{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T06:16:28Z","timestamp":1770531388946,"version":"3.49.0"},"reference-count":79,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,6,4]],"date-time":"2024-06-04T00:00:00Z","timestamp":1717459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,6,4]],"date-time":"2024-06-04T00:00:00Z","timestamp":1717459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1007\/s10664-024-10495-z","type":"journal-article","created":{"date-parts":[[2024,6,4]],"date-time":"2024-06-04T07:05:31Z","timestamp":1717484731000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Cross-project defect prediction via semantic and syntactic encoding"],"prefix":"10.1007","volume":"29","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1969-807X","authenticated-orcid":false,"given":"Siyu","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Yuwen","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zhenhang","family":"He","sequence":"additional","affiliation":[]},{"given":"Yunpeng","family":"Shang","sequence":"additional","affiliation":[]},{"given":"Le","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,4]]},"reference":[{"key":"10495_CR1","unstructured":"Alon U, Brody S, Levy O, Yahav E (2018a) code2seq: Generating sequences from structured representations of code. arXiv:1808.01400"},{"issue":"4","key":"10495_CR2","doi-asserted-by":"crossref","first-page":"404","DOI":"10.1145\/3296979.3192412","volume":"53","author":"U Alon","year":"2018","unstructured":"Alon U, Zilberstein M, Levy O, Yahav E (2018) A general path-based representation for predicting program properties. ACM SIGPLAN Notices 53(4):404\u2013419","journal-title":"ACM SIGPLAN Notices"},{"key":"10495_CR3","doi-asserted-by":"crossref","unstructured":"Amasaki S, Takagi Y, Mizuno O, Kikuno T (2003) A bayesian belief network for assessing the likelihood of fault content. In: 14th International symposium on software reliability engineering, 2003. ISSRE 2003., IEEE, pp 215\u2013226","DOI":"10.1109\/ISSRE.2003.1251044"},{"issue":"2","key":"10495_CR4","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1109\/72.279181","volume":"5","author":"Y Bengio","year":"1994","unstructured":"Bengio Y, Simard P, Frasconi P (1994) Learning long-term dependencies with gradient descent is difficult. IEEE Trans Neural Netw 5(2):157\u2013166","journal-title":"IEEE Trans Neural Netw"},{"key":"10495_CR5","unstructured":"Boetticher G (2007) The promise repository of empirical software engineering data. http:\/\/promisedata.org\/repository"},{"issue":"5","key":"10495_CR6","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1007\/s10664-023-10335-6","volume":"28","author":"GG Cabral","year":"2023","unstructured":"Cabral GG, Minku LL, Oliveira AL, Pessoa DA, Tabassum S (2023) An investigation of online and offline learning models for online just-in-time software defect prediction. Empirical Soft Eng 28(5):121","journal-title":"Empirical Soft Eng"},{"key":"10495_CR7","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla NV, Bowyer KW, Hall LO, Kegelmeyer WP (2002) Smote: synthetic minority over-sampling technique. J Artif Intell Res 16:321\u2013357","journal-title":"J Artif Intell Res"},{"key":"10495_CR8","doi-asserted-by":"crossref","unstructured":"Chen J, Hu K, Yu Y, Chen Z, Xuan Q, Liu Y, Filkov V (2020) Software visualization and deep transfer learning for effective software defect prediction. In: Proceedings of the ACM\/IEEE 42nd international conference on software engineering, pp 578\u2013589","DOI":"10.1145\/3377811.3380389"},{"key":"10495_CR9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.infsof.2017.08.004","volume":"93","author":"X Chen","year":"2018","unstructured":"Chen X, Zhao Y, Wang Q, Yuan Z (2018) Multi: Multi-objective effort-aware just-in-time software defect prediction. Inf Soft Technol 93:1\u201313","journal-title":"Inf Soft Technol"},{"issue":"6","key":"10495_CR10","doi-asserted-by":"crossref","first-page":"476","DOI":"10.1109\/32.295895","volume":"20","author":"SR Chidamber","year":"1994","unstructured":"Chidamber SR, Kemerer CF (1994) A metrics suite for object oriented design. IEEE Trans Soft Eng 20(6):476\u2013493","journal-title":"IEEE Trans Soft Eng"},{"key":"10495_CR11","doi-asserted-by":"crossref","unstructured":"Cho K, Van\u00a0Merri\u00ebnboer B, Bahdanau D, Bengio Y (2014) On the properties of neural machine translation: Encoder-decoder approaches. arXiv:1409.1259","DOI":"10.3115\/v1\/W14-4012"},{"key":"10495_CR12","doi-asserted-by":"crossref","unstructured":"Dam HK, Pham T, Ng SW, Tran T, Grundy J, Ghose A, Kim T, Kim CJ (2018) A deep tree-based model for software defect prediction. arXiv:1802.00921","DOI":"10.1109\/MSR.2019.00017"},{"key":"10495_CR13","unstructured":"Devlin J, Chang MW, Lee K, Toutanova K (2018) Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv:1810.04805"},{"issue":"3","key":"10495_CR14","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/s10664-022-10118-5","volume":"27","author":"Z Ding","year":"2022","unstructured":"Ding Z, Li H, Shang W, Chen THP (2022) Can pre-trained code embeddings improve model performance? revisiting the use of code embeddings in software engineering tasks. Empirical Soft Eng 27(3):63","journal-title":"Empirical Soft Eng"},{"issue":"5","key":"10495_CR15","doi-asserted-by":"crossref","first-page":"649","DOI":"10.1016\/j.jss.2007.07.040","volume":"81","author":"KO Elish","year":"2008","unstructured":"Elish KO, Elish MO (2008) Predicting defect-prone software modules using support vector machines. J Syst Soft 81(5):649\u2013660","journal-title":"J Syst Soft"},{"key":"10495_CR16","doi-asserted-by":"crossref","unstructured":"Faiz Rb, Shaheen S, Sharaf M, Rauf HT (2023) Optimal feature selection through search-based optimizer in cross project. Electronics 12(3):514","DOI":"10.3390\/electronics12030514"},{"key":"10495_CR17","doi-asserted-by":"crossref","unstructured":"Feng Z, Guo D, Tang D, Duan N, Feng X, Gong M, Shou L, Qin B, Liu T, Jiang D et al (2020) Codebert: A pre-trained model for programming and natural languages. arXiv:2002.08155","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"10495_CR18","doi-asserted-by":"crossref","unstructured":"Fisher RA (1919) Xv.\u2014the correlation between relatives on the supposition of mendelian inheritance. Earth Environ Sci Trans Royal Soc Edinburgh 52(2):399\u2013433","DOI":"10.1017\/S0080456800012163"},{"key":"10495_CR19","unstructured":"Guo D, Ren S, Lu S, Feng Z, Tang D, Liu S, Zhou L, Duan N, Svyatkovskiy A, Fu S et\u00a0al (2020) Graphcodebert: Pre-training code representations with data flow. arXiv:2009.08366"},{"key":"10495_CR20","unstructured":"Guo L, Ma Y, Cukic B, Singh H (2004) Robust prediction of fault-proneness by random forests. In: 15th international symposium on software reliability engineering, IEEE, pp 417\u2013428"},{"issue":"4","key":"10495_CR21","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1007\/s10664-023-10314-x","volume":"28","author":"MA Hadi","year":"2023","unstructured":"Hadi MA, Fard FH (2023) Evaluating pre-trained models for user feedback analysis in software engineering: A study on classification of app-reviews. Empirical Soft Eng 28(4):88","journal-title":"Empirical Soft Eng"},{"issue":"11","key":"10495_CR22","doi-asserted-by":"crossref","first-page":"1091","DOI":"10.1109\/TSE.2017.2748129","volume":"43","author":"S Herbold","year":"2017","unstructured":"Herbold S (2017) Comments on scottknottesd in response to\" an empirical comparison of model validation techniques for defect prediction models\". IEEE Trans Soft Eng 43(11):1091\u20131094","journal-title":"IEEE Trans Soft Eng"},{"key":"10495_CR23","doi-asserted-by":"crossref","unstructured":"Herbold S, Trautsch A, Grabowski J (2018) A comparative study to benchmark cross-project defect prediction approaches. In: Proceedings of the 40th international conference on software engineering, pp 1063\u20131063","DOI":"10.1145\/3180155.3182542"},{"issue":"02","key":"10495_CR24","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1142\/S0218488598000094","volume":"6","author":"S Hochreiter","year":"1998","unstructured":"Hochreiter S (1998) The vanishing gradient problem during learning recurrent neural nets and problem solutions. Int J Uncertainty, Fuzziness and Knowl-Based Syst 6(02):107\u2013116","journal-title":"Int J Uncertainty, Fuzziness and Knowl-Based Syst"},{"key":"10495_CR25","doi-asserted-by":"crossref","unstructured":"Huang J, Gretton A, Borgwardt K, Sch\u00f6lkopf B, Smola A (2006) Correcting sample selection bias by unlabeled data. Adv Neural Inf Process Syst 19","DOI":"10.7551\/mitpress\/7503.003.0080"},{"issue":"2","key":"10495_CR26","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1049\/sfw2.12053","volume":"16","author":"Q Huang","year":"2022","unstructured":"Huang Q, Ma L, Jiang S, Wu G, Song H, Jiang L, Zheng C (2022) A cross-project defect prediction method based on multi-adaptation and nuclear norm. IET Soft 16(2):200\u2013213","journal-title":"IET Soft"},{"key":"10495_CR27","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1016\/j.neucom.2018.09.004","volume":"321","author":"S Jiang","year":"2018","unstructured":"Jiang S, Xu Y, Song H, Wu Q, Ng MK, Min H, Qiu S (2018) Multi-instance transfer metric learning by weighted distribution and consistent maximum likelihood estimation. Neurocomputing 321:49\u201360","journal-title":"Neurocomputing"},{"key":"10495_CR28","doi-asserted-by":"crossref","first-page":"10362","DOI":"10.1109\/ACCESS.2018.2889572","volume":"7","author":"S Jiang","year":"2019","unstructured":"Jiang S, Xu Y, Wang T, Yang H, Qiu S, Yu H, Song H (2019) Multi-label metric transfer learning jointly considering instance space and label space distribution divergence. IEEE Access 7:10362\u201310373","journal-title":"IEEE Access"},{"issue":"2","key":"10495_CR29","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1109\/TSE.2007.70773","volume":"34","author":"S Kim","year":"2008","unstructured":"Kim S, Whitehead EJ, Zhang Y (2008) Classifying software changes: Clean or buggy? IEEE Trans Soft Eng 34(2):181\u2013196","journal-title":"IEEE Trans Soft Eng"},{"key":"10495_CR30","doi-asserted-by":"crossref","unstructured":"Kim S, Zhao J, Tian Y, Chandra S (2021) Code prediction by feeding trees to transformers. In: 2021 IEEE\/ACM 43rd International conference on software engineering (ICSE), IEEE, pp 150\u2013162","DOI":"10.1109\/ICSE43902.2021.00026"},{"key":"10495_CR31","unstructured":"Kingma DP, Ba J (2014) Adam: A method for stochastic optimization. arXiv:1412.6980"},{"key":"10495_CR32","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1016\/j.infsof.2014.07.005","volume":"58","author":"IH Laradji","year":"2015","unstructured":"Laradji IH, Alshayeb M, Ghouti L (2015) Software defect prediction using ensemble learning on selected features. Inf Soft Technol 58:388\u2013402","journal-title":"Inf Soft Technol"},{"key":"10495_CR33","doi-asserted-by":"crossref","unstructured":"Le P, Zuidema W (2016) Quantifying the vanishing gradient and long distance dependency problem in recursive neural networks and recursive lstms. arXiv:1603.00423","DOI":"10.18653\/v1\/W16-1610"},{"key":"10495_CR34","doi-asserted-by":"crossref","unstructured":"Li J, He P, Zhu J, Lyu MR (2017) Software defect prediction via convolutional neural network. In: 2017 IEEE international conference on software quality, reliability and security (QRS), IEEE, pp 318\u2013328","DOI":"10.1109\/QRS.2017.42"},{"key":"10495_CR35","doi-asserted-by":"crossref","unstructured":"Lin C, Ouyang Z, Zhuang J, Chen J, Li H, Wu R (2021) Improving code summarization with block-wise abstract syntax tree splitting. In: 2021 IEEE\/ACM 29th International conference on program comprehension (ICPC), IEEE, pp 184\u2013195","DOI":"10.1109\/ICPC52881.2021.00026"},{"key":"10495_CR36","doi-asserted-by":"crossref","first-page":"13112","DOI":"10.1109\/ACCESS.2021.3051957","volume":"9","author":"J Lin","year":"2021","unstructured":"Lin J, Lu L (2021) Semantic feature learning via dual sequences for defect prediction. IEEE Access 9:13112\u201313124","journal-title":"IEEE Access"},{"issue":"4","key":"10495_CR37","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1007\/s10664-022-10140-7","volume":"27","author":"F Liu","year":"2022","unstructured":"Liu F, Li G, Wei B, Xia X, Fu Z (2022) Jin Z (2022) A unified multi-task learning model for ast-level and token-level code completion. Empirical Soft Eng 27(4):91","journal-title":"Empirical Soft Eng"},{"key":"10495_CR38","unstructured":"Liu Y, Ott M, Goyal N, Du J, Joshi M, Chen D, Levy O, Lewis M, Zettlemoyer L, Stoyanov V (2019) Roberta: A robustly optimized bert pretraining approach. arXiv:1907.11692"},{"issue":"12","key":"10495_CR39","doi-asserted-by":"crossref","first-page":"3071","DOI":"10.1109\/TPAMI.2018.2868685","volume":"41","author":"M Long","year":"2018","unstructured":"Long M, Cao Y, Cao Z, Wang J, Jordan MI (2018) Transferable representation learning with deep adaptation networks. IEEE Trans Pattern Anal Mach Intell 41(12):3071\u20133085","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"10495_CR40","unstructured":"L\u00f3pez JAH, Weyssow M, Cuadrado JS, Sahraoui H (2022) Ast-probe: Recovering abstract syntax trees from hidden representations of pre-trained language models. arXiv:2206.11719"},{"issue":"3","key":"10495_CR41","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1016\/j.infsof.2011.09.007","volume":"54","author":"Y Ma","year":"2012","unstructured":"Ma Y, Luo G, Zeng X, Chen A (2012) Transfer learning for cross-company software defect prediction. Inf Soft Technol 54(3):248\u2013256","journal-title":"Inf Soft Technol"},{"key":"10495_CR42","doi-asserted-by":"crossref","unstructured":"Malhotra R, Meena S (2023) Empirical validation of feature selection techniques for cross-project defect prediction. Int J Syst Assurance Eng Manag 1\u201313","DOI":"10.1007\/s13198-023-02051-7"},{"issue":"4","key":"10495_CR43","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1109\/TSE.1976.233837","volume":"2","author":"TJ McCabe","year":"1976","unstructured":"McCabe TJ (1976) A complexity measure. IEEE Trans Soft Eng 2(4):308\u2013320","journal-title":"IEEE Trans Soft Eng"},{"key":"10495_CR44","unstructured":"Mikolov T, Chen K, Corrado G, Dean J (2013) Efficient estimation of word representations in vector space. arXiv:1301.3781"},{"key":"10495_CR45","doi-asserted-by":"crossref","unstructured":"Nam J, Pan SJ, Kim S (2013) Transfer defect learning. In: 2013 35th international conference on software engineering (ICSE), IEEE, pp 382\u2013391","DOI":"10.1109\/ICSE.2013.6606584"},{"issue":"11","key":"10495_CR46","doi-asserted-by":"crossref","first-page":"4793","DOI":"10.3390\/app11114793","volume":"11","author":"C Pan","year":"2021","unstructured":"Pan C, Lu M, Xu B (2021) An empirical study on software defect prediction using codebert model. Appl Sci 11(11):4793","journal-title":"Appl Sci"},{"key":"10495_CR47","first-page":"9343","volume":"34","author":"H Peng","year":"2021","unstructured":"Peng H, Li G, Wang W, Zhao Y, Jin Z (2021) Integrating tree path in transformer for code representation. Adv Neural Inf Process Syst 34:9343\u20139354","journal-title":"Adv Neural Inf Process Syst"},{"key":"10495_CR48","doi-asserted-by":"crossref","unstructured":"Pennington J, Socher R, Manning CD (2014) Glove: Global vectors for word representation. In: Proceedings of the 2014 conference on empirical methods in natural language processing (EMNLP), pp 1532\u20131543","DOI":"10.3115\/v1\/D14-1162"},{"key":"10495_CR49","doi-asserted-by":"crossref","unstructured":"Qiu S, Huang H, Jiang W, Zhang F, Zhou W (2023) Defect prediction via tree-based encoding with hybrid granularity for software sustainability. IEEE Trans Sustainable Comput","DOI":"10.1109\/TSUSC.2023.3248965"},{"issue":"13","key":"10495_CR50","doi-asserted-by":"crossref","first-page":"2660","DOI":"10.3390\/app9132660","volume":"9","author":"S Qiu","year":"2019","unstructured":"Qiu S, Xu H, Deng J, Jiang S, Lu L (2019) Transfer convolutional neural network for cross-project defect prediction. Appl Sci 9(13):2660","journal-title":"Appl Sci"},{"key":"10495_CR51","unstructured":"Reena P, Binu R (2014) Software defect prediction system\u2013decision tree algorithm with two level data pre-processing. Int J Eng Res & Technol (IJERT) 3(3)"},{"key":"10495_CR52","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1007\/s10664-014-9346-4","volume":"21","author":"D Ryu","year":"2016","unstructured":"Ryu D, Choi O, Baik J (2016) Value-cognitive boosting with a support vector machine for cross-project defect prediction. Empirical Softw Eng 21:43\u201371","journal-title":"Empirical Softw Eng"},{"issue":"11","key":"10495_CR53","doi-asserted-by":"crossref","first-page":"2673","DOI":"10.1109\/78.650093","volume":"45","author":"M Schuster","year":"1997","unstructured":"Schuster M, Paliwal KK (1997) Bidirectional recurrent neural networks. IEEE Trans Signal Process 45(11):2673\u20132681","journal-title":"IEEE Trans Signal Process"},{"issue":"6","key":"10495_CR54","doi-asserted-by":"crossref","first-page":"603","DOI":"10.1109\/TSE.2014.2322358","volume":"40","author":"M Shepperd","year":"2014","unstructured":"Shepperd M, Bowes D, Hall T (2014) Researcher bias: The use of machine learning in software defect prediction. IEEE Trans Softw Eng 40(6):603\u2013616","journal-title":"IEEE Trans Softw Eng"},{"issue":"12","key":"10495_CR55","doi-asserted-by":"crossref","first-page":"1253","DOI":"10.1109\/TSE.2018.2836442","volume":"45","author":"Q Song","year":"2018","unstructured":"Song Q, Guo Y, Shepperd M (2018) A comprehensive investigation of the role of imbalanced learning for software defect prediction. IEEE Trans Soft Eng 45(12):1253\u20131269","journal-title":"IEEE Trans Soft Eng"},{"issue":"1","key":"10495_CR56","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1109\/TSE.2022.3150153","volume":"49","author":"S Tabassum","year":"2022","unstructured":"Tabassum S, Minku LL, Feng D (2022) Cross-project online just-in-time software defect prediction. IEEE Trans Soft Eng 49(1):268\u2013287","journal-title":"IEEE Trans Soft Eng"},{"issue":"1","key":"10495_CR57","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TSE.2016.2584050","volume":"43","author":"C Tantithamthavorn","year":"2016","unstructured":"Tantithamthavorn C, McIntosh S, Hassan AE, Matsumoto K (2016) An empirical comparison of model validation techniques for defect prediction models. IEEE Trans Soft Eng 43(1):1\u201318","journal-title":"IEEE Trans Soft Eng"},{"key":"10495_CR58","doi-asserted-by":"crossref","first-page":"540","DOI":"10.1007\/s10664-008-9103-7","volume":"14","author":"B Turhan","year":"2009","unstructured":"Turhan B, Menzies T, Bener AB, Di Stefano J (2009) On the relative value of cross-company and within-company data for defect prediction. Empirical Soft Eng 14:540\u2013578","journal-title":"Empirical Soft Eng"},{"issue":"16","key":"10495_CR59","doi-asserted-by":"crossref","first-page":"7877","DOI":"10.1007\/s00500-022-06830-5","volume":"26","author":"MN Uddin","year":"2022","unstructured":"Uddin MN, Li B, Ali Z, Kefalas P, Khan I, Zada I (2022) Software defect prediction employing bilstm and bert-based semantic feature. Soft Comput 26(16):7877\u20137891","journal-title":"Soft Comput"},{"key":"10495_CR60","unstructured":"Vaswani A, Shazeer N, Parmar N, Uszkoreit J, Jones L, Gomez AN, Kaiser \u0141, Polosukhin I (2017) Attention is all you need. Adv Neural Inf Process Syst 30"},{"issue":"12","key":"10495_CR61","doi-asserted-by":"crossref","first-page":"1267","DOI":"10.1109\/TSE.2018.2877612","volume":"46","author":"S Wang","year":"2018","unstructured":"Wang S, Liu T, Nam J, Tan L (2018) Deep semantic feature learning for software defect prediction. IEEE Trans Soft Eng 46(12):1267\u20131293","journal-title":"IEEE Trans Soft Eng"},{"key":"10495_CR62","doi-asserted-by":"crossref","unstructured":"Wang T, Li Wh (2010) Naive bayes software defect prediction model. In: 2010 International conference on computational intelligence and software engineering, Ieee, pp 1\u20134","DOI":"10.1109\/CISE.2010.5677057"},{"key":"10495_CR63","unstructured":"Wang W, Zhang K, Li G, Liu S, Jin Z, Liu Y (2022a) A tree-structured transformer for program representation learning. arXiv:2208.08643"},{"key":"10495_CR64","doi-asserted-by":"crossref","unstructured":"Wang X, Wu Q, Zhang H, Lyu C, Jiang X, Zheng Z, Lyu L, Hu S (2022b) Heloc: Hierarchical contrastive learning of source code representation. In: Proceedings of the 30th IEEE\/ACM international conference on program comprehension, pp 354\u2013365","DOI":"10.1145\/3524610.3527896"},{"key":"10495_CR65","doi-asserted-by":"crossref","first-page":"14015","DOI":"10.1609\/aaai.v35i16.17650","volume":"35","author":"Y Wang","year":"2021","unstructured":"Wang Y, Li H (2021) Code completion by modeling flattened abstract syntax trees as graphs. Proceedings of the AAAI conference on artificial intelligence 35:14015\u201314023","journal-title":"Proceedings of the AAAI conference on artificial intelligence"},{"key":"10495_CR66","doi-asserted-by":"crossref","unstructured":"Wei SE, Ramakrishna V, Kanade T, Sheikh Y (2016) Convolutional pose machines. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 4724\u20134732","DOI":"10.1109\/CVPR.2016.511"},{"key":"10495_CR67","doi-asserted-by":"crossref","unstructured":"Wilcoxon F (1992) Individual comparisons by ranking methods. In: Breakthroughs in Statistics: Methodology and Distribution, Springer, pp 196\u2013202","DOI":"10.1007\/978-1-4612-4380-9_16"},{"key":"10495_CR68","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1016\/j.jss.2017.06.069","volume":"133","author":"WE Wong","year":"2017","unstructured":"Wong WE, Li X, Laplante PA (2017) Be more familiar with our enemies and pave the way forward: A review of the roles bugs played in software failures. J Syst Soft 133:68\u201394","journal-title":"J Syst Soft"},{"key":"10495_CR69","volume":"252","author":"B Wu","year":"2022","unstructured":"Wu B, Liang B, Zhang X (2022) Turn tree into graph: Automatic code review via simplified ast driven graph convolutional network. Knowl-Based Syst 252:109450","journal-title":"Knowl-Based Syst"},{"issue":"10","key":"10495_CR70","doi-asserted-by":"crossref","first-page":"977","DOI":"10.1109\/TSE.2016.2543218","volume":"42","author":"X Xia","year":"2016","unstructured":"Xia X, Lo D, Pan SJ, Nagappan N, Wang X (2016) Hydra: Massively compositional model for cross-project defect prediction. IEEE Trans Soft Eng 42(10):977\u2013998","journal-title":"IEEE Trans Soft Eng"},{"issue":"2","key":"10495_CR71","doi-asserted-by":"crossref","first-page":"850","DOI":"10.1109\/TR.2022.3161581","volume":"71","author":"J Xu","year":"2022","unstructured":"Xu J, Ai J, Liu J, Shi T (2022) Acgdp: An augmented code graph-based system for software defect prediction. IEEE Trans Reliability 71(2):850\u2013864","journal-title":"IEEE Trans Reliability"},{"issue":"2","key":"10495_CR72","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1109\/TR.2020.3040191","volume":"70","author":"J Xu","year":"2020","unstructured":"Xu J, Wang F, Ai J (2020) Defect prediction with semantics and context features of codes based on graph representation learning. IEEE Trans Reliability 70(2):613\u2013625","journal-title":"IEEE Trans Reliability"},{"key":"10495_CR73","doi-asserted-by":"crossref","first-page":"1039","DOI":"10.1007\/s11390-019-1959-z","volume":"34","author":"Z Xu","year":"2019","unstructured":"Xu Z, Pang S, Zhang T, Luo XP, Liu J, Tang YT, Yu X, Xue L (2019) Cross project defect prediction via balanced distribution adaptation based transfer learning. J Comput Sci Technol 34:1039\u20131062","journal-title":"J Comput Sci Technol"},{"key":"10495_CR74","first-page":"1","volume":"2018","author":"J Yan","year":"2018","unstructured":"Yan J, Qi Y, Rao Q (2018) Lstm-based hierarchical denoising network for android malware detection. Sec Commun Net 2018:1\u201318","journal-title":"Sec Commun Net"},{"key":"10495_CR75","unstructured":"Yang J, Xiao G, Shen Y, Jiang W, Hu X, Zhang Y, Peng J (2021) A survey of knowledge enhanced pre-trained models. arXiv:2110.00269"},{"key":"10495_CR76","doi-asserted-by":"crossref","unstructured":"Zhang J, Wang X, Zhang H, Sun H, Wang K, Liu X (2019) A novel neural source code representation based on abstract syntax tree. In: 2019 IEEE\/ACM 41st International conference on software engineering (ICSE), IEEE, pp 783\u2013794","DOI":"10.1109\/ICSE.2019.00086"},{"key":"10495_CR77","unstructured":"Zhang T, Wu F, Katiyar A, Weinberger KQ, Artzi Y (2020) Revisiting few-sample bert fine-tuning. arXiv:2006.05987"},{"issue":"3","key":"10495_CR78","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1049\/sfw2.12040","volume":"16","author":"K Zhao","year":"2022","unstructured":"Zhao K, Xu Z, Yan M, Xue L, Li W, Catolino G (2022) A compositional model for effort-aware just-in-time defect prediction on android apps. IET Software 16(3):259\u2013278","journal-title":"IET Software"},{"issue":"3","key":"10495_CR79","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1049\/iet-sen.2019.0278","volume":"14","author":"K Zhu","year":"2020","unstructured":"Zhu K, Zhang N, Ying S, Zhu D (2020) Within-project and cross-project just-in-time defect prediction based on denoising autoencoder and convolutional neural network. IET Software 14(3):185\u2013195","journal-title":"IET Software"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-024-10495-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-024-10495-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-024-10495-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,5]],"date-time":"2024-07-05T15:15:48Z","timestamp":1720192548000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-024-10495-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,4]]},"references-count":79,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,7]]}},"alternative-id":["10495"],"URL":"https:\/\/doi.org\/10.1007\/s10664-024-10495-z","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6,4]]},"assertion":[{"value":"2 May 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 June 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"80"}}