertation)"},{"issue":"9","key":"2822_CR2","doi-asserted-by":"publisher","first-page":"1060","DOI":"10.1109\/PROC.1980.11805","volume":"68","author":"MM Lehman","year":"1980","unstructured":"Lehman M M (1980) Programs, life cycles, and laws of software evolution. Proc IEEE 68 (9):1060\u20131076","journal-title":"Proc IEEE"},{"issue":"3","key":"2822_CR3","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/0164-1212(89)90039-3","volume":"9","author":"JS Collofello","year":"1989","unstructured":"Collofello J S, Woodfield S N (1989) Evaluating the effectiveness of reliability-assurance techniques. J Syst Softw 9(3):191\u2013195","journal-title":"J Syst Softw"},{"key":"2822_CR4","unstructured":"Planning S (2002) The economic impacts of inadequate infrastructure for software testing. National Institute of Standards and Technology"},{"key":"2822_CR5","doi-asserted-by":"crossref","unstructured":"Abreu R, Zoeteweij P, Van Gemund AJ (2007) On the accuracy of spectrum-based fault localization. In: Testing: Academic and Industrial Conference Practice and Research Techniques-MUTATION (TAICPART-MUTATION 2007). IEEE, pp 89\u201398","DOI":"10.1109\/TAIC.PART.2007.13"},{"issue":"4","key":"2822_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2522920.2522924","volume":"22","author":"X Xie","year":"2013","unstructured":"Xie X, Chen T Y, Kuo F C, Xu B (2013) A theoretical analysis of the risk evaluation formulas for spectrum-based fault localization. ACM Trans Softw Eng Methodol (TOSEM) 22(4):1\u201340","journal-title":"ACM Trans Softw Eng Methodol (TOSEM)"},{"issue":"3","key":"2822_CR7","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1002\/1099-1689(200009)10:3<171::AID-STVR209>3.0.CO;2-J","volume":"10","author":"MJ Harrold","year":"2000","unstructured":"Harrold M J, Rothermel G, Sayre K, Wu R, Yi L (2000) An empirical investigation of the relationship between spectra differences and regression faults. Softw Test Verif Reliab 10(3):171\u2013194","journal-title":"Softw Test Verif Reliab"},{"key":"2822_CR8","doi-asserted-by":"crossref","unstructured":"Dallmeier V, Lindig C, Zeller A (2005) Lightweight bug localization with AMPLE. In: Proceedings of the sixth international symposium on Automated analysis-driven debugging. ACM, pp 99\u2013104","DOI":"10.1145\/1085130.1085143"},{"key":"2822_CR9","doi-asserted-by":"crossref","unstructured":"Jones JA, Harrold MJ, Stasko J (2002) Visualization of test information to assist fault localization. In: Proceedings of the 24th International Conference on Software Engineering (ICSE 2002). IEEE, pp 467\u2013477","DOI":"10.1145\/581396.581397"},{"issue":"3","key":"2822_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2000791.2000795","volume":"20","author":"L Naish","year":"2011","unstructured":"Naish L, Lee H J, Ramamohanarao K (2011) A model for spectra-based software diagnosis. ACM Trans Softw Eng Methodol (TOSEM) 20(3):1\u201332","journal-title":"ACM Trans Softw Eng Methodol (TOSEM)"},{"key":"2822_CR11","doi-asserted-by":"crossref","unstructured":"Xie X, Kuo FC, Chen TY, Yoo S, Harman M (2013) Provably optimal and human-competitive results in sbse for spectrum based fault localisation. In: International Symposium on Search Based Software EngineeringSpringer, pp 224\u2013238","DOI":"10.1007\/978-3-642-39742-4_17"},{"key":"2822_CR12","doi-asserted-by":"crossref","unstructured":"Yoo S (2012) Evolving human competitive spectra-based fault localisation techniques. In International Symposium on Search Based Software Engineering. Springer, pp 244\u2013258","DOI":"10.1007\/978-3-642-33119-0_18"},{"key":"2822_CR13","doi-asserted-by":"crossref","unstructured":"Pearson S, Campos J, Just R et al (2017) Evaluating and improving fault localization. In: 2017 IEEE\/ACM 39th International Conference on Software Engineering (ICSE). IEEE, pp 609\u2013620","DOI":"10.1109\/ICSE.2017.62"},{"issue":"5-7","key":"2822_CR14","doi-asserted-by":"publisher","first-page":"605","DOI":"10.1002\/stvr.1509","volume":"25","author":"M Papadakis","year":"2015","unstructured":"Papadakis M, Le Traon Y (2015) Metallaxis-FL: mutation-based fault localization. Softw Test Verif Reliab 25(5-7):605\u2013628","journal-title":"Softw Test Verif Reliab"},{"key":"2822_CR15","doi-asserted-by":"crossref","unstructured":"Moon S, Kim Y, Kim M, Yoo S (2014) Ask the mutants: Mutating faulty programs for fault localization. In: 2014 IEEE Seventh International Conference on Software Testing, Verification and Validation. IEEE, pp 153\u2013162","DOI":"10.1109\/ICST.2014.28"},{"key":"2822_CR16","doi-asserted-by":"crossref","unstructured":"Papadakis M, Le Traon Y (2012) Using mutants to locate \u201cunknown\u201d faults. In: 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation. IEEE, pp 691\u2013700","DOI":"10.1109\/ICST.2012.159"},{"issue":"10","key":"2822_CR17","doi-asserted-by":"publisher","first-page":"765","DOI":"10.1145\/2544173.2509551","volume":"48","author":"L Zhang","year":"2013","unstructured":"Zhang L, Zhang L, Khurshid S (2013) Injecting mechanical faults to localize developer faults for evolving software. ACM SIGPLAN Not 48(10):765\u2013784","journal-title":"ACM SIGPLAN Not"},{"key":"2822_CR18","doi-asserted-by":"crossref","unstructured":"Agrawal H, Horgan JR, London S, Wong WE (1995) Fault localization using execution slices and dataflow tests. In: Proceedings of Sixth International Symposium on Software Reliability Engineering (ISSRE\u201995). IEEE, pp 143\u2013151","DOI":"10.1109\/ISSRE.1995.497652"},{"key":"2822_CR19","doi-asserted-by":"crossref","unstructured":"Renieres M, Reiss SP (2003) Fault localization with nearest neighbor queries. In: 18th IEEE International Conference on Automated Software Engineering. IEEE, pp 30\u201339","DOI":"10.1109\/ASE.2003.1240292"},{"key":"2822_CR20","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.jss.2013.08.031","volume":"89","author":"X Mao","year":"2014","unstructured":"Mao X, Lei Y, Dai Z, Qi Y, Wang C (2014) Slice-based statistical fault localization. J Syst Softw 89:51\u201362","journal-title":"J Syst Softw"},{"key":"2822_CR21","doi-asserted-by":"crossref","unstructured":"Xuan J, Monperrus M (2014) Test case purification for improving fault localization. In: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering. ACM, pp 52\u201363","DOI":"10.1145\/2635868.2635906"},{"key":"2822_CR22","doi-asserted-by":"crossref","unstructured":"Zhou J, Zhang H, Lo D (2012) Where should the bugs be fixed? more accurate information retrieval-based bug localization based on bug reports. In: 2012 34th International Conference on Software Engineering (ICSE). IEEE, pp 14\u201324","DOI":"10.1109\/ICSE.2012.6227210"},{"key":"2822_CR23","unstructured":"Le BTD, Lo D, Le Goues C, Grunske L (2016) A learning-to-rank based fault localization approach using likely invariants. In: Proceedings of the 25th International Symposium on Software Testing and Analysis. ACM, pp 177\u2013188"},{"key":"2822_CR24","doi-asserted-by":"crossref","unstructured":"Feng M, Gupta R (2010) Learning universal probabilistic models for fault localization. In: Proceedings of the 9th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering. ACM, pp 81\u201388","DOI":"10.1145\/1806672.1806688"},{"key":"2822_CR25","doi-asserted-by":"crossref","unstructured":"Xuan J, Monperrus M (2014) Learning to combine multiple ranking metrics for fault localization. In: 2014 IEEE International Conference on Software Maintenance and Evolution. IEEE, pp 191\u2013200","DOI":"10.1109\/ICSME.2014.41"},{"key":"2822_CR26","doi-asserted-by":"crossref","unstructured":"Ribeiro HL, de Araujo PR, Chaim ML, de Souza HA, Kon F (2019) Evaluating data-flow coverage in spectrum-based fault localization. In: 2019 ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM). IEEE, pp 1\u201311","DOI":"10.1109\/ESEM.2019.8870182"},{"key":"2822_CR27","doi-asserted-by":"crossref","unstructured":"Sohn J, Yoo S (2017) Fluccs: Using code and change metrics to improve fault localization. In: Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis. ACM, pp 273\u2013283","DOI":"10.1145\/3092703.3092717"},{"key":"2822_CR28","doi-asserted-by":"crossref","unstructured":"Laghari G, Demeyer S (2018) On the use of sequence mining within spectrum based fault localisation. In: Proceedings of the 33rd Annual ACM Symposium on Applied Computing. ACM, pp 1916\u20131924","DOI":"10.1145\/3167132.3167337"},{"key":"2822_CR29","doi-asserted-by":"crossref","unstructured":"Parnin C, Orso A (2011) Are automated debugging techniques actually helping programmers?. In: Proceedings of the 2011 International Symposium on Software Testing and Analysis. ACM, pp 199\u2013209","DOI":"10.1145\/2001420.2001445"},{"issue":"14","key":"2822_CR30","first-page":"14","volume":"14","author":"S Yoo","year":"2014","unstructured":"Yoo S, Xie X, Kuo F C, Chen T Y, Harman M (2014) No pot of gold at the end of program spectrum rainbow: Greatest risk evaluation formula does not exist. RN 14(14):14","journal-title":"RN"},{"key":"2822_CR31","doi-asserted-by":"crossref","unstructured":"Hsu HY, Jones JA, Orso A (2008) Rapid: Identifying bug signatures to support debugging activities. In: 2008 23rd IEEE\/ACM International Conference on Automated Software Engineering. IEEE, pp 439\u2013442","DOI":"10.1109\/ASE.2008.68"},{"key":"2822_CR32","doi-asserted-by":"crossref","unstructured":"Gouveia C, Campos J, Abreu R (2013) Using HTML5 visualizations in software fault localization. In: 2013 First IEEE Working Conference on Software Visualization (VISSOFT). IEEE, pp 1\u201310","DOI":"10.1109\/VISSOFT.2013.6650539"},{"key":"2822_CR33","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/j.infsof.2017.10.014","volume":"94","author":"HA de Souza","year":"2018","unstructured":"de Souza H A, Mutti D, Chaim M L, Kon F (2018) Contextualizing spectrum-based fault localization. Inf Softw Technol 94:245\u2013261","journal-title":"Inf Softw Technol"},{"key":"2822_CR34","doi-asserted-by":"publisher","first-page":"18497","DOI":"10.1109\/ACCESS.2020.2965139","volume":"8","author":"H He","year":"2020","unstructured":"He H, Ren J, Zhao G, He H (2020) Enhancing spectrum-based fault localization using fault influence propagation. IEEE Access 8:18497\u201318513","journal-title":"IEEE Access"},{"key":"2822_CR35","doi-asserted-by":"crossref","unstructured":"Zheng AX, Jordan MI, Liblit B, Naik M, Aiken A (2006) Statistical debugging: simultaneous identification of multiple bugs. In: Proceedings of the 23rd International Conference on Machine Learning. ACM, pp 1105\u20131112","DOI":"10.1145\/1143844.1143983"},{"key":"2822_CR36","doi-asserted-by":"crossref","unstructured":"DiGiuseppe N, Jones JA (2011) On the influence of multiple faults on coverage-based fault localization. In: Proceedings of the 2011 International Symposium on Software Testing and Analysis. ACM, pp 210\u2013220","DOI":"10.1145\/2001420.2001446"},{"key":"2822_CR37","doi-asserted-by":"crossref","unstructured":"Laghari G, Murgia A, Demeyer S (2016) Fine-tuning spectrum based fault localisation with frequent method item sets. In: Proceedings of the 31st IEEE\/ACM International Conference on Automated Software Engineering. IEEE, pp 274\u2013285","DOI":"10.1145\/2970276.2970308"},{"key":"2822_CR38","unstructured":"Zhang M, Li Y, Li X, Chen L, Zhang, Zhang L, Khurshid S (2019) An empirical study of boosting spectrum-based fault localization via pagerank. IEEE Transactions on Software Engineering"},{"issue":"1","key":"2822_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2693208.2693223","volume":"40","author":"Y Qu","year":"2015","unstructured":"Qu Y, Guan X, Zheng Q, Liu T, Zhou J, Li J (2015) Calling network: a new method for modeling software runtime behaviors. ACM SIGSOFT Softw Eng Notes 40(1):1\u20138","journal-title":"ACM SIGSOFT Softw Eng Notes"},{"issue":"6","key":"2822_CR40","doi-asserted-by":"publisher","first-page":"1202","DOI":"10.1007\/s11390-010-9399-9","volume":"25","author":"WF Pan","year":"2010","unstructured":"Pan W F, Li B, Ma Y T, Qin Y Y, Zhou X Y (2010) Measuring structural quality of object-oriented softwares via bug propagation analysis on weighted software networks. J Comput Sci Technol 25 (6):1202\u20131213","journal-title":"J Comput Sci Technol"},{"key":"2822_CR41","doi-asserted-by":"publisher","first-page":"79602","DOI":"10.1109\/ACCESS.2019.2922998","volume":"7","author":"H He","year":"2019","unstructured":"He H, Ren J, Zhao G, Zhang Y, Hao X (2019) Mining of probabilistic controlling behavior model from dynamic software execution trace. IEEE Access 7:79602\u201379616","journal-title":"IEEE Access"},{"key":"2822_CR42","doi-asserted-by":"publisher","first-page":"23990","DOI":"10.1109\/ACCESS.2018.2829541","volume":"6","author":"A Zakari","year":"2018","unstructured":"Zakari A, Lee S P, Chong C Y (2018) Simultaneous localization of software faults based on complex network theory. IEEE Access 6:23990\u201324002","journal-title":"IEEE Access"},{"key":"2822_CR43","doi-asserted-by":"crossref","unstructured":"Matas N (2017) Comparing network centrality measures as tools for identifying key concepts in complex networks: a case of wikipedia. J Digit Inf Manag 15(4)","DOI":"10.6025\/jdim\/2017\/15\/4\/203-213"},{"key":"2822_CR44","doi-asserted-by":"crossref","unstructured":"Lerman K, Ghosh R, Kang JH (2010) Centrality metric for dynamic networks. In: Proceedings of the Eighth Workshop on Mining and Learning with Graphs. ACM, pp 70\u201377","DOI":"10.1145\/1830252.1830262"},{"issue":"6","key":"2822_CR45","doi-asserted-by":"publisher","first-page":"1478","DOI":"10.1086\/229694","volume":"96","author":"NE Friedkin","year":"1991","unstructured":"Friedkin N E (1991) Theoretical foundations for centrality measures. Amer J Sociol 96(6):1478\u20131504","journal-title":"Amer J Sociol"},{"issue":"1","key":"2822_CR46","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.socnet.2004.11.008","volume":"27","author":"SP Borgatti","year":"2005","unstructured":"Borgatti S P (2005) Centrality and network flow. Soc Netw 27(1):55\u201371","journal-title":"Soc Netw"},{"issue":"24","key":"2822_CR47","first-page":"10205","volume":"8","author":"MC Wang","year":"2012","unstructured":"Wang M C, Pan W F (2012) A comparative study of network centrality metrics in identifying key classes in software. J Comput Inf Syst 8(24):10205\u201310212","journal-title":"J Comput Inf Syst"},{"key":"2822_CR48","doi-asserted-by":"crossref","unstructured":"Lim SL, Quercia D, Finkelstein A (2010) StakeNet: using social networks to analyse the stakeholders of large-scale software projects. In: 2010 ACM\/IEEE 32nd International Conference on Software Engineering. IEEE, pp 295\u2013304","DOI":"10.1145\/1806799.1806844"},{"key":"2822_CR49","unstructured":"Chepelianskii A D (2010) Towards physical laws for software architecture. arXiv:1003.5455"},{"issue":"5","key":"2822_CR50","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1109\/TSE.2014.2371458","volume":"41","author":"S Mirshokraie","year":"2014","unstructured":"Mirshokraie S, Mesbah A, Pattabiraman K (2014) Guided mutation testing for javascript web applications. IEEE Trans Softw Eng 41(5):429\u2013444","journal-title":"IEEE Trans Softw Eng"},{"key":"2822_CR51","doi-asserted-by":"crossref","unstructured":"Dallmeier V, Lindig C, Zeller A (2005) Lightweight defect localization for Java. In: European conference on object-oriented programming. Springer, pp 528\u2013550","DOI":"10.1007\/11531142_23"},{"key":"2822_CR52","doi-asserted-by":"crossref","unstructured":"Laghari G, Murgia A, Demeyer S (2015) Localising faults in test execution traces. In: Proceedings of the 14th International Workshop on Principles of Software Evolution. ACM, pp 1\u20138","DOI":"10.1145\/2804360.2804361"},{"issue":"5","key":"2822_CR53","doi-asserted-by":"publisher","first-page":"1237","DOI":"10.1007\/s10664-014-9349-1","volume":"20","author":"TDB Le","year":"2015","unstructured":"Le T D B, Lo D, Thung F (2015) Should I follow this fault localization tool\u2019s output?. Empir Softw Eng 20(5):1237\u20131274","journal-title":"Empir Softw Eng"},{"key":"2822_CR54","unstructured":"Lo D, Xia X (2014) Fusion fault localizers. In: Proceedings of the 29th ACM\/IEEE international conference on Automated software engineering. ACM, pp 127\u2013138"},{"key":"2822_CR55","unstructured":"Binder R (2000) Testing object-oriented systems: models, patterns, and tools. Addison-Wesley Professional"},{"key":"2822_CR56","doi-asserted-by":"crossref","unstructured":"Wasylkowski A, Zeller A, Lindig C (2007) Detecting object usage anomalies. In: Proceedings of the the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on The Foundations of Software Engineering. ACM, pp 35\u201344","DOI":"10.1145\/1287624.1287632"},{"key":"2822_CR57","doi-asserted-by":"crossref","unstructured":"Kochhar PS, Xia X, Lo D, Li S (2016) Practitioners\u2019 expectations on automated fault localization. In: Proceedings of the 25th International Symposium on Software Testing and Analysis. ACM, pp 165\u2013176","DOI":"10.1145\/2931037.2931051"},{"key":"2822_CR58","doi-asserted-by":"crossref","unstructured":"Huang G, Zhang P, Zhang B, Yin T, Ren J (2016) The optimal community detection of software based on complex networks. Int J Modern Phys C 27(08):1650085","DOI":"10.1142\/S0129183116500856"},{"key":"2822_CR59","doi-asserted-by":"crossref","unstructured":"Just R, Jalali D, Ernst MD (2014) Defects4J: A database of existing faults to enable controlled testing studies for Java programs. In: Proceedings of the 2014 International Symposium on Software Testing and Analysis (ISSTA 2014). ACM, pp 437\u2013440","DOI":"10.1145\/2610384.2628055"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-021-02822-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-021-02822-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-021-02822-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,5]],"date-time":"2022-05-05T09:18:40Z","timestamp":1651742320000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-021-02822-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,20]]},"references-count":59,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2022,5]]}},"alternative-id":["2822"],"URL":"https:\/\/doi.org\/10.1007\/s10489-021-02822-4","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,20]]},"assertion":[{"value":"1 September 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 September 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}]}}