{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:24:37Z","timestamp":1740122677400,"version":"3.37.3"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,6,4]],"date-time":"2022-06-04T00:00:00Z","timestamp":1654300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,6,4]],"date-time":"2022-06-04T00:00:00Z","timestamp":1654300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100007224","name":"nafosted","doi-asserted-by":"crossref","award":["102.05-2018.306"],"award-info":[{"award-number":["102.05-2018.306"]}],"id":[{"id":"10.13039\/100007224","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2023,2]]},"DOI":"10.1007\/s10489-022-03663-5","type":"journal-article","created":{"date-parts":[[2022,6,4]],"date-time":"2022-06-04T00:02:26Z","timestamp":1654300946000},"page":"3877-3888","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Semi-supervised multitask learning using convolutional autoencoder for faulty code detection with limited data"],"prefix":"10.1007","volume":"53","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1113-9935","authenticated-orcid":false,"given":"Anh Viet","family":"Phan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Khanh Duy Tung","family":"Nguyen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lam Thu","family":"Bui","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,6,4]]},"reference":[{"key":"3663_CR1","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1016\/j.infsof.2014.07.005","volume":"58","author":"IH Laradji","year":"2015","unstructured":"Laradji I H, Alshayeb M, Ghouti L (2015) Software defect prediction using ensemble learning on selected features. Inf Softw Technol 58:388\u2013402","journal-title":"Inf Softw Technol"},{"issue":"6","key":"3663_CR2","doi-asserted-by":"publisher","first-page":"476","DOI":"10.1109\/32.295895","volume":"20","author":"SR Chidamber","year":"1994","unstructured":"Chidamber S R, Kemerer C F (1994) A metrics suite for object oriented design. IEEE Transactions on software engineering 20(6):476\u2013493","journal-title":"IEEE Transactions on software engineering"},{"key":"3663_CR3","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/TSE.1979.234165","volume":"2","author":"B Curtis","year":"1979","unstructured":"Curtis B, Sheppard S B, Milliman P, Borst MA, Love T (1979) Measuring the psychological complexity of software maintenance tasks with the halstead and mccabe metrics. IEEE Transactions on software engineering 2:96\u2013104","journal-title":"IEEE Transactions on software engineering"},{"issue":"4","key":"3663_CR4","doi-asserted-by":"publisher","first-page":"9847","DOI":"10.1007\/s10586-018-1696-z","volume":"22","author":"C Manjula","year":"2019","unstructured":"Manjula C, Florence L (2019) Deep neural network based hybrid approach for software defect prediction using software metrics. Clust Comput 22(4):9847\u20139863","journal-title":"Clust Comput"},{"key":"3663_CR5","doi-asserted-by":"publisher","first-page":"24184","DOI":"10.1109\/ACCESS.2018.2817572","volume":"6","author":"S Huda","year":"2018","unstructured":"Huda S, Liu K, Abdelrazek M, Ibrahim A, Alyahya S, Al-Dossari H, Ahmad S (2018) An ensemble oversampling model for class imbalance problem in software defect prediction. IEEE access 6:24184\u201324195","journal-title":"IEEE access"},{"key":"3663_CR6","doi-asserted-by":"crossref","unstructured":"Phan A V, Le Nguyen M, Bui L T (2017) Sibstcnn and tbcnn+ knn-ted: New models over tree structures for source code classification. In: International Conference on Intelligent Data Engineering and Automated Learning, Springer, pp 120\u2013128","DOI":"10.1007\/978-3-319-68935-7_14"},{"key":"3663_CR7","doi-asserted-by":"crossref","unstructured":"Mou L, Li G, Zhang L, Wang T, Jin Z (2016) Convolutional neural networks over tree structures for programming language processing. In: Thirtieth AAAI Conference on Artificial Intelligence","DOI":"10.1609\/aaai.v30i1.10139"},{"key":"3663_CR8","doi-asserted-by":"crossref","unstructured":"Li J, He P, Zhu J, Lyu M R (2017) Software defect prediction via convolutional neural network. In: 2017 IEEE International Conference on Software Quality, Reliability and Security (QRS), IEEE, pp 318\u2013328","DOI":"10.1109\/QRS.2017.42"},{"key":"3663_CR9","unstructured":"Phan A V, Le Nguyen M, Bui L T (2017) Convolutional neural networks over control flow graphs for software defect prediction. In: 2017 IEEE 29th International conference on tools with artificial intelligence (ICTAI), IEEE, pp 45\u201352"},{"key":"3663_CR10","doi-asserted-by":"crossref","unstructured":"Phan A V, Le Nguyen M (2017) Convolutional neural networks on assembly code for predicting software defects. In: 2017 21st Asia pacific symposium on intelligent and evolutionary systems (IES), IEEE, pp 37\u201342","DOI":"10.1109\/IESYS.2017.8233558"},{"key":"3663_CR11","unstructured":"Sayyad Shirabad J, Menzies TJ (2005) The PROMISE Repository of Software Engineering Databases, School of Information Technology and Engineering, University of Ottawa, Canada. http:\/\/promise.site.uottawa.ca\/SERepository"},{"issue":"4","key":"3663_CR12","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/s13748-016-0092-2","volume":"5","author":"LL Minku","year":"2016","unstructured":"Minku L L, Mendes E, Turhan B (2016) Data mining for software engineering and humans in the loop. Progress in artificial intelligence 5(4):307\u2013314","journal-title":"Progress in artificial intelligence"},{"issue":"2","key":"3663_CR13","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1016\/j.jss.2007.05.035","volume":"81","author":"I Gondra","year":"2008","unstructured":"Gondra I (2008) Applying machine learning to software fault-proneness prediction. J Syst Softw 81(2):186\u2013195","journal-title":"J Syst Softw"},{"key":"3663_CR14","doi-asserted-by":"crossref","unstructured":"Nagappan N, Ball T (2007) Using software dependencies and churn metrics to predict field failures: An empirical case study. In: First international symposium on empirical software engineering and measurement (ESEM 2007), IEEE, pp 364\u2013 373","DOI":"10.1109\/ESEM.2007.13"},{"key":"3663_CR15","doi-asserted-by":"crossref","unstructured":"Moser R, Pedrycz W, Succi G (2008) A comparative analysis of the efficiency of change metrics and static code attributes for defect prediction. In: Proceedings of the 30th international conference on software engineering, pp 181\u2013190","DOI":"10.1145\/1368088.1368114"},{"issue":"5","key":"3663_CR16","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1016\/j.jss.2007.07.040","volume":"81","author":"KO Elish","year":"2008","unstructured":"Elish K O, Elish M O (2008) Predicting defect-prone software modules using support vector machines. J Syst Softw 81(5):649\u2013660","journal-title":"J Syst Softw"},{"key":"3663_CR17","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.infsof.2017.11.008","volume":"96","author":"H Tong","year":"2018","unstructured":"Tong H, Liu B, Wang S (2018) Software defect prediction using stacked denoising autoencoders and two-stage ensemble learning. Inf Softw Technol 96:94\u2013111","journal-title":"Inf Softw Technol"},{"key":"3663_CR18","unstructured":"Kaner C, et al. (2004) Software engineering metrics: What do they measure and how do we know?. In: In METRICS 2004. IEEE CS, Citeseer"},{"key":"3663_CR19","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1016\/j.neunet.2018.09.001","volume":"108","author":"AV Phan","year":"2018","unstructured":"Phan A V, Le Nguyen M, Nguyen Y L H, Bui L T (2018) Dgcnn: A convolutional neural network over large-scale labeled graphs. Neural Netw 108:533\u2013543","journal-title":"Neural Netw"},{"key":"3663_CR20","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1016\/j.infsof.2018.10.001","volume":"106","author":"T Shippey","year":"2019","unstructured":"Shippey T, Bowes D, Hall T (2019) Automatically identifying code features for software defect prediction: Using ast n-grams. Inf Softw Technol 106:142\u2013160","journal-title":"Inf Softw Technol"},{"key":"3663_CR21","doi-asserted-by":"crossref","unstructured":"Wang S, Liu T, Tan L (2016) Automatically learning semantic features for defect prediction. In: 2016 IEEE\/ACM 38th International conference on software engineering (ICSE), IEEE, pp 297\u2013 308","DOI":"10.1145\/2884781.2884804"},{"issue":"7","key":"3663_CR22","doi-asserted-by":"publisher","first-page":"3289","DOI":"10.1109\/TII.2018.2821768","volume":"14","author":"G Lin","year":"2018","unstructured":"Lin G, Zhang J, Luo W, Pan L, Xiang Y, De Vel O, Montague P (2018) Cross-project transfer representation learning for vulnerable function discovery. IEEE transactions on industrial informatics 14(7):3289\u20133297","journal-title":"IEEE transactions on industrial informatics"},{"issue":"1","key":"3663_CR23","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1186\/s40537-016-0043-6","volume":"3","author":"K Weiss","year":"2016","unstructured":"Weiss K, Khoshgoftaar T M, Wang D (2016) A survey of transfer learning. Journal of Big data 3(1):9","journal-title":"Journal of Big data"},{"key":"3663_CR24","unstructured":"Wang C, Mahadevan S (2011) Heterogeneous domain adaptation using manifold alignment. In: Twenty-second international joint conference on artificial intelligence"},{"key":"3663_CR25","doi-asserted-by":"crossref","unstructured":"Zhu Y, Chen Y, Lu Z, Pan S J, Xue G-R, Yu Y, Yang Q (2011) Heterogeneous transfer learning for image classification. In: Twenty-Fifth AAAI Conference on Artificial Intelligence","DOI":"10.1609\/aaai.v25i1.8090"},{"key":"3663_CR26","unstructured":"Devlin J, Chang M-W, Lee K, Toutanova K (2018) Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv:1810.04805"},{"key":"3663_CR27","doi-asserted-by":"crossref","unstructured":"Howard J, Ruder S (2018) Universal language model fine-tuning for text classification. arXiv:1801.06146","DOI":"10.18653\/v1\/P18-1031"},{"key":"3663_CR28","doi-asserted-by":"crossref","unstructured":"Peters M E, Neumann M, Iyyer M, Gardner M, Clark C, Lee K, Zettlemoyer L (2018) Deep contextualized word representations. arXiv:1802.05365","DOI":"10.18653\/v1\/N18-1202"},{"issue":"8","key":"3663_CR29","first-page":"9","volume":"1","author":"A Radford","year":"2019","unstructured":"Radford A, Wu J, Child R, Luan D, Amodei D, Sutskever I (2019) Language models are unsupervised multitask learners. OpenAI Blog 1(8):9","journal-title":"OpenAI Blog"},{"issue":"1","key":"3663_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-018-36047-2","volume":"8","author":"H-J Bae","year":"2018","unstructured":"Bae H-J, Kim C-W, Kim N, Park B, Kim N, Seo J B, Lee S M (2018) A perlin noise-based augmentation strategy for deep learning with small data samples of hrct images. Scientific reports 8 (1):1\u20137","journal-title":"Scientific reports"},{"key":"3663_CR31","unstructured":"Perez L, Wang J (2017) The effectiveness of data augmentation in image classification using deep learning. arXiv:1712.04621"},{"key":"3663_CR32","doi-asserted-by":"crossref","unstructured":"Pennington J, Socher R, Manning C D (2014) Glove: Global vectors for word representation. In: Empirical Methods in Natural Language Processing (EMNLP). http:\/\/www.aclweb.org\/anthology\/D14-1162, pp 1532\u20131543","DOI":"10.3115\/v1\/D14-1162"},{"key":"3663_CR33","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1016\/j.neucom.2019.01.078","volume":"337","author":"G Liu","year":"2019","unstructured":"Liu G, Guo J (2019) Bidirectional lstm with attention mechanism and convolutional layer for text classification. Neurocomputing 337:325\u2013338","journal-title":"Neurocomputing"},{"key":"3663_CR34","doi-asserted-by":"crossref","unstructured":"Li P, Zhong P, Mao K, Wang D, Yang X, Liu Y, Yin J-, See S (2021) Act: an attentive convolutional transformer for efficient text classification. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol 35, pp 13261\u201313269","DOI":"10.1609\/aaai.v35i15.17566"},{"issue":"7","key":"3663_CR35","doi-asserted-by":"publisher","first-page":"1895","DOI":"10.1162\/089976698300017197","volume":"10","author":"TG Dietterich","year":"1998","unstructured":"Dietterich T G (1998) Approximate statistical tests for comparing supervised classification learning algorithms. Neural computation 10(7):1895\u20131923","journal-title":"Neural computation"},{"key":"3663_CR36","doi-asserted-by":"crossref","unstructured":"Tan B, Song Y, Zhong E, Yang Q (2015) Transitive transfer learning. In: Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp 1155\u20131164","DOI":"10.1145\/2783258.2783295"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-022-03663-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-022-03663-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-022-03663-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T06:32:37Z","timestamp":1675233157000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-022-03663-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,4]]},"references-count":36,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,2]]}},"alternative-id":["3663"],"URL":"https:\/\/doi.org\/10.1007\/s10489-022-03663-5","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"type":"print","value":"0924-669X"},{"type":"electronic","value":"1573-7497"}],"subject":[],"published":{"date-parts":[[2022,6,4]]},"assertion":[{"value":"20 April 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 June 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}