{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T15:25:37Z","timestamp":1773933937536,"version":"3.50.1"},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T00:00:00Z","timestamp":1762819200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T00:00:00Z","timestamp":1762819200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Institute for Energy Technology"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2026,2]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Context: Over the past few years, there has been a growing trend in the utilization of network embedding techniques for predicting software defects. Network Embeddings capture extensive information about software networks, but not all embeddings are equally pertinent for defect prediction. The presence of irrelevant and redundant embeddings has adversely affected the complexity and performance of software defect prediction (SDP) models. Objective: In the pursuit of optimizing defect prediction, the objective of this work is twofold: (i) utilizing network embeddings extracted from call graphs to identify latent and complex features that capture intricate class relationships, (ii) applying feature selection techniques to identify defect prediction-relevant network embeddings and addressing class imbalance through data balancing techniques for developing an SDP model. Method: This study utilizes 10 software projects, employing 6 different network embedding algorithms to extract 32 and 128-dimensional embeddings from each project\u2019s call graph. Seven feature selection techniques are evaluated by applying each of them to a comprehensive set of 250 datasets. SMOTE is applied to datasets for enhancing training fairness and predictive accuracy. The effectiveness of these techniques in SDP is assessed by developing models using 22 different classifiers. Performance metrics, including accuracy and AUC, are evaluated, while cost-effectiveness is also considered. A threshold is established based on testing efficiency and defect removal cost. Result: Through the application of feature selection methods and utilizing a smaller set of selected embeddings, the proposed SDP model achieved a mean AUC value of 72%, demonstrating an improvement over models that incorporated all available embeddings. The combination of embeddings and software metrics outperformed software metrics and embeddings by 3% in terms of AUC. Following feature selection, the 128-dimensional embeddings displayed nearly the same level of performance as the 32-dimensional embeddings. SMOTE application yielded notable performance improvements on highly imbalanced datasets. Conclusion: The result shows that the rank sum feature selection technique consistently highlights its effectiveness when compared to other feature selection methods. The proposed SDP framework has the ability to exhibit performance capabilities similar to those achieved when using lower-dimensional embeddings, indicating the superiority of these simplified models that use a lesser number of embeddings while still containing a rich set of software component relationships compared to existing techniques. Also, SMOTE effectively addressed the dataset imbalance, enhancing defect prediction performance on imbalanced datasets.<\/jats:p>","DOI":"10.1007\/s10586-025-05754-7","type":"journal-article","created":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T20:26:39Z","timestamp":1762892799000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Optimizing software defect prediction performance via call graph embedding and feature selection"],"prefix":"10.1007","volume":"29","author":[{"given":"Sweta","family":"Mehta","sequence":"first","affiliation":[]},{"given":"Sanjay","family":"Misra","sequence":"additional","affiliation":[]},{"given":"Lov","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"K. Sridhar","family":"Patnaik","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,11]]},"reference":[{"key":"5754_CR1","doi-asserted-by":"publisher","first-page":"11732","DOI":"10.1109\/ACCESS.2023.3242045","volume":"11","author":"P Afric","year":"2023","unstructured":"Afric, P., Vukadin, D., Silic, M., Delac, G.: Empirical study: How issue classification influences software defect prediction. IEEE Access 11, 11732\u201311748 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3242045","journal-title":"IEEE Access"},{"issue":"2","key":"5754_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-021-00289-8","volume":"28","author":"A Ali","year":"2021","unstructured":"Ali, A., Khan, N., Abu-Tair, M., Noppen, J., McClean, S., McChesney, I.: Discriminating features-based cost-sensitive approach for software defect prediction. Autom. Softw. Eng. 28(2), 11 (2021). https:\/\/doi.org\/10.1007\/s10515-021-00289-8","journal-title":"Autom. Softw. Eng."},{"key":"5754_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115895","volume":"187","author":"A Alsahaf","year":"2022","unstructured":"Alsahaf, A., Petkov, N., Shenoy, V., Azzopardi, G.: A framework for feature selection through boosting. Expert Syst. Appl. 187, 115895 (2022). https:\/\/doi.org\/10.1016\/j.eswa.2021.115895","journal-title":"Expert Syst. Appl."},{"key":"5754_CR4","doi-asserted-by":"publisher","first-page":"10925","DOI":"10.1007\/s10586-017-1235-3","volume":"22","author":"M Anbu","year":"2019","unstructured":"Anbu, M., Mala, G.S.A.: Feature selection using firefly algorithm in software defect prediction. Cluster Comput. 22, 10925\u201310934 (2019). https:\/\/doi.org\/10.1007\/s10586-017-1235-3","journal-title":"Cluster Comput."},{"key":"5754_CR5","doi-asserted-by":"publisher","first-page":"10093","DOI":"10.1007\/s10586-024-04486-4","volume":"27","author":"B Arasteh","year":"2024","unstructured":"Arasteh, B., Arasteh, K., Ghaffari, A., Reza, G.: A new binary chaos-based metaheuristic algorithm for software defect prediction. Cluster Comput. 27, 10093\u201310123 (2024). https:\/\/doi.org\/10.1007\/s10586-024-04486-4","journal-title":"Cluster Comput."},{"key":"5754_CR6","doi-asserted-by":"publisher","first-page":"25675","DOI":"10.1109\/ACCESS.2018.2835304","volume":"6","author":"A Arshad","year":"2018","unstructured":"Arshad, A., Riaz, S., Jiao, L., Murthy, A.: Semi-supervised deep fuzzy c-mean clustering for software fault prediction. IEEE Access 6, 25675\u201325685 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2835304","journal-title":"IEEE Access"},{"key":"5754_CR7","doi-asserted-by":"publisher","unstructured":"Balogun, A. O., Basri, S., Jadid, S. A., Mahamad, S., Al-momani, M. A., Bajeh, A. O., & Alazzawi, A. K. Search-Based Wrapper Feature Selection Methods in Software Defect Prediction: An Empirical Analysis. In R. Silhavy (Ed.), Intelligent Algorithms in Software Engineering (pp. 492\u2013503). Springer International Publishing. (2020). https:\/\/doi.org\/10.1007\/978-3-030-51965-0_43","DOI":"10.1007\/978-3-030-51965-0_43"},{"key":"5754_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-023-01932-4","author":"J Brundha Elci","year":"2023","unstructured":"Brundha Elci, J., Nandagopalan, S.: SS-wdrn: Sparrow search optimization-based weighted dual recurrent network for software fault prediction. Knowl. Inf. Syst. (2023). https:\/\/doi.org\/10.1007\/s10115-023-01932-4","journal-title":"Knowl. Inf. Syst."},{"key":"5754_CR9","doi-asserted-by":"publisher","unstructured":"Cao, S., Lu, W., & Xu, Q. GraRep: Learning Graph Representations with Global Structural Information. Proc of the 24th ACM International on Conference on Information and Knowledge Management, 891\u2013900 (2015). https:\/\/doi.org\/10.1145\/2806416.2806512","DOI":"10.1145\/2806416.2806512"},{"key":"5754_CR10","doi-asserted-by":"crossref","unstructured":"Dam, H. K., Pham, T., Ng, S. W., Tran, T., Grundy, J., Ghose, A. & Kim, C. J. A deep tree-based model for software defect prediction. arXiv preprint arXiv:1802.00921 (2018)","DOI":"10.1109\/MSR.2019.00017"},{"issue":"3","key":"5754_CR11","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/s10515-020-00277-4","volume":"27","author":"G Esteves","year":"2020","unstructured":"Esteves, G., Figueiredo, E., Veloso, A., Viggiato, M., Ziviani, N.: Understanding machine learning software defect predictions. Autom. Softw. Eng. 27(3), 369\u2013392 (2020). https:\/\/doi.org\/10.1007\/s10515-020-00277-4","journal-title":"Autom. Softw. Eng."},{"issue":"2","key":"5754_CR12","doi-asserted-by":"publisher","first-page":"512","DOI":"10.1109\/TR.2022.3165115","volume":"71","author":"D Fang","year":"2022","unstructured":"Fang, D., Liu, S., Liu, A.: Gated homogeneous fusion networks with jointed feature extraction for defect prediction. IEEE Trans. Reliab 71(2), 512\u2013526 (2022). https:\/\/doi.org\/10.1109\/TR.2022.3165115","journal-title":"IEEE Trans. Reliab"},{"issue":"2","key":"5754_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-021-00285-y","volume":"28","author":"S Goyal","year":"2021","unstructured":"Goyal, S.: Predicting the defects using stacked ensemble learner with filtered dataset. Autom. Softw. Eng. 28(2), 14 (2021). https:\/\/doi.org\/10.1007\/s10515-021-00285-y","journal-title":"Autom. Softw. Eng."},{"key":"5754_CR14","doi-asserted-by":"publisher","unstructured":"Grover, A., & Leskovec, J. node2vec: Scalable Feature Learning for Networks. Proc of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 855\u2013864 (2016). https:\/\/doi.org\/10.1145\/2939672.2939754","DOI":"10.1145\/2939672.2939754"},{"key":"5754_CR15","doi-asserted-by":"publisher","unstructured":"Ho, A., Nhat Hai, N., & Thi-Mai-Anh, B. Combining Deep Learning and Kernel PCA for Software Defect Prediction. Proc of the 11th International Symposium on Information and Communication Technology, 360\u2013367 (2022). https:\/\/doi.org\/10.1145\/3568562.3568587","DOI":"10.1145\/3568562.3568587"},{"key":"5754_CR16","doi-asserted-by":"publisher","unstructured":"Hou, Z., Gong, L., Yang, M., Zhang, Y., & Yang, S. Software Bug Prediction based on Complex Network Considering Control Flow. 2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C), 246\u2013254 (2022). https:\/\/doi.org\/10.1109\/QRS-C57518.2022.00044","DOI":"10.1109\/QRS-C57518.2022.00044"},{"issue":"5","key":"5754_CR17","doi-asserted-by":"publisher","first-page":"3590","DOI":"10.1007\/s10664-020-09848-1","volume":"25","author":"J Jiarpakdee","year":"2020","unstructured":"Jiarpakdee, J., Tantithamthavorn, C., Treude, C.: The impact of automated feature selection techniques on the interpretation of defect models. Empir. Softw. Eng. 25(5), 3590\u20133638 (2020). https:\/\/doi.org\/10.1007\/s10664-020-09848-1","journal-title":"Empir. Softw. Eng."},{"key":"5754_CR18","doi-asserted-by":"publisher","unstructured":"Jureczko, M., & Madeyski, L. Towards identifying software project clusters with regard to defect prediction. Proc of the 6th International Conference on Predictive Models in Software Engineering, 1\u201310 (2010). https:\/\/doi.org\/10.1145\/1868328.1868342","DOI":"10.1145\/1868328.1868342"},{"issue":"4","key":"5754_CR19","doi-asserted-by":"publisher","first-page":"1925","DOI":"10.1007\/s10664-018-9679-5","volume":"24","author":"M Kondo","year":"2019","unstructured":"Kondo, M., Bezemer, C.-P., Kamei, Y., Hassan, A.E., Mizuno, O.: The impact of feature reduction techniques on defect prediction models. Empir. Softw. Eng. 24(4), 1925\u20131963 (2019). https:\/\/doi.org\/10.1007\/s10664-018-9679-5","journal-title":"Empir. Softw. Eng."},{"key":"5754_CR20","doi-asserted-by":"publisher","unstructured":"Kumar, H., & Das, H. Software Fault Prediction using Wrapper based Feature Selection Approach employing Genetic Algorithm. 2022 OPJU International Technology Conference on Emerging Technologies for Sustainable Development (OTCON), 1\u20137 (2023). https:\/\/doi.org\/10.1109\/OTCON56053.2023.10113911","DOI":"10.1109\/OTCON56053.2023.10113911"},{"issue":"5","key":"5754_CR21","doi-asserted-by":"publisher","first-page":"1013","DOI":"10.1080\/02522667.2022.2103301","volume":"43","author":"KV Kumar","year":"2022","unstructured":"Kumar, K.V., Kumari, P., Rao, M., Mohapatra, D.P.: Metaheuristic feature selection for software fault prediction. J. Inf. Optim. Sci 43(5), 1013\u20131020 (2022). https:\/\/doi.org\/10.1080\/02522667.2022.2103301","journal-title":"J. Inf. Optim. Sci"},{"key":"5754_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.csi.2017.02.003","volume":"53","author":"L Kumar","year":"2017","unstructured":"Kumar, L., Misra, S., Rath, SKu..: An empirical analysis of the effectiveness of software metrics and fault prediction model for identifying faulty classes. Comput. Stand. Interfaces 53, 1\u201332 (2017). https:\/\/doi.org\/10.1016\/j.csi.2017.02.003","journal-title":"Comput. Stand. Interfaces"},{"issue":"7","key":"5754_CR23","doi-asserted-by":"publisher","first-page":"2112","DOI":"10.1109\/TFUZZ.2022.3217377","volume":"31","author":"W Li","year":"2023","unstructured":"Li, W., Zhai, S., Xu, W., Pedrycz, W., Qian, Y., Ding, W., Zhan, T.: Feature selection approach based on improved fuzzy C-means with principle of refined justifiable granularity. IEEE Trans. Fuzzy Syst. 31(7), 2112\u20132126 (2023). https:\/\/doi.org\/10.1109\/TFUZZ.2022.3217377","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"5754_CR24","doi-asserted-by":"publisher","unstructured":"Liu, H., Zhou, M., Lu, X. S., & Yao, C. Weighted Gini index feature selection method for imbalanced data. 2018 IEEE 15th International Conference on Networking, Sensing and Control (ICNSC), 1\u20136 (2018). https:\/\/doi.org\/10.1109\/ICNSC.2018.8361371","DOI":"10.1109\/ICNSC.2018.8361371"},{"key":"5754_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.105806","volume":"196","author":"J Ma","year":"2020","unstructured":"Ma, J., Gao, X.: A filter-based feature construction and feature selection approach for classification using genetic programming. Knowl.-Based Syst. 196, 105806 (2020). https:\/\/doi.org\/10.1016\/j.knosys.2020.105806","journal-title":"Knowl.-Based Syst."},{"issue":"15","key":"5754_CR26","doi-asserted-by":"publisher","first-page":"18715","DOI":"10.1007\/s10489-022-04427-x","volume":"53","author":"M Mafarja","year":"2023","unstructured":"Mafarja, M., Thaher, T., Al-Betar, M.A., Too, J., Awadallah, M.A., Abu Doush, I., Turabieh, H.: Classification framework for faulty-software using enhanced exploratory whale optimizer-based feature selection scheme and random forest ensemble learning. Appl. Intell. 53(15), 18715\u201318757 (2023). https:\/\/doi.org\/10.1007\/s10489-022-04427-x","journal-title":"Appl. Intell."},{"key":"5754_CR27","doi-asserted-by":"publisher","first-page":"12185","DOI":"10.1007\/s10586-024-04599-w","volume":"27","author":"R Malhotra","year":"2024","unstructured":"Malhotra, R., Khan, K.: A novel software defect prediction model using two-phase grey wolf optimisation for feature selection. Cluster Comput. 27, 12185\u201312207 (2024). https:\/\/doi.org\/10.1007\/s10586-024-04599-w","journal-title":"Cluster Comput."},{"key":"5754_CR28","doi-asserted-by":"crossref","unstructured":"Nevendra, M., Singh, P.: HTL-DP: Homogeneous Transfer Learning for Defect Prediction. In: International Conference on Information Systems and Management Science, pp. 257\u2013267. Springer International Publishing, Cham (2021)","DOI":"10.1007\/978-3-031-13150-9_22"},{"key":"5754_CR29","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/j.jss.2019.03.012","volume":"152","author":"C Ni","year":"2019","unstructured":"Ni, C., Chen, X., Wu, F., Shen, Y., Gu, Q.: An empirical study on Pareto based multi-objective feature selection for software defect prediction. J. Syst. Softw. 152, 215\u2013238 (2019). https:\/\/doi.org\/10.1016\/j.jss.2019.03.012","journal-title":"J. Syst. Softw."},{"key":"5754_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.114765","volume":"174","author":"E Odhiambo Omuya","year":"2021","unstructured":"Odhiambo Omuya, E., Onyango Okeyo, G., Waema Kimwele, M.: Feature selection for classification using principal component analysis and information gain. Expert Syst. Appl. 174, 114765 (2021). https:\/\/doi.org\/10.1016\/j.eswa.2021.114765","journal-title":"Expert Syst. Appl."},{"key":"5754_CR31","doi-asserted-by":"publisher","unstructured":"Ou, M., Cui, P., Pei, J., Zhang, Z., & Zhu, W. Asymmetric Transitivity Preserving Graph Embedding. Proc of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 1105\u20131114 (2016). https:\/\/doi.org\/10.1145\/2939672.2939751","DOI":"10.1145\/2939672.2939751"},{"key":"5754_CR32","doi-asserted-by":"publisher","DOI":"10.1002\/smr.2548","author":"A Ouellet","year":"2023","unstructured":"Ouellet, A., Badri, M.: Combining object-oriented metrics and centrality measures to predict faults in object-oriented software: An empirical validation. Journal of Software: Evolution and Process (2023). https:\/\/doi.org\/10.1002\/smr.2548","journal-title":"Journal of Software: Evolution and Process"},{"key":"5754_CR33","doi-asserted-by":"publisher","unstructured":"Perozzi, B., Al-Rfou, R., & Skiena, S. DeepWalk: Online Learning of Social Representations. Proc of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 701\u2013710 (2014). https:\/\/doi.org\/10.1145\/2623330.2623732","DOI":"10.1145\/2623330.2623732"},{"key":"5754_CR34","doi-asserted-by":"publisher","unstructured":"Qu, Y., Liu, T., Chi, J., Jin, Y., Cui, D., He, A., & Zheng, Q. node2defect: Using Network Embedding to Improve Software Defect Prediction. 2018 33rd IEEE\/ACM International Conference on Automated Software Engineering (ASE), 844\u2013849 (2018). https:\/\/doi.org\/10.1145\/3238147.3240469","DOI":"10.1145\/3238147.3240469"},{"key":"5754_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.119806","volume":"223","author":"SC Rathi","year":"2023","unstructured":"Rathi, S.C., Misra, S., Colomo-Palacios, R., Adarsh, R., Neti, L.B.M., Kumar, L.: Empirical evaluation of the performance of data sampling and feature selection techniques for software fault prediction. Expert Syst. Appl. 223, 119806 (2023). https:\/\/doi.org\/10.1016\/j.eswa.2023.119806","journal-title":"Expert Syst. Appl."},{"key":"5754_CR36","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1016\/j.inffus.2018.02.007","volume":"45","author":"B Seijo-Pardo","year":"2019","unstructured":"Seijo-Pardo, B., Bol\u00f3n-Canedo, V., Alonso-Betanzos, A.: On developing an automatic threshold applied to feature selection ensembles. Inf. Fusion 45, 227\u2013245 (2019). https:\/\/doi.org\/10.1016\/j.inffus.2018.02.007","journal-title":"Inf. Fusion"},{"key":"5754_CR37","doi-asserted-by":"publisher","DOI":"10.1002\/smr.2330","author":"K Shi","year":"2020","unstructured":"Shi, K., Lu, Y., Liu, G., Wei, Z., Chang, J.: Mpt-embedding: An unsupervised representation learning of code for software defect prediction. Journal of Software: Evolution and Process (2020). https:\/\/doi.org\/10.1002\/smr.2330","journal-title":"Journal of Software: Evolution and Process"},{"key":"5754_CR38","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1016\/j.infsof.2018.10.001","volume":"106","author":"T Shippey","year":"2019","unstructured":"Shippey, T., Bowes, D., Hall, T.: Automatically identifying code features for software defect prediction: Using AST n-grams. Inf. Softw. Technol. 106, 142\u2013160 (2019). https:\/\/doi.org\/10.1016\/j.infsof.2018.10.001","journal-title":"Inf. Softw. Technol."},{"issue":"2","key":"5754_CR39","doi-asserted-by":"publisher","first-page":"907","DOI":"10.1007\/s10462-019-09682-y","volume":"53","author":"S Solorio-Fern\u00e1ndez","year":"2020","unstructured":"Solorio-Fern\u00e1ndez, S., Carrasco-Ochoa, J.A., Mart\u00ednez-Trinidad, J. Fco..: A review of unsupervised feature selection methods. Artif. Intell. Rev. 53(2), 907\u2013948 (2020). https:\/\/doi.org\/10.1007\/s10462-019-09682-y","journal-title":"Artif. Intell. Rev."},{"key":"5754_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106163","volume":"90","author":"Z Sun","year":"2020","unstructured":"Sun, Z., Zhang, J., Sun, H., Zhu, X.: Collaborative filtering based recommendation of sampling methods for software defect prediction. Appl. Soft Comput. 90, 106163 (2020)","journal-title":"Appl. Soft Comput."},{"issue":"4","key":"5754_CR41","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/s11334-021-00399-2","volume":"17","author":"P Suresh Kumar","year":"2021","unstructured":"Suresh Kumar, P., Behera, H.S., Nayak, J., Naik, B.: Bootstrap aggregation ensemble learning-based reliable approach for software defect prediction by using characterized code feature. Innov. Syst. Softw. Eng. 17(4), 355\u2013379 (2021). https:\/\/doi.org\/10.1007\/s11334-021-00399-2","journal-title":"Innov. Syst. Softw. Eng."},{"key":"5754_CR42","doi-asserted-by":"publisher","unstructured":"Tang, J., Qu, M., Wang, M., Zhang, M., Yan, J., & Mei, Q. LINE: Large-scale Information Network Embedding. Proc of the 24th International Conference on World Wide Web, 1067\u20131077 (2015). https:\/\/doi.org\/10.1145\/2736277.2741093","DOI":"10.1145\/2736277.2741093"},{"key":"5754_CR43","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2022.109737","volume":"131","author":"K Thirumoorthy","year":"2022","unstructured":"Thirumoorthy, K., J., J.J.B.: A feature selection model for software defect prediction using binary Rao optimization algorithm. Appl. Soft Comput. 131, 109737 (2022). https:\/\/doi.org\/10.1016\/j.asoc.2022.109737","journal-title":"Appl. Soft Comput."},{"issue":"9","key":"5754_CR44","first-page":"1886","volume":"47","author":"H Tong","year":"2019","unstructured":"Tong, H., Liu, B., Wang, S.: Kernel spectral embedding transfer ensemble for heterogeneous defect prediction. IEEE Trans. Softw. Eng. 47(9), 1886\u20131906 (2019)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"5754_CR45","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.113122","volume":"145","author":"M Tubishat","year":"2020","unstructured":"Tubishat, M., Idris, N., Shuib, L., Abushariah, M.A.M., Mirjalili, S.: Improved salp swarm algorithm based on opposition based learning and novel local search algorithm for feature selection. Expert Syst. Appl. 145, 113122 (2020). https:\/\/doi.org\/10.1016\/j.eswa.2019.113122","journal-title":"Expert Syst. Appl."},{"key":"5754_CR46","doi-asserted-by":"publisher","first-page":"8041","DOI":"10.1109\/ACCESS.2020.2964321","volume":"8","author":"I Tumar","year":"2020","unstructured":"Tumar, I., Hassouneh, Y., Turabieh, H., Thaher, T.: Enhanced binary moth flame optimization as a feature selection algorithm to predict software fault prediction. IEEE Access 8, 8041\u20138055 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2964321","journal-title":"IEEE Access"},{"key":"5754_CR47","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.eswa.2018.12.033","volume":"122","author":"H Turabieh","year":"2019","unstructured":"Turabieh, H., Mafarja, M., Li, X.: Iterated feature selection algorithms with layered recurrent neural network for software fault prediction. Expert Syst. Appl. 122, 27\u201342 (2019). https:\/\/doi.org\/10.1016\/j.eswa.2018.12.033","journal-title":"Expert Syst. Appl."},{"issue":"5","key":"5754_CR48","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-022-10147-0","volume":"27","author":"V Walunj","year":"2022","unstructured":"Walunj, V., Gharibi, G., Alanazi, R., Lee, Y.: Defect prediction using deep learning with network portrait divergence for software evolution. Empir. Softw. Eng. 27(5), 118 (2022). https:\/\/doi.org\/10.1007\/s10664-022-10147-0","journal-title":"Empir. Softw. Eng."},{"issue":"14","key":"5754_CR49","doi-asserted-by":"publisher","first-page":"8249","DOI":"10.1007\/s00521-020-04960-1","volume":"33","author":"K Wang","year":"2021","unstructured":"Wang, K., Liu, L., Yuan, C., Wang, Z.: Software defect prediction model based on LASSO\u2013SVM. Neural Comput. Appl. 33(14), 8249\u20138259 (2021). https:\/\/doi.org\/10.1007\/s00521-020-04960-1","journal-title":"Neural Comput. Appl."},{"issue":"5","key":"5754_CR50","doi-asserted-by":"publisher","first-page":"1480","DOI":"10.1109\/TSE.2020.3023177","volume":"48","author":"S Wattanakriengkrai","year":"2022","unstructured":"Wattanakriengkrai, S., Thongtanunam, P., Tantithamthavorn, C., Hata, H., Matsumoto, K.: Predicting defective lines using a model-agnostic technique. IEEE Trans. Softw. Eng. 48(5), 1480\u20131496 (2022). https:\/\/doi.org\/10.1109\/TSE.2020.3023177","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"2","key":"5754_CR51","doi-asserted-by":"publisher","first-page":"389","DOI":"10.23919\/JSEE.2021.000032","volume":"32","author":"X Xiaolong","year":"2021","unstructured":"Xiaolong, X., Wen, C., Xinheng, W.: RFC: A feature selection algorithm for software defect prediction. J. Syst. Eng. Electron. 32(2), 389\u2013398 (2021). https:\/\/doi.org\/10.23919\/JSEE.2021.000032","journal-title":"J. Syst. Eng. Electron."},{"key":"5754_CR52","doi-asserted-by":"publisher","first-page":"7933","DOI":"10.1109\/ACCESS.2023.3239266","volume":"11","author":"F Yang","year":"2023","unstructured":"Yang, F., Xu, H., Xiao, P., Zhong, F., Zeng, G.: A method-level defect prediction approach based on structural features of method-calling network. IEEE Access 11, 7933\u20137946 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3239266","journal-title":"IEEE Access"},{"key":"5754_CR53","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2023.107175","volume":"158","author":"ZM Zain","year":"2023","unstructured":"Zain, Z.M., Sakri, S., Ismail, N.H.A.: Application of deep learning in software defect prediction: systematic literature review and meta-analysis. Inf. Softw. Technol. 158, 107175 (2023). https:\/\/doi.org\/10.1016\/j.infsof.2023.107175","journal-title":"Inf. Softw. Technol."},{"key":"5754_CR54","doi-asserted-by":"publisher","unstructured":"Zeng, C., Zhou, C. Y., Lv, S. K., He, P., & Huang, J. GCN2defect: Graph Convolutional Networks for SMOTETomek-based Software Defect Prediction. 2021 IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE), 69\u201379 (2021). https:\/\/doi.org\/10.1109\/ISSRE52982.2021.00020","DOI":"10.1109\/ISSRE52982.2021.00020"},{"key":"5754_CR55","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.eswa.2019.06.044","volume":"137","author":"Y Zhang","year":"2019","unstructured":"Zhang, Y., Cheng, S., Shi, Y., Gong, D., Zhao, X.: Cost-sensitive feature selection using two-archive multi-objective artificial bee colony algorithm. Expert Syst. Appl. 137, 46\u201358 (2019). https:\/\/doi.org\/10.1016\/j.eswa.2019.06.044","journal-title":"Expert Syst. Appl."},{"key":"5754_CR56","doi-asserted-by":"crossref","unstructured":"Zhang, J., Dong, Y., Wang, Y., Tang, J., & Ding, M. ProNE: Fast and scalable network representation learning. Proc of the 28th International Joint Conference on Artificial Intelligence, 4278\u20134284 (2019)","DOI":"10.24963\/ijcai.2019\/594"},{"key":"5754_CR57","doi-asserted-by":"publisher","first-page":"111858","DOI":"10.1016\/j.jss.2023.111858","volume":"207","author":"Y Zhao","year":"2023","unstructured":"Zhao, Y., Jiang, M., Yang, Y., Zhou, Y., Ma, H., Ding, Z.: Towards an understanding of intra-defect associations: Implications for defect prediction. J. Syst. Softw. 207, 111858 (2023). https:\/\/doi.org\/10.1016\/j.jss.2023.111858","journal-title":"J. Syst. Softw."},{"key":"5754_CR58","doi-asserted-by":"publisher","unstructured":"Zhou, X., & Lu, L. Defect Prediction via LSTM Based on Sequence and Tree Structure. 2020 IEEE 20th International Conference on Software Quality, Reliability and Security (QRS), 366\u2013373 (2020). https:\/\/doi.org\/10.1109\/QRS51102.2020.00055","DOI":"10.1109\/QRS51102.2020.00055"},{"key":"5754_CR59","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2021.111026","volume":"180","author":"K Zhu","year":"2021","unstructured":"Zhu, K., Ying, S., Zhang, N., Zhu, D.: Software defect prediction based on enhanced metaheuristic feature selection optimization and a hybrid deep neural network. J. Syst. Softw. 180, 111026 (2021). https:\/\/doi.org\/10.1016\/j.jss.2021.111026","journal-title":"J. Syst. Softw."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05754-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05754-7","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05754-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T13:08:06Z","timestamp":1773925686000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05754-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,11]]},"references-count":59,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["5754"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05754-7","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,11]]},"assertion":[{"value":"23 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 September 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 September 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 November 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"No ethical approval is required based on the following.\u00a0(a) This article does not contain any studies with animals performed by any of the authors.\u00a0(b) This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"3"}}