{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T16:55:01Z","timestamp":1774803301626,"version":"3.50.1"},"reference-count":82,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,2,16]],"date-time":"2024-02-16T00:00:00Z","timestamp":1708041600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,2,16]],"date-time":"2024-02-16T00:00:00Z","timestamp":1708041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272072"],"award-info":[{"award-number":["62272072"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872445"],"award-info":[{"award-number":["61872445"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1007\/s10664-023-10413-9","type":"journal-article","created":{"date-parts":[[2024,2,16]],"date-time":"2024-02-16T09:03:25Z","timestamp":1708074205000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Demystifying API misuses in deep learning applications"],"prefix":"10.1007","volume":"29","author":[{"given":"Deheng","family":"Yang","sequence":"first","affiliation":[]},{"given":"Kui","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4504-6806","authenticated-orcid":false,"given":"Yan","family":"Lei","sequence":"additional","affiliation":[]},{"given":"Li","family":"Li","sequence":"additional","affiliation":[]},{"given":"Huan","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Chunyan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zhenyu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xiaoguang","family":"Mao","sequence":"additional","affiliation":[]},{"given":"Tegawend\u00e9 F.","family":"Bissyand\u00e9","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,16]]},"reference":[{"key":"10413_CR1","unstructured":"A curated list of static analysis (sast) tools for all programming languages. https:\/\/github.com\/analysis-tools-dev\/static-analysis#python. Accessed June 2021"},{"key":"10413_CR2","unstructured":"Abadi M, Barham P, Chen J, Chen Z, Davis A, Dean J, Devin M, Ghemawat S, Irving G, Isard M, et\u00a0al (2016) Tensorflow: a system for large-scale machine learning. In 12th $$\\{$$USENIX$$\\}$$ symposium on operating systems design and implementation ($$\\{$$OSDI$$\\}$$ 16), p 265\u2013283"},{"key":"10413_CR3","unstructured":"Al-Rfou R, Alain G, Almahairi A, Angermueller C, Bahdanau D, Ballas N, Bastien F, Bayer J, Belikov A, The Theano\u00a0Development Team et\u00a0al (2016)Theano: a python framework for fast computation of mathematical expressions. arXiv:1605.02688"},{"issue":"12","key":"10413_CR4","doi-asserted-by":"publisher","first-page":"1170","DOI":"10.1109\/TSE.2018.2827384","volume":"45","author":"S Amann","year":"2018","unstructured":"Amann S, Nguyen HA, Nadi S, Nguyen TN, Mezini M (2018) A systematic evaluation of static api-misuse detectors. IEEE Trans Softw Eng 45(12):1170\u20131188","journal-title":"IEEE Trans Softw Eng"},{"key":"10413_CR5","doi-asserted-by":"crossref","unstructured":"Amann S, Nadi S, Nguyen HA, Nguyen TN, Mezini M (2016) Mubench: a benchmark for api-misuse detectors. In Proceedings of the 13th international conference on mining software repositories, pp 464\u2013467","DOI":"10.1145\/2901739.2903506"},{"key":"10413_CR6","unstructured":"Amann S, Nguyen HA, Nadi S, Nguyen TN, Mezini M (2019) Investigating next steps in static api-misuse detection. In 2019 IEEE\/ACM 16th international conference on mining software repositories (MSR), pp 265\u2013275. IEEE"},{"key":"10413_CR7","unstructured":"Artifact page of our study (2023). https:\/\/github.com\/DehengYang\/MisuAPI"},{"key":"10413_CR8","unstructured":"Bonifacio R, Kr\u00fcger S, Narasimhan K, Bodden E, Mezini M (2021) Dealing with variability in api misuse specification. arXiv:2105.04950"},{"key":"10413_CR9","doi-asserted-by":"crossref","unstructured":"Cambronero J, Li H, Kim S, Sen K, Chandra S (2019) When deep learning met code search. In Proceedings of the 2019 27th ACM joint meeting on European software engineering conference and symposium on the foundations of software engineering, pp 964\u2013974","DOI":"10.1145\/3338906.3340458"},{"key":"10413_CR10","doi-asserted-by":"crossref","unstructured":"Cao J, Li M, Chen X, Wen M, Tian Y, Wu B, Cheung S-C (2022) Deepfd: automated fault diagnosis and localization for deep learning programs. In: Proceedings of the 44th international conference on software engineering, pp 573\u2013585","DOI":"10.1145\/3510003.3510099"},{"key":"10413_CR11","doi-asserted-by":"crossref","unstructured":"Casalnuovo C, Suchak Y, Ray B, Rubio-Gonz\u00e1lez C (2017) Gitcproc: a tool for processing and classifying github commits. In: Proceedings of the 26th ACM SIGSOFT international symposium on software testing and analysis, pp 396\u2013399","DOI":"10.1145\/3092703.3098230"},{"key":"10413_CR12","unstructured":"CEO Nvidia (2023) Software is eating the world, but AI is going to eat software. T. Simonite"},{"key":"10413_CR13","doi-asserted-by":"crossref","unstructured":"Chen Z, Yao H, Lou Y, Cao Y, Liu Y, Wang H, Liu X (2021) An empirical study on deployment faults of deep learning based mobile applications. In: 2021 IEEE\/ACM 43rd international conference on software engineering (ICSE), pp 674\u2013685. IEEE","DOI":"10.1109\/ICSE43902.2021.00068"},{"key":"10413_CR14","doi-asserted-by":"crossref","unstructured":"Dilhara M, Ketkar A, Dig D (2021) Understanding software-2.0: a study of machine learning library usage and evolution. ACM Trans Soft Eng Methodol (TOSEM) 30(4):1\u201342","DOI":"10.1145\/3453478"},{"key":"10413_CR15","doi-asserted-by":"crossref","unstructured":"Eghbali A, Pradel M (2020) No strings attached: an empirical study of string-related software bugs. In: 2020 35th IEEE\/ACM international conference on automated software engineering (ASE), pp 956\u2013967. IEEE","DOI":"10.1145\/3324884.3416576"},{"key":"10413_CR16","unstructured":"Example of a missing api with missing exception handling. https:\/\/github.com\/tensorpack\/tensorpack\/commit\/132dcccd34a831a01e4fcdbd32f869b36f04537e. Accessed June 2021"},{"key":"10413_CR17","unstructured":"Example of a misused api with incorrect api call sequence. https:\/\/github.com\/deezer\/spleeter\/commit\/55723cfa6296388ea1f584e2591f1d89e4c0afb6. Accessed June 2021"},{"key":"10413_CR18","unstructured":"Example of a misused api with missing api call. https:\/\/github.com\/tensorflow\/models\/commit\/001a260214ba34f36e149bbd24f7f5d6a6634500. Accessed June 2021"},{"key":"10413_CR19","unstructured":"Example of a misused api with missing condition. https:\/\/github.com\/tensorpack\/tensorpack\/commit\/ae84b52ad5402ab1716e0f1e9790ce1da9d706d1. Accessed June 2021"},{"key":"10413_CR20","unstructured":"Example of a misused dl library api depending on the specific device. https:\/\/github.com\/google\/prettytensor\/commit\/01ee67d6e0cc5e9d6ae5f07045024a638564fe78. Accessed June 2021"},{"key":"10413_CR21","unstructured":"Example of an incorrect parameter value. https:\/\/github.com\/google\/tf-quant-finance\/commit\/258844720a9bccd326c7b33735f7f81c2d483630. Accessed June 2021"},{"key":"10413_CR22","doi-asserted-by":"crossref","unstructured":"Falleri J-R, Morandat F, Blanc X, Martinez M, Monperrus M (2014) Fine-grained and accurate source code differencing. In: Proceedings of the 29th ACM\/IEEE international conference on automated software engineering, pp 313\u2013324","DOI":"10.1145\/2642937.2642982"},{"key":"10413_CR23","doi-asserted-by":"crossref","unstructured":"Forward A, Lethbridge TC (2008) A taxonomy of software types to facilitate search and evidence-based software engineering. In: Proceedings of the 2008 conference of the center for advanced studies on collaborative research: meeting of minds, pp 179\u2013191","DOI":"10.1145\/1463788.1463807"},{"key":"10413_CR24","unstructured":"Github api. https:\/\/docs.github.com\/en\/rest\/reference\/search. Accessed June 2021"},{"key":"10413_CR25","unstructured":"Gulli A, Pal S (2017) Deep learning with Keras. Packt Publishing Ltd"},{"key":"10413_CR26","doi-asserted-by":"crossref","unstructured":"Gu Z, Wu J, Liu J, Zhou M, Gu M (2019) An empirical study on api-misuse bugs in open-source c programs. In: 2019 IEEE 43rd annual computer software and applications conference (COMPSAC), vol\u00a01, pp 11\u201320. IEEE","DOI":"10.1109\/COMPSAC.2019.00012"},{"key":"10413_CR27","doi-asserted-by":"crossref","unstructured":"Humbatova N, Jahangirova G, Bavota G, Riccio V, Stocco A, Tonella P (2020) Taxonomy of real faults in deep learning systems. In: Proceedings of the ACM\/IEEE 42nd international conference on software engineering, pp 1110\u20131121","DOI":"10.1145\/3377811.3380395"},{"key":"10413_CR28","unstructured":"Institute of\u00a0Electrical and Electronics Engineers (1987) IEEE Standard Taxonomy for Software Engineering Standards"},{"key":"10413_CR29","unstructured":"Islam MdJ (2020) Towards understanding the challenges faced by machine learning software developers and enabling automated solutions"},{"key":"10413_CR30","unstructured":"Islam MdJ, Nguyen HA, Pan R, Rajan H (2019) What do developers ask about ml libraries? a large-scale study using stack overflow. arXiv:1906.11940"},{"key":"10413_CR31","doi-asserted-by":"crossref","unstructured":"Islam MdJ, Nguyen G, Pan R, Rajan H (2019) A comprehensive study on deep learning bug characteristics. In: Proceedings of the 2019 27th ACM joint meeting on european software engineering conference and symposium on the foundations of software engineering, pp 510\u2013520","DOI":"10.1145\/3338906.3338955"},{"key":"10413_CR32","doi-asserted-by":"crossref","unstructured":"Islam MdJ, Pan R, Nguyen G, Rajan H (2020) Repairing deep neural networks: fix patterns and challenges. In: 2020 IEEE\/ACM 42nd international conference on software engineering (ICSE), pp 1135\u20131146. IEEE","DOI":"10.1145\/3377811.3380378"},{"key":"10413_CR33","doi-asserted-by":"crossref","unstructured":"Jia Y, Shelhamer E, Donahue J, Karayev S, Long J, Girshick R, Guadarrama S, Darrell T (2014) Caffe: convolutional architecture for fast feature embedding. In: Proceedings of the 22nd ACM international conference on multimedia, pp 675\u2013678","DOI":"10.1145\/2647868.2654889"},{"key":"10413_CR34","doi-asserted-by":"crossref","unstructured":"Just R, Jalali D, Ernst MD (2014) Defects4j: a database of existing faults to enable controlled testing studies for java programs. In: Proceedings of the 2014 international symposium on software testing and analysis, pp 437\u2013440","DOI":"10.1145\/2610384.2628055"},{"key":"10413_CR35","doi-asserted-by":"crossref","unstructured":"Kechagia M, Devroey X, Panichella A, Gousios G, van Deursen A (2019) Effective and efficient api misuse detection via exception propagation and search-based testing. In: Proceedings of the 28th ACM SIGSOFT international symposium on software testing and analysis, pp 192\u2013203","DOI":"10.1145\/3293882.3330552"},{"key":"10413_CR36","doi-asserted-by":"crossref","unstructured":"Kechagia M, Mechtaev S, Sarro F, Harman M (2021) Evaluating automatic program repair capabilities to repair api misuses. IEEE Trans Softw Eng","DOI":"10.1109\/TSE.2021.3067156"},{"issue":"2","key":"10413_CR37","doi-asserted-by":"publisher","first-page":"712","DOI":"10.1109\/TITS.2019.2962338","volume":"22","author":"S Kuutti","year":"2020","unstructured":"Kuutti S, Bowden R, Jin Y, Barber P, Fallah S (2020) A survey of deep learning applications to autonomous vehicle control. IEEE Trans Intell Trans Syst 22(2):712\u2013733","journal-title":"IEEE Trans Intell Trans Syst"},{"key":"10413_CR38","unstructured":"Kwasnik BH (1999) The role of classification in knowledge representation and discovery"},{"issue":"8","key":"10413_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3470133","volume":"54","author":"M Lamothe","year":"2021","unstructured":"Lamothe M, Gu\u00e9h\u00e9neuc Y-G, Shang W (2021) A systematic review of api evolution literature. ACM Comput Surv (CSUR) 54(8):1\u201336","journal-title":"ACM Comput Surv (CSUR)"},{"key":"10413_CR40","doi-asserted-by":"crossref","unstructured":"Lamothe M, Li H, Shang W (2021) Assisting example-based api misuse detection via complementary artificial examples. IEEE Trans Softw Eng","DOI":"10.1109\/TSE.2021.3093246"},{"key":"10413_CR41","doi-asserted-by":"crossref","unstructured":"Landis JR, Koch GG (1977) The measurement of observer agreement for categorical data. Biometrics, pp 159\u2013174","DOI":"10.2307\/2529310"},{"key":"10413_CR42","doi-asserted-by":"crossref","unstructured":"Li X, Jiang J, Benton S, Xiong Y, Zhang L (2021) A large-scale study on api misuses in the wild. In: 2021 14th IEEE conference on software testing, verification and validation (ICST), pp 241\u2013252. IEEE","DOI":"10.1109\/ICST49551.2021.00034"},{"issue":"10210","key":"10413_CR43","doi-asserted-by":"publisher","first-page":"1709","DOI":"10.1016\/S0140-6736(19)32501-2","volume":"394","author":"Y Liu","year":"2019","unstructured":"Liu Y, Liu G, Zhang Q (2019) Deep learning and medical diagnosis. Lancet 394(10210):1709\u20131710","journal-title":"Lancet"},{"key":"10413_CR44","doi-asserted-by":"crossref","unstructured":"Liu K, Kim D, Koyuncu A, Li L, Bissyand\u00e9 TF, Le\u00a0Traon Y (2018) A closer look at real-world patches. In 2018 IEEE International Conference on Software Maintenance and Evolution (ICSME), p 275\u2013286. IEEE","DOI":"10.1109\/ICSME.2018.00037"},{"key":"10413_CR45","unstructured":"Mama R (2021) Example of a misused api with incorrect parameter. https:\/\/github.com\/Rayhane-mamah\/Tacotron-2\/commit\/0ae2901b428afd4127272154b71705e2799a484d. Accessed June 2021"},{"key":"10413_CR46","unstructured":"Mamah R (2023) The example of inner api misuse in dl application. https:\/\/github.com\/Rayhane-mamah\/Tacotron-2\/commit\/fb5564b7584ae0dc62ffecaa89d463ff24a3c251. Accessed Aug 2023"},{"issue":"3","key":"10413_CR47","doi-asserted-by":"publisher","first-page":"276","DOI":"10.11613\/BM.2012.031","volume":"22","author":"ML McHugh","year":"2012","unstructured":"McHugh ML (2012) Interrater reliability: the kappa statistic. Biochem Med 22(3):276\u2013282","journal-title":"Biochem Med"},{"key":"10413_CR48","doi-asserted-by":"crossref","unstructured":"Meijer E (2018) Behind every great deep learning framework is an even greater programming languages concept (keynote). In: Proceedings of the 2018 26th ACM joint meeting on European software engineering conference and symposium on the foundations of software engineering, pp 1\u20131","DOI":"10.1145\/3236024.3280855"},{"key":"10413_CR49","unstructured":"mypy. https:\/\/github.com\/python\/mypy. Accessed June 2021"},{"key":"10413_CR50","doi-asserted-by":"crossref","unstructured":"Nielebock S, Heum\u00fcller R, Schott KM, Ortmeier F (2020) Guided pattern mining for api misuse detection by change-based code analysis. arXiv:2008.00277","DOI":"10.1007\/s10515-021-00294-x"},{"key":"10413_CR51","unstructured":"Paszke A, Gross S, Chintala S, Chanan G, Yang E, DeVito Z, Lin Z, Desmaison A, Antiga L, Lerer A (2017) Automatic differentiation in pytorch"},{"key":"10413_CR52","unstructured":"pylint. https:\/\/github.com\/PyCQA\/pylint. Accessed June 2021"},{"key":"10413_CR53","unstructured":"pyre-check. https:\/\/github.com\/facebook\/pyre-check. Accessed June 2021"},{"key":"10413_CR54","unstructured":"pyright. https:\/\/github.com\/microsoft\/pyright\/. Accessed June 2021"},{"key":"10413_CR55","unstructured":"Python standard library. https:\/\/docs.python.org\/3\/library\/. Accessed June 2021"},{"key":"10413_CR56","doi-asserted-by":"crossref","unstructured":"Ren X, Ye X, Xing Z, Xia X, Xu X, Zhu L, Sun J (2020) Api-misuse detection driven by fine-grained api-constraint knowledge graph. In: 2020 35th IEEE\/ACM international conference on automated software engineering (ASE), pp 461\u2013472. IEEE","DOI":"10.1145\/3324884.3416551"},{"key":"10413_CR57","doi-asserted-by":"crossref","unstructured":"Scalabrino S, Bavota G, Linares-V\u00e1squez M, Lanza M, Oliveto R (2019) Data-driven solutions to detect api compatibility issues in android: an empirical study. In: 2019 IEEE\/ACM 16th international conference on mining software repositories (MSR), pp 288\u2013298. IEEE","DOI":"10.1109\/MSR.2019.00055"},{"key":"10413_CR58","doi-asserted-by":"crossref","unstructured":"Shen Q, Ma H, Chen J, Tian Y, Cheung S-C, Chen X (2021) A comprehensive study of deep learning compiler bugs. In: Proceedings of the 29th ACM joint meeting on European software engineering conference and symposium on the foundations of software engineering, pp 968\u2013980","DOI":"10.1145\/3468264.3468591"},{"issue":"1","key":"10413_CR59","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/s10664-012-9217-9","volume":"19","author":"D \u0160mite","year":"2014","unstructured":"\u0160mite D, Wohlin C, Galvi\u0146a Z, Prikladnicki R (2014) An empirically based terminology and taxonomy for global software engineering. Empir Softw Eng 19(1):105\u2013153","journal-title":"Empir Softw Eng"},{"key":"10413_CR60","doi-asserted-by":"crossref","unstructured":"Svyatkovskiy A, Deng SK, Fu S, Sundaresan N (2020) Intellicode compose: code generation using transformer. In: Proceedings of the 28th ACM joint meeting on European software engineering conference and symposium on the foundations of software engineering, pp 1433\u20131443","DOI":"10.1145\/3368089.3417058"},{"key":"10413_CR61","unstructured":"Tensorflow repositories in githubs. https:\/\/github.com\/search?q=tensorflow &type=. Accessed June 2021"},{"key":"10413_CR62","unstructured":"The manual verification results for api bugs provided by Islam et\u00a0al. https:\/\/zenodo.org\/record\/8302351. Accessed Aug 2023"},{"issue":"2","key":"10413_CR63","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2523088","volume":"23","author":"M Unterkalmsteiner","year":"2014","unstructured":"Unterkalmsteiner M, Feldt R, Gorschek T (2014) A taxonomy for requirements engineering and software test alignment. ACM Trans Softw Engi Methodol (TOSEM) 23(2):1\u201338","journal-title":"ACM Trans Softw Engi Methodol (TOSEM)"},{"key":"10413_CR64","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.infsof.2017.01.006","volume":"85","author":"M Usman","year":"2017","unstructured":"Usman M, Britto R, B\u00f6rstler J, Mendes E (2017) Taxonomies in software engineering: a systematic mapping study and a revised taxonomy development method. Inf Softw Technol 85:43\u201359","journal-title":"Inf Softw Technol"},{"key":"10413_CR65","doi-asserted-by":"crossref","unstructured":"Usman M, Gopinath D, Sun Y, Noller Y, P\u0103s\u0103reanu CS (2021) Nn repair: constraint-based repair of neural network classifiers. In: Computer aided verification: 33rd international conference, CAV 2021, Virtual Event, July 20\u201323, 2021, Proceedings, Part I 33, pp 3\u201325. Springer","DOI":"10.1007\/978-3-030-81685-8_1"},{"key":"10413_CR66","doi-asserted-by":"crossref","unstructured":"V\u00e9lez TC, Khatchadourian R, Bagherzadeh M, Raja A (2022) Challenges in migrating imperative deep learning programs to graph execution: an empirical study. In: Proceedings of the 19th international conference on mining software repositories, pp 469\u2013481","DOI":"10.1145\/3524842.3528455"},{"key":"10413_CR67","doi-asserted-by":"crossref","unstructured":"Wan C, Liu S, Hoffmann H, Maire M, Lu S (2021) Are machine learning cloud apis used correctly? In: 2021 IEEE\/ACM 43rd international conference on software engineering (ICSE), pp 125\u2013137. IEEE","DOI":"10.1109\/ICSE43902.2021.00024"},{"key":"10413_CR68","doi-asserted-by":"crossref","unstructured":"Wardat M, Cruz BD, Le W, Rajan H (2022) Deepdiagnosis: automatically diagnosing faults and recommending actionable fixes in deep learning programs. In: Proceedings of the 44th international conference on software engineering, pp 561\u2013572","DOI":"10.1145\/3510003.3510071"},{"key":"10413_CR69","doi-asserted-by":"crossref","unstructured":"Wardat M, Le W, Rajan H (2021) Deeplocalize: fault localization for deep neural networks. In 2021 IEEE\/ACM 43rd international conference on software engineering (ICSE), p 251\u2013262. IEEE","DOI":"10.1109\/ICSE43902.2021.00034"},{"key":"10413_CR70","doi-asserted-by":"crossref","unstructured":"Wen M, Liu Y, Wu R, Xie X, Cheung S-C, Su Z (2019) Exposing library api misuses via mutation analysis. In: 2019 IEEE\/ACM 41st international conference on software engineering (ICSE), pp 866\u2013877. IEEE","DOI":"10.1109\/ICSE.2019.00093"},{"key":"10413_CR71","doi-asserted-by":"crossref","unstructured":"Wohlin C, Runeson P, H\u00f6st M, Ohlsson MC, Regnell B, Wessl\u00e9n A (2012) Experimentation in software engineering. Springer Science & Business Media","DOI":"10.1007\/978-3-642-29044-2"},{"key":"10413_CR72","doi-asserted-by":"crossref","unstructured":"Wu D, Shen B, Chen Y (2021) An empirical study on tensor shape faults in deep learning systems. arXiv:2106.02887","DOI":"10.1109\/ISSRE52982.2021.00014"},{"key":"10413_CR73","doi-asserted-by":"crossref","unstructured":"Yan M, Chen J, Zhang X, Tan L, Wang G, Wang Z (2021) Exposing numerical bugs in deep learning via gradient back-propagation. In: Proceedings of the 29th ACM joint meeting on European software engineering conference and symposium on the foundations of software engineering, pp 627\u2013638","DOI":"10.1145\/3468264.3468612"},{"key":"10413_CR74","unstructured":"Yang Y, Xia X, Lo D, Grundy J (2020) A survey on deep learning for software engineering. arXiv:2011.14597"},{"issue":"4","key":"10413_CR75","doi-asserted-by":"publisher","first-page":"1401","DOI":"10.1109\/TR.2021.3096332","volume":"71","author":"B Yu","year":"2021","unstructured":"Yu B, Qi H, Guo Q, Juefei-Xu F, Xie X, Ma L, Zhao J (2021) Deeprepair: style-guided repairing for deep neural networks in the real-world operational environment. IEEE Trans Reliab 71(4):1401\u20131416","journal-title":"IEEE Trans Reliab"},{"key":"10413_CR76","doi-asserted-by":"crossref","unstructured":"Zar JH (2005) Spearman rank correlation. Encyclopedia of Biostatistics, 7","DOI":"10.1002\/0470011815.b2a15150"},{"key":"10413_CR77","doi-asserted-by":"crossref","unstructured":"Zhang Y, Chen Y, Cheung S-C, Xiong Y, Zhang L (2018) An empirical study on tensorflow program bugs. In: Proceedings of the 27th ACM SIGSOFT international symposium on software testing and analysis, pp 129\u2013140","DOI":"10.1145\/3213846.3213866"},{"key":"10413_CR78","doi-asserted-by":"crossref","unstructured":"Zhang T, Gao C, Ma L, Lyu M, Kim M (2019) An empirical study of common challenges in developing deep learning applications. In: 2019 IEEE 30th international symposium on software reliability engineering (ISSRE), pp 104\u2013115. IEEE","DOI":"10.1109\/ISSRE.2019.00020"},{"key":"10413_CR79","doi-asserted-by":"crossref","unstructured":"Zhang T, Upadhyaya G, Reinhardt A, Rajan H, Kim M (2018) Are code examples on an online q &a forum reliable? a study of api misuse on stack overflow. In: Proceedings of the 40th international conference on software engineering, pp 886\u2013896","DOI":"10.1145\/3180155.3180260"},{"key":"10413_CR80","unstructured":"Zhang T, Upadhyaya G, Reinhardt A, Rajan H, Kim M (2018) Are online code examples reliable? an empirical study of api misuse on stack overflow. In: International conference on software engineering (ICSE), vol\u00a010"},{"key":"10413_CR81","doi-asserted-by":"crossref","unstructured":"Zhang R, Xiao W, Zhang H, Liu Y, Lin H, Yang M (2020) An empirical study on program failures of deep learning jobs. In: Proceedings of the ACM\/IEEE 42nd international conference on software engineering, pp 1159\u20131170","DOI":"10.1145\/3377811.3380362"},{"key":"10413_CR82","doi-asserted-by":"crossref","unstructured":"Zhong H, Su Z (2015) An empirical study on real bug fixes. In: 2015 IEEE\/ACM 37th IEEE international conference on software engineering, vol\u00a01, pp 913\u2013923. IEEE","DOI":"10.1109\/ICSE.2015.101"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-023-10413-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-023-10413-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-023-10413-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,23]],"date-time":"2024-03-23T02:22:25Z","timestamp":1711160545000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-023-10413-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,16]]},"references-count":82,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,3]]}},"alternative-id":["10413"],"URL":"https:\/\/doi.org\/10.1007\/s10664-023-10413-9","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2,16]]},"assertion":[{"value":"18 October 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 February 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interests\/Competing interests"}},{"value":"No ethics approval was required for this paper.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}}],"article-number":"45"}}