{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:29:25Z","timestamp":1740122965837,"version":"3.37.3"},"reference-count":66,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2022,1,8]],"date-time":"2022-01-08T00:00:00Z","timestamp":1641600000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,8]],"date-time":"2022-01-08T00:00:00Z","timestamp":1641600000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,4]]},"DOI":"10.1007\/s11042-021-11441-7","type":"journal-article","created":{"date-parts":[[2022,1,8]],"date-time":"2022-01-08T18:02:26Z","timestamp":1641664946000},"page":"12141-12156","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["EkmEx - an extended framework for labeling an unlabeled fault dataset"],"prefix":"10.1007","volume":"81","author":[{"given":"Muhammad","family":"Rizwan","sequence":"first","affiliation":[]},{"given":"Aamer","family":"Nadeem","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7565-439X","authenticated-orcid":false,"given":"Sohail","family":"Sarwar","sequence":"additional","affiliation":[]},{"given":"Muddesar","family":"Iqbal","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Safyan","sequence":"additional","affiliation":[]},{"given":"Zia Ul","family":"Qayyum","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,8]]},"reference":[{"key":"11441_CR1","doi-asserted-by":"crossref","unstructured":"AbuHassan A, Alshayeb M, Ghouti L (2020) Software smell detection techniques: A systematic literature review. J Softw Evol Process :e2320","DOI":"10.1002\/smr.2320"},{"issue":"4","key":"11441_CR2","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1002\/spe.2784","volume":"50","author":"H Alsghaier","year":"2020","unstructured":"Alsghaier H, Akour M (2020) Software fault prediction using particle swarm algorithm with genetic algorithm and support vector machine classifier. Softw Pract Exper 50(4):407\u2013427. https:\/\/doi.org\/10.1002\/spe.2784","journal-title":"Softw Pract Exper"},{"key":"11441_CR3","doi-asserted-by":"crossref","unstructured":"Al-Shaaby A, Aljamaan H, Alshayeb M (2020) Bad smell detection using machine learning techniques: A systematic literature review. Arab J Sci Eng :1\u201329","DOI":"10.1007\/s13369-019-04311-w"},{"key":"11441_CR4","doi-asserted-by":"crossref","unstructured":"Amasaki S (2020) Cross-version defect prediction: use historical data, cross-project data, or both? Empir Softw Eng :1\u201323","DOI":"10.1007\/s10664-019-09777-8"},{"key":"11441_CR5","unstructured":"Beecham S, Hall T, Bowes D, Gray D, Counsell S, Black S (2010) A systematic review of fault prediction approaches used in software engineering. The Irish Software Engineering Research Centre, Limerick, Ireland"},{"key":"11441_CR6","unstructured":"Beecham S, Hall T, Bowes D, Gray D, Counsell S, Black S (2010) A systematic review of fault prediction approaches used in software engineering, Technical Report Lero-TR-2010-04, Lero, Tech Rep."},{"issue":"3","key":"11441_CR7","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1002\/(SICI)1521-4036(199906)41:3<305::AID-BIMJ305>3.0.CO;2-Y","volume":"41","author":"R Bender","year":"1999","unstructured":"Bender R (1999) Quantitative risk assessment in epidemiological studies investigating threshold effects. Biometric J 41(3):305\u2013319","journal-title":"Biometric J"},{"key":"11441_CR8","doi-asserted-by":"publisher","unstructured":"Bird C, Bachmann A, Aune E, Duffy J, Bernstein (2009) Fair and balanced? bias in bug-fix datasets. In: Proceedings of the 7th joint meeting of the european software engineering conference and the ACM SIGSOFT symposium on the foundations of software engineering, ser. ESEC\/FSE \u201909. Association for Computing Machinery, New York, pp 121\u2013130. https:\/\/doi.org\/10.1145\/1595696.1595716","DOI":"10.1145\/1595696.1595716"},{"issue":"6","key":"11441_CR9","doi-asserted-by":"publisher","first-page":"1146","DOI":"10.1109\/TKDE.2011.163","volume":"24","author":"PS Bishnu","year":"2012","unstructured":"Bishnu PS, Bhattacherjee V (2012) Software fault prediction using quad tree-based k-means clustering algorithm. IEEE Trans Knowl Data Eng 24 (6):1146\u20131150","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"11441_CR10","unstructured":"Boetticher G, Menzies T, Ostrand T (2007) {PROMISE} repository of empirical software engineering data, ArXiv"},{"key":"11441_CR11","doi-asserted-by":"crossref","unstructured":"Briand LC, Daly J, Porter V, Wust J (1998) A comprehensive empirical validation of design measures for object-oriented systems. In: Proceedings fifth international software metrics symposium, metrics (Cat. No.98TB100262), pp 246\u2013257","DOI":"10.1109\/METRIC.1998.731251"},{"issue":"4","key":"11441_CR12","doi-asserted-by":"publisher","first-page":"4626","DOI":"10.1016\/j.eswa.2010.10.024","volume":"38","author":"C Catal","year":"2011","unstructured":"Catal C (2011) Software fault prediction: A literature review and current trends. Expert Syst Appl 38(4):4626\u20134636","journal-title":"Expert Syst Appl"},{"issue":"4","key":"11441_CR13","doi-asserted-by":"publisher","first-page":"7346","DOI":"10.1016\/j.eswa.2008.10.027","volume":"36","author":"C Catal","year":"2009","unstructured":"Catal C, Diri B (2009) A systematic review of software fault prediction studies. Expert Syst Appl 36(4):7346\u20137354","journal-title":"Expert Syst Appl"},{"key":"11441_CR14","unstructured":"Catal C, Sevim U, Diri B (2009) Software fault prediction of unlabeled program modules. In: Proceedings of the world congress on engineering, vol 1, pp 1\u20133"},{"key":"11441_CR15","doi-asserted-by":"crossref","unstructured":"Catal C, Sevim U, Diri B (2009) Clustering and metrics thresholds based software fault prediction of unlabeled program modules. In: 2009 Sixth international conference on information technology: new generations, pp 199\u2013204","DOI":"10.1109\/ITNG.2009.12"},{"key":"11441_CR16","doi-asserted-by":"crossref","unstructured":"Chappelly T, Cifuentes C, Krishnan P, Gevay S (2017) Machine learning for finding bugs: An initial report. In: Machine learning techniques for software quality evaluation (MaLTeSQuE), IEEE Workshop on. IEEE, pp 21\u201326","DOI":"10.1109\/MALTESQUE.2017.7882012"},{"key":"11441_CR17","unstructured":"El Emam K, Benlarbi S, Goel N, Rai S (1999) A validation of object-oriented metrics. National Research Council Canada Institute for Information Technology"},{"key":"11441_CR18","doi-asserted-by":"publisher","first-page":"02","DOI":"10.1016\/S0164-1212(00)00086-8","volume":"56","author":"K El-Emam","year":"2001","unstructured":"El-Emam K, Melo W (2001) The prediction of faulty classes using object-oriented design metrics. J Syst Softw 56:02","journal-title":"J Syst Softw"},{"key":"11441_CR19","doi-asserted-by":"publisher","DOI":"10.1201\/b17461","volume-title":"Software metrics: a rigorous and practical approach","author":"N Fenton","year":"2014","unstructured":"Fenton N, Bieman J (2014) Software metrics: a rigorous and practical approach. CRC Press, Boca Raton"},{"key":"11441_CR20","doi-asserted-by":"crossref","unstructured":"Ghani I (2014) Handbook of research on emerging advancements and technologies in software engineering. IGI Global","DOI":"10.4018\/978-1-4666-6026-7"},{"issue":"2","key":"11441_CR21","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1016\/j.jss.2007.05.035","volume":"81","author":"I Gondra","year":"2008","unstructured":"Gondra I (2008) Applying machine learning to software fault-proneness prediction. J Syst Softw 81(2):186\u2013195","journal-title":"J Syst Softw"},{"key":"11441_CR22","doi-asserted-by":"crossref","unstructured":"Gupta R, Singh SK (2020) Using software metrics to detect temporary field code smell. In: 2020 10th international conference on cloud computing, data science engineering (Confluence), pp 45\u201349","DOI":"10.1109\/Confluence47617.2020.9058138"},{"key":"11441_CR23","doi-asserted-by":"publisher","unstructured":"Hall T, Zhang M, Bowes D, Sun Y (2014) Some code smells have a significant but small effect on faults. ACM Trans Softw Eng Methodol 23(4). https:\/\/doi.org\/10.1145\/2629648","DOI":"10.1145\/2629648"},{"key":"11441_CR24","volume-title":"Elements of software science (operating and programming systems series)","author":"MH Halstead","year":"1977","unstructured":"Halstead MH (1977) Elements of software science (operating and programming systems series). Elsevier Science Inc., New York"},{"key":"11441_CR25","doi-asserted-by":"publisher","unstructured":"Herbold S (2013) Training data selection for cross-project defect prediction. In: Proceedings of the 9th international conference on predictive models in software engineering, ser. PROMISE \u201913. Association for Computing Machinery, New York. https:\/\/doi.org\/10.1145\/2499393.2499395","DOI":"10.1145\/2499393.2499395"},{"key":"11441_CR26","doi-asserted-by":"crossref","unstructured":"Herzig K, Just S, Zeller A (2013) It\u2019s not a bug, it\u2019s a feature: How misclassification impacts bug prediction. In: Proceedings of the 2013 international conference on software engineering, ser. ICSE \u201913. IEEE Press, pp 392\u2013401","DOI":"10.1109\/ICSE.2013.6606585"},{"key":"11441_CR27","unstructured":"I. 9000:2015(en) (2015) Quality management systems \u2014 fundamentals and vocabulary, ISO"},{"key":"11441_CR28","unstructured":"Kotkov\u00e1 B., Hromada M (2020) Adverse event in a medical facility-blackout. Int J Power Syst 5"},{"issue":"7","key":"11441_CR29","doi-asserted-by":"publisher","first-page":"1120","DOI":"10.1016\/j.jss.2006.10.018","volume":"80","author":"W Li","year":"2007","unstructured":"Li W, Shatnawi R (2007) An empirical study of the bad smells and class error probability in the post-release object-oriented system evolution. J Syst Softw 80(7):1120\u20131128. https:\/\/doi.org\/10.1016\/j.jss.2006.10.018","journal-title":"J Syst Softw"},{"issue":"3","key":"11441_CR30","first-page":"161","volume":"12","author":"Z Li","year":"2018","unstructured":"Li Z, Jing X-Y, Zhu X (2018) Progress on approaches to software defect prediction. Inst Eng Technol Softw 12(3):161\u2013175","journal-title":"Inst Eng Technol Softw"},{"key":"11441_CR31","doi-asserted-by":"crossref","unstructured":"Li K, Xiang Z, Chen T, Wang S, Tan KC (2020) Understanding the automated parameter optimization on transfer learning for cpdp: An empirical study. arXiv:2002.03148","DOI":"10.1145\/3377811.3380360"},{"issue":"3","key":"11441_CR32","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1016\/j.infsof.2011.09.007","volume":"54","author":"Y Ma","year":"2012","unstructured":"Ma Y, Luo G, Zeng X, Chen A (2012) Transfer learning for cross-company software defect prediction. Inf Softw Technol 54(3):248\u2013256","journal-title":"Inf Softw Technol"},{"key":"11441_CR33","unstructured":"MacQueen J et al (1967) Some methods for classification and analysis of multivariate observations. In: Proceedings of the fifth Berkeley symposium on mathematical statistics and probability, Oakland, CA, USA, vol 1, pp 281\u2013297"},{"issue":"C","key":"11441_CR34","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1016\/j.asoc.2014.11.023","volume":"27","author":"R Malhotra","year":"2015","unstructured":"Malhotra R (2015) A systematic review of machine learning techniques for software fault prediction. Appl Soft Comput 27(C):504\u2013518","journal-title":"Appl Soft Comput"},{"key":"11441_CR35","doi-asserted-by":"crossref","unstructured":"Marinescu R (2004) Detection strategies: metrics-based rules for detecting design flaws. In: 20th IEEE international conference on software maintenance, 2004. Proceedings., pp 350\u2013359","DOI":"10.1109\/ICSM.2004.1357820"},{"issue":"4","key":"11441_CR36","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1109\/72.238311","volume":"4","author":"TM Martinetz","year":"1993","unstructured":"Martinetz TM, Berkovich SG, Schulten KJ (1993) \u2019neural-gas\u2019 network for vector quantization and its application to time-series prediction. IEEE Trans Neural Netw 4(4):558\u2013569","journal-title":"IEEE Trans Neural Netw"},{"issue":"4","key":"11441_CR37","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1109\/TSE.1976.233837","volume":"2","author":"TJ McCabe","year":"1976","unstructured":"McCabe TJ (1976) A complexity measure. IEEE Trans Softw Eng 2(4):308\u2013320","journal-title":"IEEE Trans Softw Eng"},{"issue":"12","key":"11441_CR38","doi-asserted-by":"publisher","first-page":"1415","DOI":"10.1145\/76380.76382","volume":"32","author":"TJ McCabe","year":"1989","unstructured":"McCabe TJ, Butler CW (1989) Design complexity measurement and testing. Commun ACM 32(12):1415\u20131425","journal-title":"Commun ACM"},{"key":"11441_CR39","doi-asserted-by":"crossref","unstructured":"Nam J, Kim S (2015) Clami: Defect prediction on unlabeled datasets (t). In: 2015 30th IEEE\/ACM international conference on automated software engineering (ASE). IEEE, pp 452\u2013463","DOI":"10.1109\/ASE.2015.56"},{"key":"11441_CR40","doi-asserted-by":"crossref","unstructured":"Nam J, Pan SJ, Kim S (2013) Transfer defect learning. In: 2013 35th international conference on software engineering (ICSE). IEEE, pp 382\u2013391","DOI":"10.1109\/ICSE.2013.6606584"},{"key":"11441_CR41","doi-asserted-by":"crossref","unstructured":"Nam J, Fu W, Kim S, Menzies T, Tan L (2017) Heterogeneous defect prediction. IEEE Trans Softw Eng","DOI":"10.1109\/TSE.2017.2720603"},{"key":"11441_CR42","unstructured":"Ng AY, Jordan MI, Weiss Y (2001) On spectral clustering: Analysis and an algorithm. In: Advances in neural information processing systems. sMIT Press, pp 849\u2013856"},{"key":"11441_CR43","doi-asserted-by":"crossref","unstructured":"Olbrich S, Cruzes DS, Basili V, Zazworka N (2009) The evolution and impact of code smells: A case study of two open source systems. In: 2009 3rd international symposium on empirical software engineering and measurement, pp 390\u2013400","DOI":"10.1109\/ESEM.2009.5314231"},{"key":"11441_CR44","doi-asserted-by":"crossref","unstructured":"Olbrich SM, Cruzes DS, Sj\u00f8berg DIK (2010) Are all code smells harmful? a study of god classes and brain classes in the evolution of three open source systems. In: 2010 IEEE international conference on software maintenance, pp 1\u201310","DOI":"10.1109\/ICSM.2010.5609564"},{"issue":"8","key":"11441_CR45","doi-asserted-by":"publisher","first-page":"1397","DOI":"10.1016\/j.infsof.2013.02.009","volume":"55","author":"D Radjenovi\u0107","year":"2013","unstructured":"Radjenovi\u0107 D, Heri\u010dko M, Torkar R, \u017eivkovi\u010d A (2013) Software fault prediction metrics: A systematic literature review. Inf Softw Technol 55 (8):1397\u20131418","journal-title":"Inf Softw Technol"},{"issue":"3","key":"11441_CR46","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/s00607-016-0489-6","volume":"99","author":"SS Rathore","year":"2017","unstructured":"Rathore SS, Kumar S (2017) A decision tree logic based recommendation system to select software fault prediction techniques. Computing 99(3):255\u2013285","journal-title":"Computing"},{"issue":"10","key":"11441_CR47","doi-asserted-by":"publisher","first-page":"1810","DOI":"10.1016\/j.infsof.2013.05.002","volume":"55","author":"D Rodriguez","year":"2013","unstructured":"Rodriguez D, Ruiz R, Riquelme JC, Harrison R (2013) A study of subgroup discovery approaches for defect prediction. Inf Softw Technol 55 (10):1810\u20131822. https:\/\/doi.org\/10.1016\/j.infsof.2013.05.002","journal-title":"Inf Softw Technol"},{"key":"11441_CR48","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/0377-0427(87)90125-7","volume":"20","author":"PJ Rousseeuw","year":"1987","unstructured":"Rousseeuw PJ (1987) Silhouettes: A graphical aid to the interpretation and validation of cluster analysis. J Comput Appl Math 20:53\u201365","journal-title":"J Comput Appl Math"},{"issue":"2","key":"11441_CR49","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1109\/TSMCA.2006.889473","volume":"37","author":"N Seliya","year":"2007","unstructured":"Seliya N, Khoshgoftaar TM (2007) Software quality analysis of unlabeled program modules with semisupervised clustering. IEEE Trans Syst Man Cybern A Syst Humans 37(2):201\u2013211","journal-title":"IEEE Trans Syst Man Cybern A Syst Humans"},{"issue":"9","key":"11441_CR50","doi-asserted-by":"publisher","first-page":"1208","DOI":"10.1109\/TSE.2013.11","volume":"39","author":"M Shepperd","year":"2013","unstructured":"Shepperd M, Song Q, Sun Z, Mair C (2013) Data quality: Some comments on the nasa software defect datasets. IEEE Trans Softw Eng 39(9):1208\u20131215","journal-title":"IEEE Trans Softw Eng"},{"issue":"8","key":"11441_CR51","doi-asserted-by":"publisher","first-page":"1144","DOI":"10.1109\/TSE.2012.89","volume":"39","author":"DIK Sjoberg","year":"2013","unstructured":"Sjoberg DIK, Yamashita A, Anda B, Mockus A, Dyba T (2013) Quantifying the effect of code smells on maintenance effort. IEEE Trans Softw Eng 39(8):1144\u20131156. https:\/\/doi.org\/10.1109\/TSE.2012.89","journal-title":"IEEE Trans Softw Eng"},{"key":"11441_CR52","doi-asserted-by":"publisher","first-page":"212","DOI":"10.3390\/sym11020212","volume":"11","author":"L Son","year":"2019","unstructured":"Son L, Pritam N, Khari M, Kumar R, Phuong P, Pham T (2019) Empirical study of software defect prediction: A systematic mapping. Symmetry 11:212","journal-title":"Symmetry"},{"issue":"5","key":"11441_CR53","doi-asserted-by":"publisher","first-page":"540","DOI":"10.1007\/s10664-008-9103-7","volume":"14","author":"B Turhan","year":"2009","unstructured":"Turhan B, Menzies T, Bener AB, Di Stefano J (2009) On the relative value of cross-company and within-company data for defect prediction. Empir Softw Eng 14(5):540\u2013578","journal-title":"Empir Softw Eng"},{"issue":"1","key":"11441_CR54","first-page":"1","volume":"1","author":"RS Wahono","year":"2015","unstructured":"Wahono RS (2015) A systematic literature review of software defect prediction: research trends, datasets, methods and frameworks. J Softw Eng 1(1):1\u201316","journal-title":"J Softw Eng"},{"key":"11441_CR55","doi-asserted-by":"crossref","unstructured":"Watanabe S, Kaiya H, Kaijiri K (2008) Adapting a fault prediction model to allow inter languagereuse. In: Proceedings of the 4th international workshop on predictor models in software engineering, ser. PROMISE \u201908. ACM, New York, pp 19\u201324","DOI":"10.1145\/1370788.1370794"},{"issue":"5","key":"11441_CR56","doi-asserted-by":"publisher","first-page":"1039","DOI":"10.1007\/s11390-019-1959-z","volume":"34","author":"Z Xu","year":"2019","unstructured":"Xu Z, Pang S, Zhang T, Luo X-P, Liu J, Tang Y-T, Yu X, Xue L (2019) Cross project defect prediction via balanced distribution adaptation based transfer learning. J Comput Sci Technol 34(5):1039\u20131062","journal-title":"J Comput Sci Technol"},{"key":"11441_CR57","doi-asserted-by":"crossref","unstructured":"Yan M, Fang Y, Lo D, Xia X, Zhang X (2017) File-level defect prediction: Unsupervised vs. supervised models. In: 2017 ACM\/IEEE international symposium on empirical software engineering and measurement (ESEM). pp 344\u2013353","DOI":"10.1109\/ESEM.2017.48"},{"key":"11441_CR58","doi-asserted-by":"crossref","unstructured":"Yang J, Qian H (2016) Defect prediction on unlabeled datasets by using unsupervised clustering. In: 2016 IEEE 18th international conference on high performance computing and communications; IEEE 14th international conference on Smart City; IEEE 2nd international conference on data science and systems (HPCC\/SmartCity\/DSS), pp 465\u2013472","DOI":"10.1109\/HPCC-SmartCity-DSS.2016.0073"},{"key":"11441_CR59","doi-asserted-by":"crossref","unstructured":"Yang Y, Zhou Y, Liu J, Zhao Y, Lu H, Xu L, Xu B, Leung H (2016) Effort-aware just-in-time defect prediction: simple unsupervised models could be better than supervised models. In: Proceedings of the 2016 24th ACM SIGSOFT international symposium on foundations of software engineering. ACM, pp 157\u2013168","DOI":"10.1145\/2950290.2950353"},{"key":"11441_CR60","doi-asserted-by":"crossref","unstructured":"Yang Y, Yang J, Qian H (2018) Defect prediction by using cluster ensembles. In: 2018 tenth international conference on advanced computational intelligence (ICACI), pp 631\u2013636","DOI":"10.1109\/ICACI.2018.8377533"},{"key":"11441_CR61","doi-asserted-by":"crossref","unstructured":"Yuan X, Khoshgoftaar TM, Allen EB, Ganesan K (2000) An application of fuzzy clustering to software quality prediction. In: Proceedings 3rd IEEE symposium on application-specific systems and software engineering technology, pp 85\u201390","DOI":"10.1109\/ASSET.2000.888052"},{"key":"11441_CR62","doi-asserted-by":"crossref","unstructured":"Zakari A, Lee SP (2019) Simultaneous isolation of software faults for effective fault localization. In: 2019 IEEE 15th international colloquium on signal processing & its applications (CSPA). IEEE, pp 16\u201320","DOI":"10.1109\/CSPA.2019.8696018"},{"key":"11441_CR63","doi-asserted-by":"publisher","first-page":"110059","DOI":"10.1109\/ACCESS.2020.3001440","volume":"8","author":"J Zhang","year":"2020","unstructured":"Zhang J, Wu J, Chen C, Zheng Z, Lyu MR (2020) Cds: A cross\u2013version software defect prediction model with data selection. IEEE Access 8:110059\u2013110072","journal-title":"IEEE Access"},{"key":"11441_CR64","unstructured":"Zhong Shi, Khoshgoftaar TM, Seliya N (2004) Unsupervised learning for expert-based software quality estimation. In: Eighth IEEE international symposium on high assurance systems engineering, 2004. Proceedings., pp 149\u2013155"},{"key":"11441_CR65","unstructured":"Zhuang F, Qi Z, Duan K, Xi D, Zhu Y, Zhu H, Xiong H, He Q (2019) A comprehensive survey on transfer learning. arXiv:1911.02685"},{"key":"11441_CR66","doi-asserted-by":"crossref","unstructured":"Zimmermann T, Nagappan N (2008) Predicting defects using network analysis on dependency graphs. In: 2008 ACM\/IEEE 30th international conference on software engineering, pp 531\u2013540","DOI":"10.1145\/1368088.1368161"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11441-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11441-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11441-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,13]],"date-time":"2022-04-13T19:52:25Z","timestamp":1649879545000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11441-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,8]]},"references-count":66,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["11441"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11441-7","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2022,1,8]]},"assertion":[{"value":"30 July 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 August 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 August 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 January 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}