{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T03:42:34Z","timestamp":1764906154465},"reference-count":83,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,2,22]],"date-time":"2023-02-22T00:00:00Z","timestamp":1677024000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,2,22]],"date-time":"2023-02-22T00:00:00Z","timestamp":1677024000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1007\/s10664-023-10294-y","type":"journal-article","created":{"date-parts":[[2023,2,22]],"date-time":"2023-02-22T11:02:58Z","timestamp":1677063778000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["The impact of class imbalance techniques on crashing fault residence prediction models"],"prefix":"10.1007","volume":"28","author":[{"given":"Kunsong","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Zhou","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Meng","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Xue","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Jacky","family":"Keung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,22]]},"reference":[{"key":"10294_CR1","unstructured":"Abadi M, Barham P, Chen J, Chen Z, Davis A, Dean J, Devin M, Ghemawat S, Irving G, Isard M et al (2016) {TensorFlow}: A system for {Large-Scale} machine learning. In: Proceedings of the 12th USENIX symposium on operating systems design and implementation (OSDI), pp 265\u2013283"},{"key":"10294_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal A, Menzies T (2018) Is \u201cbetter data\u201d better than \u201cbetter data miners\u201d?. In: Proceedings of 40th IEEE\/ACM international conference on software engineering (ICSE). IEEE, pp 1050\u20131061","DOI":"10.1145\/3180155.3180197"},{"key":"10294_CR3","unstructured":"Batista GE, Bazzan AL, Monard MC et al (2003) Balancing training data for automated annotation of keywords: a case study. In: WOB, pp 10\u201318"},{"issue":"1","key":"10294_CR4","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1145\/1007730.1007735","volume":"6","author":"GE Batista","year":"2004","unstructured":"Batista GE, Prati RC, Monard MC (2004) A study of the behavior of several methods for balancing machine learning training data. ACM SIGKDD Explor Newsl 6(1):20\u201329","journal-title":"ACM SIGKDD Explor Newsl"},{"issue":"2","key":"10294_CR5","doi-asserted-by":"crossref","first-page":"602","DOI":"10.1007\/s10664-018-9633-6","volume":"24","author":"KE Bennin","year":"2019","unstructured":"Bennin KE, Keung JW, Monden A (2019) On the relative value of data resampling approaches for software defect prediction. Empir Softw Eng (EMSE) 24(2):602\u2013636","journal-title":"Empir Softw Eng (EMSE)"},{"issue":"2","key":"10294_CR6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2907070","volume":"49","author":"P Branco","year":"2016","unstructured":"Branco P, Torgo L, Ribeiro RP (2016) A survey of predictive modeling on imbalanced domains. ACM Comput Surv (CSUR) 49(2):1\u201350","journal-title":"ACM Comput Surv (CSUR)"},{"issue":"2","key":"10294_CR7","first-page":"123","volume":"24","author":"L Breiman","year":"1996","unstructured":"Breiman L (1996) Bagging predictors. Mach Learn 24(2):123\u2013140","journal-title":"Mach Learn"},{"issue":"1","key":"10294_CR8","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L (2001) Random forests. Mach Learn 45(1):5\u201332","journal-title":"Mach Learn"},{"key":"10294_CR9","doi-asserted-by":"crossref","unstructured":"Cabral GG, Minku LL, Shihab E, Mujahid S (2019) Class imbalance evolution and verification latency in just-in-time software defect prediction. In: Proceedings of the IEEE\/ACM 41st international conference on software engineering (ICSE). IEEE, pp 666\u2013676","DOI":"10.1109\/ICSE.2019.00076"},{"key":"10294_CR10","doi-asserted-by":"crossref","unstructured":"Catolino G (2017) Just-in-time bug prediction in mobile applications: the domain matters!. In: Proceedings of the IEEE\/ACM 4th international conference on mobile software engineering and systems (MOBILESoft). IEEE, pp 201\u2013202","DOI":"10.1109\/MOBILESoft.2017.58"},{"key":"10294_CR11","doi-asserted-by":"crossref","unstructured":"Catolino G, Di Nucci D, Ferrucci F (2019) Cross-project just-in-time bug prediction for mobile apps: An empirical assessment. In: Proceedings of the IEEE\/ACM 6th international conference on mobile software engineering and systems (MOBILESoft). IEEE, pp 99\u2013110","DOI":"10.1109\/MOBILESoft.2019.00023"},{"key":"10294_CR12","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla NV, Bowyer KW, Hall LO, Kegelmeyer WP (2002) SMOTE: synthetic minority over-sampling technique. J Artif Intell Res 16:321\u2013357","journal-title":"J Artif Intell Res"},{"key":"10294_CR13","doi-asserted-by":"crossref","unstructured":"Chawla NV, Lazarevic A, Hall LO, Bowyer KW (2003) SMOTEBoost: Improving prediction of the minority class in boosting. In: European conference on principles of data mining and knowledge discovery. Springer, pp 107\u2013119","DOI":"10.1007\/978-3-540-39804-2_12"},{"issue":"1-12","key":"10294_CR14","first-page":"24","volume":"110","author":"C Chen","year":"2004","unstructured":"Chen C, Liaw A, Breiman L et al (2004) Using random forest to learn imbalanced data. Univ Calif Berkeley 110(1-12):24","journal-title":"Univ Calif Berkeley"},{"issue":"2","key":"10294_CR15","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TSE.2014.2363469","volume":"41","author":"N Chen","year":"2014","unstructured":"Chen N, Kim S (2014) Star: Stack trace based automatic crash reproduction via symbolic execution. IEEE Trans Softw Engi (TSE) 41(2):198\u2013220","journal-title":"IEEE Trans Softw Engi (TSE)"},{"issue":"1","key":"10294_CR16","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/TIT.1967.1053964","volume":"13","author":"T Cover","year":"1967","unstructured":"Cover T, Hart P (1967) Nearest neighbor pattern classification. IEEE Trans Inf Theory 13(1):21\u201327","journal-title":"IEEE Trans Inf Theory"},{"key":"10294_CR17","doi-asserted-by":"crossref","unstructured":"Dhaliwal T, Khomh F, Zou Y (2011) Classifying field crash reports for fixing bugs: A case study of Mozilla Firefox. In: Proceedings of the 27th IEEE international conference on software maintenance (ICSM). IEEE, pp 333\u2013342","DOI":"10.1109\/ICSM.2011.6080800"},{"key":"10294_CR18","unstructured":"Fan W, Stolfo SJ, Zhang J, Chan PK (1999) Adacost: misclassification cost-sensitive boosting. In: ICML, vol 99. Citeseer, pp 97\u2013105"},{"issue":"5","key":"10294_CR19","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1109\/TSE.2018.2864217","volume":"46","author":"Y Fan","year":"2018","unstructured":"Fan Y, Xia X, Lo D, Hassan AE (2018) Chaff from the wheat: Characterizing and determining valid bug reports. IEEE Trans Softw Eng (TSE) 46 (5):495\u2013525","journal-title":"IEEE Trans Softw Eng (TSE)"},{"key":"10294_CR20","doi-asserted-by":"crossref","unstructured":"Fang C, Liu Z, Shi Y, Huang J, Shi Q (2020) Functional code clone detection with syntax and semantics fusion learning. In: Proceedings of the 29th ACM SIGSOFT international symposium on software testing and analysis (ISSTA), pp 516\u2013527","DOI":"10.1145\/3395363.3397362"},{"issue":"1","key":"10294_CR21","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1006\/jcss.1997.1504","volume":"55","author":"Y Freund","year":"1997","unstructured":"Freund Y, Schapire RE (1997) A decision-theoretic generalization of on-line learning and an application to boosting. J Comput Syst Sci 55(1):119\u2013139","journal-title":"J Comput Syst Sci"},{"issue":"1","key":"10294_CR22","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1023\/A:1006524209794","volume":"13","author":"J F\u00fcrnkranz","year":"1999","unstructured":"F\u00fcrnkranz J (1999) Separate-and-conquer rule learning. Artif Intell Rev 13(1):3\u201354","journal-title":"Artif Intell Rev"},{"key":"10294_CR23","unstructured":"Gong L, Zhang H, Seo H, Kim S (2014) Locating crashing faults based on crash stack traces. arXiv:14044100"},{"key":"10294_CR24","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1016\/j.jss.2018.11.004","volume":"148","author":"Y Gu","year":"2019","unstructured":"Gu Y, Xuan J, Zhang H, Zhang L, Fan Q, Xie X, Qian T (2019) Does the fault reside in a stack trace? Assisting crash localization by predicting crashing fault residence. J Syst Softw (JSS) 148:88\u2013104","journal-title":"J Syst Softw (JSS)"},{"key":"10294_CR25","doi-asserted-by":"crossref","unstructured":"Han H, Wang WY, Mao BH (2005) Borderline-SMOTE: a new over-sampling method in imbalanced data sets learning. In: International conference on intelligent computing. Springer, pp 878\u2013887","DOI":"10.1007\/11538059_91"},{"issue":"3","key":"10294_CR26","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1109\/TIT.1968.1054155","volume":"14","author":"P Hart","year":"1968","unstructured":"Hart P (1968) The condensed nearest neighbor rule (corresp.) IEEE Trans Inf Theory 14(3):515\u2013516","journal-title":"IEEE Trans Inf Theory"},{"issue":"9","key":"10294_CR27","doi-asserted-by":"crossref","first-page":"1263","DOI":"10.1109\/TKDE.2008.239","volume":"21","author":"H He","year":"2009","unstructured":"He H, Garcia EA (2009) Learning from imbalanced data. IEEE Trans Knowl Data Eng (TKDE) 21(9):1263\u20131284","journal-title":"IEEE Trans Knowl Data Eng (TKDE)"},{"key":"10294_CR28","unstructured":"He H, Bai Y, Garcia EA, Li S (2008) ADASYN: Adaptive synthetic sampling approach for imbalanced learning. In: 2008 IEEE international joint conference on neural networks (IEEE world congress on computational intelligence), IEEE, pp 1322\u20131328"},{"key":"10294_CR29","doi-asserted-by":"crossref","unstructured":"Hinton GE (1990) Connectionist learning procedures. In: Machine learning. Elsevier, pp 555\u2013610","DOI":"10.1016\/B978-0-08-051055-2.50029-8"},{"issue":"8","key":"10294_CR30","doi-asserted-by":"crossref","first-page":"832","DOI":"10.1109\/34.709601","volume":"20","author":"TK Ho","year":"1998","unstructured":"Ho TK (1998) The random subspace method for constructing decision forests. IEEE Trans Pattern Anal Mach Intell 20(8):832\u2013844","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"10294_CR31","doi-asserted-by":"crossref","unstructured":"Jing X, Wu F, Dong X, Qi F, Xu B (2015) Heterogeneous cross-company defect prediction by unified metric representation and CCA-based transfer learning. In: Proceedings of the 10th joint meeting on foundations of software engineering (FSE), pp 496\u2013507","DOI":"10.1145\/2786805.2786813"},{"issue":"6","key":"10294_CR32","doi-asserted-by":"crossref","first-page":"757","DOI":"10.1109\/TSE.2012.70","volume":"39","author":"Y Kamei","year":"2012","unstructured":"Kamei Y, Shihab E, Adams B, Hassan AE, Mockus A, Sinha A, Ubayashi N (2012) A large-scale empirical study of just-in-time quality assurance. IEEE Trans Softw Eng (TSE) 39(6):757\u2013773","journal-title":"IEEE Trans Softw Eng (TSE)"},{"issue":"5","key":"10294_CR33","doi-asserted-by":"crossref","first-page":"2072","DOI":"10.1007\/s10664-015-9400-x","volume":"21","author":"Y Kamei","year":"2016","unstructured":"Kamei Y, Fukushima T, McIntosh S, Yamashita K, Ubayashi N, Hassan AE (2016) Studying just-in-time defect prediction using cross-project models. Empir Softw Eng (EMSE) 21(5):2072\u20132106","journal-title":"Empir Softw Eng (EMSE)"},{"key":"10294_CR34","unstructured":"Kubat M, Matwin S et al (1997) Addressing the curse of imbalanced training sets: one-sided selection. In: ICML, vol 97. Citeseer, pp 179\u2013186"},{"key":"10294_CR35","doi-asserted-by":"crossref","unstructured":"Laurikkala J (2001) Improving identification of difficult small classes by balancing class distribution. In: Conference on artificial intelligence in medicine in Europe. Springer, pp 63\u201366","DOI":"10.1007\/3-540-48229-6_9"},{"issue":"2","key":"10294_CR36","doi-asserted-by":"crossref","first-page":"526","DOI":"10.1016\/j.csda.2005.10.006","volume":"51","author":"F Leisch","year":"2006","unstructured":"Leisch F (2006) A toolbox for K-centroids cluster analysis. Comput Stat Data Anal 51(2):526\u2013544","journal-title":"Comput Stat Data Anal"},{"issue":"3-4","key":"10294_CR37","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1016\/0165-1765(84)90126-5","volume":"15","author":"RI Lerman","year":"1984","unstructured":"Lerman RI, Yitzhaki S (1984) A note on the calculation and interpretation of the Gini index. Econ Lett 15(3-4):363\u2013368","journal-title":"Econ Lett"},{"key":"10294_CR38","doi-asserted-by":"crossref","unstructured":"Li K, Xiang Z, Chen T, Wang S, Tan KC (2020) Understanding the automated parameter optimization on transfer learning for cross-project defect prediction: an empirical study. In: Proceedings of the ACM\/IEEE 42nd international conference on software engineering (ICSE), pp 566\u2013577","DOI":"10.1145\/3377811.3380360"},{"key":"10294_CR39","doi-asserted-by":"crossref","unstructured":"Li Y, Ying S, Jia X, Xu Y, Zhao L, Cheng G, Wang B, Xuan J (2018) Eh-recommender: Recommending exception handling strategies based on program context. In: Proceedings of the 23rd international conference on engineering of complex computer systems (ICECCS). IEEE, pp 104\u2013114","DOI":"10.1109\/ICECCS2018.2018.00019"},{"issue":"2","key":"10294_CR40","first-page":"539","volume":"39","author":"XY Liu","year":"2008","unstructured":"Liu XY, Wu J, Zhou ZH (2008) Exploratory undersampling for class-imbalance learning. IEEE Trans Syst, Man, Cybern Part B (Cybernetics) 39 (2):539\u2013550","journal-title":"IEEE Trans Syst, Man, Cybern Part B (Cybernetics)"},{"key":"10294_CR41","doi-asserted-by":"crossref","unstructured":"Liu Z, Cao W, Gao Z, Bian J, Chen H, Chang Y, Liu TY (2020) Self-paced ensemble for highly imbalanced massive data classification. In: Proceedings of 36th IEEE international conference on data engineering (ICDE). IEEE, pp 841\u2013852","DOI":"10.1109\/ICDE48307.2020.00078"},{"issue":"1","key":"10294_CR42","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1002\/widm.8","volume":"1","author":"WY Loh","year":"2011","unstructured":"Loh WY (2011) Classification and regression trees. Wiley Interdiscip Rev Data Min Knowl Discov 1(1):14\u201323","journal-title":"Wiley Interdiscip Rev Data Min Knowl Discov"},{"key":"10294_CR43","doi-asserted-by":"crossref","unstructured":"Louppe G, Geurts P (2012) Ensembles on random patches. In: Joint European conference on machine learning and knowledge discovery in databases. Springer, pp 346\u2013361","DOI":"10.1007\/978-3-642-33460-3_28"},{"key":"10294_CR44","first-page":"546","volume":"1997","author":"R Maclin","year":"1997","unstructured":"Maclin R, Opitz D (1997) An empirical evaluation of bagging and boosting. AAAI\/IAAI 1997:546\u2013551","journal-title":"AAAI\/IAAI"},{"key":"10294_CR45","unstructured":"Mani I, Zhang I (2003). In: Proceedings of workshop on learning from imbalanced datasets, ICML United States, vol 126"},{"key":"10294_CR46","unstructured":"Mathur AP (2013) Foundations of software testing, 2\/e. Pearson Education India"},{"issue":"5","key":"10294_CR47","doi-asserted-by":"crossref","first-page":"412","DOI":"10.1109\/TSE.2017.2693980","volume":"44","author":"S McIntosh","year":"2017","unstructured":"McIntosh S, Kamei Y (2017) Are fix-inducing changes a moving target? A longitudinal case study of just-in-time defect prediction. IEEE Trans Softw Eng (TSE) 44(5):412\u2013428","journal-title":"IEEE Trans Softw Eng (TSE)"},{"key":"10294_CR48","doi-asserted-by":"crossref","unstructured":"Moreno L, Treadway JJ, Marcus A, Shen W (2014) On the use of stack traces to improve text retrieval-based bug localization. In: Proceedings of 30th IEEE international conference on software maintenance and evolution (ICSME). IEEE, pp 151\u2013160","DOI":"10.1109\/ICSME.2014.37"},{"key":"10294_CR49","doi-asserted-by":"crossref","unstructured":"Nam J, Pan SJ, Kim S (2013) Transfer defect learning. In: Proceedings of the 35th international conference on software engineering (ICSE). IEEE, pp 382\u2013391","DOI":"10.1109\/ICSE.2013.6606584"},{"issue":"3","key":"10294_CR50","doi-asserted-by":"crossref","first-page":"e1789","DOI":"10.1002\/smr.1789","volume":"29","author":"M Nayrolles","year":"2017","unstructured":"Nayrolles M, Hamou-Lhadj A, Tahar S, Larsson A (2017) A bug reproduction approach based on directed model checking and crash traces. J Softw Evol Process (JSEP) 29(3):e1789","journal-title":"J Softw Evol Process (JSEP)"},{"issue":"1","key":"10294_CR51","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1504\/IJKESDP.2011.039875","volume":"3","author":"HM Nguyen","year":"2011","unstructured":"Nguyen HM, Cooper EW, Kamei K (2011) Borderline over-sampling for imbalanced data classification. Int J Knowl Eng Soft Data Paradigms 3 (1):4\u201321","journal-title":"Int J Knowl Eng Soft Data Paradigms"},{"issue":"9","key":"10294_CR52","doi-asserted-by":"crossref","first-page":"1155","DOI":"10.1002\/spe.2346","volume":"46","author":"R Pawlak","year":"2016","unstructured":"Pawlak R, Monperrus M, Petitprez N, Noguera C, Seinturier L (2016) SPOON: A library for implementing analyses and transformations of Java source code. Softw Pract Experience 46(9):1155\u20131179","journal-title":"Softw Pract Experience"},{"issue":"3","key":"10294_CR53","first-page":"61","volume":"10","author":"J Platt","year":"1999","unstructured":"Platt J, et al. (1999) Probabilistic outputs for support vector machines and comparisons to regularized likelihood methods. Adv Large Margin Classifiers 10(3):61\u201374","journal-title":"Adv Large Margin Classifiers"},{"issue":"3","key":"10294_CR54","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3324916","volume":"28","author":"X Ren","year":"2019","unstructured":"Ren X, Xing Z, Xia X, Lo D, Wang X, Grundy J (2019) Neural network-based detection of self-admitted technical debt: From performance to explainability. ACM Trans Softw Eng Methodol (TOSEM) 28(3):1\u201345","journal-title":"ACM Trans Softw Eng Methodol (TOSEM)"},{"key":"10294_CR55","doi-asserted-by":"crossref","unstructured":"Schroter A, Schr\u00f6ter A, Bettenburg N, Premraj R (2010) Do stack traces help developers fix bugs?. In: Proceedings of 7th IEEE working conference on mining software repositories (MSR). IEEE, pp 118\u2013121","DOI":"10.1109\/MSR.2010.5463280"},{"issue":"1","key":"10294_CR56","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1109\/TSMCA.2009.2029559","volume":"40","author":"C Seiffert","year":"2009","unstructured":"Seiffert C, Khoshgoftaar TM, Van Hulse J, Napolitano A (2009) RUSBoost: A hybrid approach to alleviating class imbalance. IEEE Trans Syst Man Cybern-Part A Syst Hum 40(1):185\u2013197","journal-title":"IEEE Trans Syst Man Cybern-Part A Syst Hum"},{"issue":"11","key":"10294_CR57","first-page":"253","volume":"11","author":"GKJ Shawe-Taylor","year":"1999","unstructured":"Shawe-Taylor GKJ, Karakoulas G (1999) Optimizing classifiers for imbalanced training sets. Adv Neural Inf Process Syst 11(11):253","journal-title":"Adv Neural Inf Process Syst"},{"issue":"2","key":"10294_CR58","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1007\/s10994-013-5422-z","volume":"95","author":"MR Smith","year":"2014","unstructured":"Smith MR, Martinez T, Giraud-Carrier C (2014) An instance level analysis of data complexity. Mach Learn 95(2):225\u2013256","journal-title":"Mach Learn"},{"key":"10294_CR59","doi-asserted-by":"crossref","unstructured":"Soltani M, Panichella A, Van Deursen A (2017) A guided genetic algorithm for automated crash reproduction. In: Proceedings of 39th IEEE\/ACM international conference on software engineering (ICSE). IEEE, pp 209\u2013220","DOI":"10.1109\/ICSE.2017.27"},{"issue":"1","key":"10294_CR60","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1007\/s10664-019-09762-1","volume":"25","author":"M Soltani","year":"2020","unstructured":"Soltani M, Derakhshanfar P, Devroey X, Van Deursen A (2020) A benchmark-based evaluation of search-based crash reproduction. Empir Softw Eng (EMSE) 25(1):96\u2013138","journal-title":"Empir Softw Eng (EMSE)"},{"issue":"12","key":"10294_CR61","doi-asserted-by":"crossref","first-page":"1253","DOI":"10.1109\/TSE.2018.2836442","volume":"45","author":"Q Song","year":"2018","unstructured":"Song Q, Guo Y, Shepperd M (2018) A comprehensive investigation of the role of imbalanced learning for software defect prediction. IEEE Trans Softw Eng (TSE) 45(12):1253\u20131269","journal-title":"IEEE Trans Softw Eng (TSE)"},{"key":"10294_CR62","doi-asserted-by":"crossref","unstructured":"Tan M, Tan L, Dara S, Mayeux C (2015) Online defect prediction for imbalanced data. In: Proceedings of 37th IEEE international conference on software engineering (ICSE), vol 2. IEEE, pp 99\u2013108","DOI":"10.1109\/ICSE.2015.139"},{"issue":"1","key":"10294_CR63","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TSE.2016.2584050","volume":"43","author":"C Tantithamthavorn","year":"2016","unstructured":"Tantithamthavorn C, McIntosh S, Hassan AE, Matsumoto K (2016) An empirical comparison of model validation techniques for defect prediction models. IEEE Trans Softw Eng (TSE) 43(1):1\u201318","journal-title":"IEEE Trans Softw Eng (TSE)"},{"issue":"11","key":"10294_CR64","doi-asserted-by":"crossref","first-page":"1200","DOI":"10.1109\/TSE.2018.2876537","volume":"46","author":"C Tantithamthavorn","year":"2018","unstructured":"Tantithamthavorn C, Hassan AE, Matsumoto K (2018) The impact of class rebalancing techniques on the performance and interpretation of defect prediction models. IEEE Trans Softw Eng (TSE) 46(11):1200\u20131219","journal-title":"IEEE Trans Softw Eng (TSE)"},{"key":"10294_CR65","unstructured":"Tomek I, et al. (1976a) An experiment with the edited nearest-neighbor rule"},{"key":"10294_CR66","unstructured":"Tomek I, et al. (1976b) Two modifications of CNN"},{"key":"10294_CR67","unstructured":"Viola P, Jones M (2001) Fast and robust classification using asymmetric adaboost and a detector cascade. Adv Neural Inf Process Syst 14"},{"key":"10294_CR68","doi-asserted-by":"crossref","unstructured":"Wang S, Yao X (2009) Diversity analysis on imbalanced data sets by using ensemble models. In: 2009 IEEE symposium on computational intelligence and data mining. IEEE, pp 324\u2013331","DOI":"10.1109\/CIDM.2009.4938667"},{"issue":"2","key":"10294_CR69","doi-asserted-by":"crossref","first-page":"434","DOI":"10.1109\/TR.2013.2259203","volume":"62","author":"S Wang","year":"2013","unstructured":"Wang S, Yao X (2013) Using class imbalance learning for software defect prediction. IEEE Trans Reliab 62(2):434\u2013443","journal-title":"IEEE Trans Reliab"},{"key":"10294_CR70","doi-asserted-by":"crossref","unstructured":"Wang X, Liu J, Li L, Chen X, Liu X, Wu H (2020) Detecting and explaining self-admitted technical debts with attention-based neural networks. In: Proceedings of the 35th IEEE\/ACM international conference on automated software engineering (ASE), pp 871\u2013882","DOI":"10.1145\/3324884.3416583"},{"key":"10294_CR71","doi-asserted-by":"crossref","unstructured":"Wilson DL (1972) Asymptotic properties of nearest neighbor rules using edited data. IEEE Trans Syst Man Cybern (3):408\u2013421","DOI":"10.1109\/TSMC.1972.4309137"},{"key":"10294_CR72","doi-asserted-by":"crossref","unstructured":"Wong CP, Xiong Y, Zhang H, Hao D, Zhang L, Mei H (2014) Boosting bug-report-oriented fault localization with segmentation and stack-trace analysis. In: Proceedings of 30th IEEE international conference on software maintenance and evolution (ICSME). IEEE, pp 181\u2013190","DOI":"10.1109\/ICSME.2014.40"},{"key":"10294_CR73","doi-asserted-by":"crossref","unstructured":"Wu R, Zhang H, Cheung SC, Kim S (2014) Crashlocator: Locating crashing faults based on crash stacks. In: Proceedings of the 23th international symposium on software testing and analysis (ISSTA), pp 204\u2013214","DOI":"10.1145\/2610384.2610386"},{"issue":"5","key":"10294_CR74","doi-asserted-by":"crossref","first-page":"2866","DOI":"10.1007\/s10664-017-9567-4","volume":"23","author":"R Wu","year":"2018","unstructured":"Wu R, Wen M, Cheung SC, Zhang H (2018) Changelocator: locate crash-inducing changes based on crash reports. Empir Softw Eng (EMSE) 23(5):2866\u20132900","journal-title":"Empir Softw Eng (EMSE)"},{"key":"10294_CR75","doi-asserted-by":"crossref","first-page":"110402","DOI":"10.1016\/j.jss.2019.110402","volume":"158","author":"Z Xu","year":"2019","unstructured":"Xu Z, Li S, Xu J, Liu J, Luo X, Zhang Y, Zhang T, Keung J, Tang Y (2019a) LDFR: Learning deep feature representation for software defect prediction. J Syst Softw (JSS) 158:110402","journal-title":"J Syst Softw (JSS)"},{"key":"10294_CR76","doi-asserted-by":"crossref","unstructured":"Xu Z, Zhang T, Zhang Y, Tang Y, Liu J, Luo X, Keung J, Cui X (2019b) Identifying crashing fault residence based on cross project model. In: Proceedings of 30th IEEE international symposium on software reliability engineering (ISSRE). IEEE, pp 183\u2013194","DOI":"10.1109\/ISSRE.2019.00027"},{"key":"10294_CR77","doi-asserted-by":"crossref","first-page":"110763","DOI":"10.1016\/j.jss.2020.110763","volume":"170","author":"Z Xu","year":"2020","unstructured":"Xu Z, Zhao K, Yan M, Yuan P, Xu L, Lei Y, Zhang X (2020) Imbalanced metric learning for crashing fault residence prediction. J Syst Softw (JSS) 170:110763","journal-title":"J Syst Softw (JSS)"},{"issue":"1","key":"10294_CR78","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1109\/TR.2021.3066170","volume":"71","author":"Z Xu","year":"2021","unstructured":"Xu Z, Zhao K, Zhang T, Fu C, Yan M, Xie Z, Zhang X, Catolino G (2021) Effort-aware just-in-time bug prediction for mobile apps via cross-triplet deep feature embedding. IEEE Trans Reliab 71(1):204\u2013220","journal-title":"IEEE Trans Reliab"},{"key":"10294_CR79","doi-asserted-by":"crossref","unstructured":"Xuan J, Xie X, Monperrus M (2015) Crash reproduction via test case mutation: Let existing test cases help. In: Proceedings of the 10th joint meeting on foundations of software engineering, pp 910\u2013913","DOI":"10.1145\/2786805.2803206"},{"issue":"1-2","key":"10294_CR80","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/s10994-010-5221-8","volume":"85","author":"HF Yu","year":"2011","unstructured":"Yu HF, Huang FL, Lin CJ (2011) Dual coordinate descent methods for logistic regression and maximum entropy models. Mach Learn 85(1-2):41\u201375","journal-title":"Mach Learn"},{"key":"10294_CR81","doi-asserted-by":"crossref","unstructured":"Zhao K, Liu J, Xu Z, Li L, Yan M, Yu J, Zhou Y (2021a) Predicting crash fault residence via simplified deep forest based on a reduced feature set. In: Proceedings of 29th IEEE\/ACM international conference on program comprehension (ICPC). IEEE, pp 242\u2013252","DOI":"10.1109\/ICPC52881.2021.00031"},{"key":"10294_CR82","doi-asserted-by":"crossref","unstructured":"Zhao K, Xu Z, Yan M, Zhang T, Yang D, Li W (2021b) A comprehensive investigation of the impact of feature selection techniques on crashing fault residence prediction models. Information and Software Technology (IST) p 106652","DOI":"10.1016\/j.infsof.2021.106652"},{"issue":"2","key":"10294_CR83","doi-asserted-by":"crossref","first-page":"848","DOI":"10.1109\/TR.2021.3060937","volume":"70","author":"K Zhao","year":"2021","unstructured":"Zhao K, Xu Z, Zhang T, Tang Y, Yan M (2021c) Simplified deep forest model based just-in-time defect prediction for android mobile apps. IEEE Trans Reliab 70(2):848\u2013859","journal-title":"IEEE Trans Reliab"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-023-10294-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-023-10294-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-023-10294-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,18]],"date-time":"2023-04-18T10:26:04Z","timestamp":1681813564000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-023-10294-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,22]]},"references-count":83,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,3]]}},"alternative-id":["10294"],"URL":"https:\/\/doi.org\/10.1007\/s10664-023-10294-y","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,2,22]]},"assertion":[{"value":"16 January 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 February 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}],"article-number":"49"}}