{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T05:42:59Z","timestamp":1775540579794,"version":"3.50.1"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,3,3]],"date-time":"2020-03-03T00:00:00Z","timestamp":1583193600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,3,3]],"date-time":"2020-03-03T00:00:00Z","timestamp":1583193600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"This work is supported by the National Natural Science Foundation of China","award":["No. 61902050"],"award-info":[{"award-number":["No. 61902050"]}]},{"name":"This work is supported by the National Natural Science Foundation of China","award":["No. 61672122"],"award-info":[{"award-number":["No. 61672122"]}]},{"name":"This work is supported by the National Natural Science Foundation of China","award":["No. 61602077"],"award-info":[{"award-number":["No. 61602077"]}]},{"name":"This work is supported by the National Natural Science Foundation of China","award":["No.61771087"],"award-info":[{"award-number":["No.61771087"]}]},{"name":"This work is supported by the National Natural Science Foundation of China","award":["No.51879027"],"award-info":[{"award-number":["No.51879027"]}]},{"name":"This work is supported by the National Natural Science Foundation of China","award":["No.51579024"],"award-info":[{"award-number":["No.51579024"]}]},{"name":"This work is supported by the National Natural Science Foundation of China","award":["No. 71831002"],"award-info":[{"award-number":["No. 71831002"]}]},{"DOI":"10.13039\/501100012269","name":"Science and Technology Innovative Research Team in Higher Educational Institutions of Hunan Province","doi-asserted-by":"crossref","award":["No. IRT 17R13"],"award-info":[{"award-number":["No. IRT 17R13"]}],"id":[{"id":"10.13039\/501100012269","id-type":"DOI","asserted-by":"crossref"}]},{"name":"the Fundamental Research Funds for the Central Universities","award":["NO. 3132019355"],"award-info":[{"award-number":["NO. 3132019355"]}]},{"name":"the Fundamental Research Funds for the Central Universities","award":["No. 3132019501"],"award-info":[{"award-number":["No. 3132019501"]}]},{"name":"the Fundamental Research Funds for the Central Universities","award":["No. 3132019502"],"award-info":[{"award-number":["No. 3132019502"]}]},{"name":"the Fundamental Research Funds for the Central Universities","award":["JLU"],"award-info":[{"award-number":["JLU"]}]},{"name":"Next-Generation Internet Innovation Project of CERNET","award":["No. NGII20190627"],"award-info":[{"award-number":["No. NGII20190627"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Process Lett"],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1007\/s11063-020-10213-y","type":"journal-article","created":{"date-parts":[[2020,3,3]],"date-time":"2020-03-03T15:02:52Z","timestamp":1583247772000},"page":"2589-2606","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":53,"title":["Developer Activity Motivated Bug Triaging: Via Convolutional Neural Network"],"prefix":"10.1007","volume":"51","author":[{"given":"Shikai","family":"Guo","sequence":"first","affiliation":[]},{"given":"Xinyi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xi","family":"Yang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5848-6398","authenticated-orcid":false,"given":"Rong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Chen","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[]},{"given":"Tingting","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,3]]},"reference":[{"issue":"8","key":"10213_CR1","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9(8):1735\u20131780","journal-title":"Neural Comput"},{"key":"10213_CR2","doi-asserted-by":"crossref","unstructured":"Jeong G, Kim S, Zimmermann T (2009) Improving bug triage with bug tossing graphs. In: ESEC\/SIGSOFT FSE 2009, pp 111\u2013120","DOI":"10.1145\/1595696.1595715"},{"issue":"12","key":"10213_CR3","doi-asserted-by":"publisher","first-page":"2406","DOI":"10.1109\/TFUZZ.2019.2899809","volume":"27","author":"R Chen","year":"2019","unstructured":"Chen R, Guo S, Wang X, Zhang T (2019) Fusion of multi-RSMOTE with fuzzy integral to classify bug reports with an imbalanced severity distribution. IEEE Trans Fuzzy Syst 27(12):2406\u20132420","journal-title":"IEEE Trans Fuzzy Syst"},{"key":"10213_CR4","unstructured":"Bugzilla, https:\/\/www.bugzilla.org\/. Accessed 7, 2019"},{"key":"10213_CR5","unstructured":"JIRA, https:\/\/www.atlassian.com\/software\/jira\/. Accessed 7, 2019"},{"issue":"8","key":"10213_CR6","first-page":"2322","volume":"29","author":"S Xi","year":"2018","unstructured":"Xi S (2018) DeepTriage: a bug report dispatching method based on cyclic neural network. J Softw 29(8):2322\u20132335","journal-title":"J Softw"},{"key":"10213_CR7","doi-asserted-by":"crossref","unstructured":"Anvik J, Hiew L, Murphy GC (2006) Who should fix this bug? In: ICSE 2006, pp 361\u2013370","DOI":"10.1145\/1134285.1134336"},{"issue":"1","key":"10213_CR8","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1109\/TKDE.2014.2324590","volume":"27","author":"J Xuan","year":"2015","unstructured":"Xuan J, Jiang H, Yan H, Ren Z, Zou W, Luo Z, Xindong W (2015) Towards effective bug triage with software data reduction techniques. IEEE Trans Knowl Data Eng 27(1):264\u2013280","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"10213_CR9","doi-asserted-by":"crossref","unstructured":"Bhattacharya P, Neamtiu I (2010) Fine-grained incremental learning and multi-feature tossing graphs to improve bug triaging. In: ICSM, pp 1\u201310","DOI":"10.1109\/ICSM.2010.5609736"},{"key":"10213_CR10","doi-asserted-by":"crossref","unstructured":"Tamrawi A, Nguyen TT, Al-Kofahi JM, Nguyen TN (2011) Fuzzy set and cache-based approach for bug triaging. In: SIGSOFT FSE 2011, pp 365\u2013375","DOI":"10.1145\/2025113.2025163"},{"key":"10213_CR11","unstructured":"Cubranic D, Murphy GC (2004) Automatic bug triage using text categorization. In: SEKE 2004, pp 92\u201397"},{"issue":"3","key":"10213_CR12","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1109\/TSE.2016.2576454","volume":"43","author":"X Xia","year":"2017","unstructured":"Xia X, Lo D, Ding Y, Al-Kofahi JM, Nguyen TN, Wang X (2017) Improving Automated Bug Triaging with Specialized Topic Model. IEEE Trans Softw Eng 43(3):272\u2013297","journal-title":"IEEE Trans Softw Eng"},{"key":"10213_CR13","doi-asserted-by":"crossref","unstructured":"Somasundaram K, Murphy GC (2012) Automatic categorization of bug reports using latent Dirichlet allocation. In: ISEC 2012, pp 125\u2013130","DOI":"10.1145\/2134254.2134276"},{"issue":"15","key":"10213_CR14","doi-asserted-by":"publisher","first-page":"4387","DOI":"10.1007\/s00500-016-2071-8","volume":"21","author":"W Deng","year":"2017","unstructured":"Deng W, Zhao H, Zou L, Li G, Yang X, Daqing W (2017) A novel collaborative optimization algorithm in solving complex optimization problems. Soft Comput 21(15):4387\u20134398","journal-title":"Soft Comput"},{"key":"10213_CR15","doi-asserted-by":"publisher","first-page":"45934","DOI":"10.1109\/ACCESS.2018.2865780","volume":"6","author":"S Guo","year":"2018","unstructured":"Guo S, Chen R, Wei M, Li H, Liu Y (2018) Ensemble data reduction techniques and multi-RSMOTE via fuzzy integral for bug report classification. IEEE Access 6:45934\u201345950","journal-title":"IEEE Access"},{"key":"10213_CR16","doi-asserted-by":"publisher","first-page":"99263","DOI":"10.1109\/ACCESS.2019.2929094","volume":"7","author":"H Zhao","year":"2019","unstructured":"Zhao H, Zheng J, Junjie X, Deng W (2019) Fault diagnosis method based on principal component analysis and broad learning system. IEEE Access 7:99263\u201399272","journal-title":"IEEE Access"},{"key":"10213_CR17","doi-asserted-by":"crossref","unstructured":"Yang G, Zhang T, Lee B (2014) Towards semi-automatic bug triage and severity prediction based on topic model and multi-feature of bug reports. In: COMPSAC 2014, pp 97\u2013106","DOI":"10.1109\/COMPSAC.2014.16"},{"issue":"2","key":"10213_CR18","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1142\/S0218194019500074","volume":"29","author":"S Guo","year":"2019","unstructured":"Guo S, Chen R, Li H, Zhang T, Liu Y (2019) Identify severity bug report with distribution imbalance by CR-SMOTE and ELM. Int J Softw Eng Knowl Eng 29(2):139\u2013175","journal-title":"Int J Softw Eng Knowl Eng"},{"key":"10213_CR19","unstructured":"Johnson R, Zhang T (2016) Supervised and semi-supervised text categorization using LSTM for region embeddings. In: ICML 2016, pp 526\u2013534"},{"key":"10213_CR20","doi-asserted-by":"crossref","unstructured":"Kim Y (2014) Convolutional neural networks for sentence classification. In: EMNLP 2014, pp 1746\u20131751","DOI":"10.3115\/v1\/D14-1181"},{"key":"10213_CR21","unstructured":"Eclipse bug database. https:\/\/bugs.eclipse.org\/bugs\/. Accessed 7, 2019"},{"key":"10213_CR22","unstructured":"Mozilla bug database. https:\/\/bugzilla.mozilla.org\/. Accessed 7, 2019"},{"key":"10213_CR23","unstructured":"Netbeans bug database. https:\/\/netbeans.org\/bugzilla\/. Accessed 7, 2019"},{"key":"10213_CR24","doi-asserted-by":"publisher","first-page":"20281","DOI":"10.1109\/ACCESS.2019.2897580","volume":"7","author":"W Deng","year":"2019","unstructured":"Deng W, Junjie X, Zhao H (2019) An improved ant colony optimization algorithm based on hybrid strategies for scheduling problem. IEEE Access 7:20281\u201320292","journal-title":"IEEE Access"},{"key":"10213_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/s11063-018-9940-3","author":"S Guo","year":"2019","unstructured":"Guo S, Liu Y, Chen R, Sun X, Wang X (2019) Using an improved SMOTE algorithm to deal imbalanced activity classes in smart home. Neural Processing Letters. https:\/\/doi.org\/10.1007\/s11063-018-9940-3","journal-title":"Neural Processing Letters."},{"key":"10213_CR26","doi-asserted-by":"crossref","unstructured":"Naguib H, Narayan N, Br\u00fcgge B, Helal D (2013) Bug report assignee recommendation using activity profiles. In: MSR 2013, pp 22\u201330","DOI":"10.1109\/MSR.2013.6623999"},{"key":"10213_CR27","doi-asserted-by":"crossref","unstructured":"Wu W, Zhang W, Yang Y, Wang Q (2011) DREX: developer recommendation with K-nearest-neighbor search and expertise ranking. In: Asia Pacific software engineering conference, APSEC 2011, pp 389\u2013396","DOI":"10.1109\/APSEC.2011.15"},{"key":"10213_CR28","doi-asserted-by":"crossref","unstructured":"Xie Z, Zhang W, Yang Y, Wang Q (2012) DRETOM: developer recommendation based on topic models for bug resolution. In: PROMISE 2012, pp 19\u201328","DOI":"10.1145\/2365324.2365329"},{"key":"10213_CR29","unstructured":"Xuan J, Jiang H, Ren Z, Yan J, Luo Z (2017) Automatic bug triage using semi-supervised text classification. CoRR abs\/1704.04769"},{"key":"10213_CR30","doi-asserted-by":"crossref","unstructured":"Xuan J, Jiang H, Ren Z, Zou W (2012) Developer prioritization in bug repositories. In: ICSE 2012, pp 25\u201335","DOI":"10.1109\/ICSE.2012.6227209"},{"key":"10213_CR31","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1016\/j.asoc.2017.06.004","volume":"59","author":"W Deng","year":"2017","unstructured":"Deng W, Zhao H, Yang X, Xiong J, Sun M, Li B (2017) Study on an improved adaptive PSO algorithm for solving multi-objective gate assignment. Appl Soft Comput 59:288\u2013302","journal-title":"Appl Soft Comput"},{"key":"10213_CR32","doi-asserted-by":"crossref","unstructured":"Lamkanfi A, Demeyer S, Soetens QD, Verdonck T (2011) Comparing mining algorithms for predicting the severity of a reported bug. In: CSMR 2011, pp 249\u2013258","DOI":"10.1109\/CSMR.2011.31"},{"issue":"3","key":"10213_CR33","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1108\/00330330610681286","volume":"40","author":"MF Porter","year":"2006","unstructured":"Porter MF (2006) An algorithm for suffix stripping. Program 40(3):211\u2013218","journal-title":"Program"},{"key":"10213_CR34","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1016\/j.jss.2016.02.034","volume":"117","author":"T Zhang","year":"2016","unstructured":"Zhang T, Chen J, Yang G, Lee B, Luo X (2016) Towards more accurate severity prediction and fixer recommendation of software bugs. J Syst Softw 117:166\u2013184","journal-title":"J Syst Softw"},{"key":"10213_CR35","unstructured":"Weka. https:\/\/www.cs.waikato.ac.nz\/ml\/weka. Accessed 8, 2019"},{"issue":"4","key":"10213_CR36","first-page":"657","volume":"45","author":"C Jia","year":"2019","unstructured":"Jia C, Yu-Qi Z, Peng S, Yan-Tao W, Wang Yu (2019) Application of deep learning to 3D object reconstruction from a single image. Acta Autom Sin 45(4):657\u2013668","journal-title":"Acta Autom Sin"}],"container-title":["Neural Processing Letters"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11063-020-10213-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11063-020-10213-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11063-020-10213-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,3]],"date-time":"2021-03-03T00:57:06Z","timestamp":1614733026000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11063-020-10213-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,3]]},"references-count":36,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,6]]}},"alternative-id":["10213"],"URL":"https:\/\/doi.org\/10.1007\/s11063-020-10213-y","relation":{},"ISSN":["1370-4621","1573-773X"],"issn-type":[{"value":"1370-4621","type":"print"},{"value":"1573-773X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,3]]},"assertion":[{"value":"3 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}