{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T06:49:14Z","timestamp":1774334954386,"version":"3.50.1"},"reference-count":67,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,9,25]],"date-time":"2020-09-25T00:00:00Z","timestamp":1600992000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,25]],"date-time":"2020-09-25T00:00:00Z","timestamp":1600992000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61502058"],"award-info":[{"award-number":["61502058"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572085"],"award-info":[{"award-number":["61572085"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61976028"],"award-info":[{"award-number":["61976028"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Process Lett"],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.1007\/s11063-020-10355-z","type":"journal-article","created":{"date-parts":[[2020,9,25]],"date-time":"2020-09-25T04:12:09Z","timestamp":1601007129000},"page":"2415-2449","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Cost-sensitive Dictionary Learning for Software Defect Prediction"],"prefix":"10.1007","volume":"52","author":[{"given":"Liang","family":"Niu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4637-1515","authenticated-orcid":false,"given":"Jianwu","family":"Wan","sequence":"additional","affiliation":[]},{"given":"Hongyuan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Kaiwei","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,25]]},"reference":[{"issue":"1","key":"10355_CR1","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/TSE.2007.256941","volume":"33","author":"T Menzies","year":"2006","unstructured":"Menzies T, Greenwald J, Frank A (2006) Data mining static code attributes to learn defect predictors. IEEE Trans Softw Eng 33(1):2\u201313","journal-title":"IEEE Trans Softw Eng"},{"issue":"6","key":"10355_CR2","doi-asserted-by":"crossref","first-page":"603","DOI":"10.1109\/TSE.2014.2322358","volume":"40","author":"M Shepperd","year":"2014","unstructured":"Shepperd M, Bowes D, Hall T (2014) Researcher bias: the use of machine learning in software defect prediction. IEEE Trans Softw Eng 40(6):603\u2013616","journal-title":"IEEE Trans Softw Eng"},{"issue":"3","key":"10355_CR3","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1049\/iet-sen.2017.0148","volume":"12","author":"ZQ Li","year":"2018","unstructured":"Li ZQ, Jing XY, Zhu XK (2018) Progress on approaches to software defect prediction. IET Softw 12(3):161\u2013175","journal-title":"IET Softw"},{"key":"10355_CR4","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-27662-9","volume-title":"Foundations of empirical software engineering: the legacy of Victor R.Basuli","author":"BW Boehm","year":"2005","unstructured":"Boehm BW, Basili VR (2005) Foundations of empirical software engineering: the legacy of Victor R.Basuli. Springer, Berlin"},{"issue":"10","key":"10355_CR5","doi-asserted-by":"crossref","first-page":"1462","DOI":"10.1109\/32.6191","volume":"14","author":"BW Boehm","year":"1988","unstructured":"Boehm BW, Papaccio PN (1988) Understanding and controlling software costs. IEEE Trans Softw Eng 14(10):1462\u20131477","journal-title":"IEEE Trans Softw Eng"},{"issue":"4","key":"10355_CR6","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1109\/TSE.1976.233837","volume":"2","author":"TJ McCabe","year":"1976","unstructured":"McCabe TJ (1976) A complexity measure. IEEE Trans Softw Eng 2(4):308\u2013320","journal-title":"IEEE Trans Softw Eng"},{"key":"10355_CR7","volume-title":"Elements of software science","author":"MH Halstead","year":"1977","unstructured":"Halstead MH (1977) Elements of software science. Elsevier, North-Holland"},{"issue":"6","key":"10355_CR8","doi-asserted-by":"crossref","first-page":"476","DOI":"10.1109\/32.295895","volume":"20","author":"SR Chidamber","year":"1994","unstructured":"Chidamber SR, Kemerer CF (1994) A metrics suite for object oriented design. IEEE Trans Softw Eng 20(6):476\u2013493","journal-title":"IEEE Trans Softw Eng"},{"issue":"9","key":"10355_CR9","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1016\/j.ipl.2014.03.012","volume":"114","author":"Y Ma","year":"2014","unstructured":"Ma Y, Zhu S, Qin K, Luo G (2014) Combining the requirement information for software defect estimation in design time. Inf Process Lett 114(9):469\u2013474","journal-title":"Inf Process Lett"},{"key":"10355_CR10","doi-asserted-by":"crossref","unstructured":"Jiang Y, Cuki B, Menzies T, Bartlow N (2008) Comparing design and code metrics for software quality prediction. In: Proceedings of the 4th international workshop on predictor models in software engineering, pp 11\u201318","DOI":"10.1145\/1370788.1370793"},{"key":"10355_CR11","doi-asserted-by":"crossref","unstructured":"Gray D, Bowes D, Davey N, Sun Y, Christianson B (2009) Using the support vector machine as a classification method for software defect prediction with static code metrics. In: Proceedings of international conference on engineering applications of neural networks, pp 223\u2013234","DOI":"10.1007\/978-3-642-03969-0_21"},{"issue":"5","key":"10355_CR12","doi-asserted-by":"crossref","first-page":"649","DOI":"10.1016\/j.jss.2007.07.040","volume":"81","author":"KO Elish","year":"2008","unstructured":"Elish KO, Elish MO (2008) Predicting defect-prone software modules using support vector machines. J Syst Soft 81(5):649\u2013660","journal-title":"J Syst Soft"},{"key":"10355_CR13","doi-asserted-by":"crossref","unstructured":"Wang J, Shen B, Chen Y (2012) Compressed C4.5 models for software defect prediction. In: Proceedings of 12th international conference on quality software, pp 13\u201316","DOI":"10.1109\/QSIC.2012.19"},{"key":"10355_CR14","unstructured":"Khoshgoftaar TM, Seliya N (2002) Tree-based software quality estimation models for fault prediction. In: Proceedings of eighth IEEE symposium on software metrics, pp 203\u2013214"},{"key":"10355_CR15","doi-asserted-by":"crossref","unstructured":"Wang T, Li WH (2010) Naive Bayes software defect prediction model. In: Proceedings of 2010 international conference on computational intelligence and software engineering, pp 1\u20134","DOI":"10.1109\/CISE.2010.5677057"},{"key":"10355_CR16","doi-asserted-by":"crossref","unstructured":"Amasaki S, Takagi Y, Mizuno O, Kikuno T (2003) A Bayesian belief network for assessing the likelihood of fault content. In: Proceedings of 14th international symposium on software reliability engineering, pp 215\u2013226","DOI":"10.1109\/ISSRE.2003.1251044"},{"issue":"4","key":"10355_CR17","doi-asserted-by":"crossref","first-page":"902","DOI":"10.1109\/72.595888","volume":"8","author":"TM Khoshgoftaar","year":"1997","unstructured":"Khoshgoftaar TM, Allen EB, Hudepohl JP, Aud SJ (1997) Application of neural networks to software quality modeling of a very large telecommunications system. IEEE Trans Neural Netw 8(4):902\u2013909","journal-title":"IEEE Trans Neural Netw"},{"key":"10355_CR18","doi-asserted-by":"crossref","unstructured":"Singh Y, Kaur A, Malhotra R (2008) Predicting software fault proneness model using neural network. In: Proceedings of international conference on product focused software process improvement, pp 204\u2013214","DOI":"10.1007\/978-3-540-69566-0_18"},{"issue":"2","key":"10355_CR19","doi-asserted-by":"crossref","first-page":"676","DOI":"10.1109\/TR.2014.2316951","volume":"63","author":"MX Liu","year":"2014","unstructured":"Liu MX, Miao LS, Zhang DQ (2014) Two-stage cost-sensitive learning for software defect prediction. IEEE Trans Reliab 63(2):676\u2013686","journal-title":"IEEE Trans Reliab"},{"key":"10355_CR20","doi-asserted-by":"crossref","unstructured":"Yang M, Zhang L, Feng X, Zhang D (2011) Fisher discrimination dictionary learning for sparse representation. In: Proceedings of 2011 international conference on computer vision, pp 543\u2013550","DOI":"10.1109\/ICCV.2011.6126286"},{"issue":"5","key":"10355_CR21","doi-asserted-by":"crossref","first-page":"1835","DOI":"10.1016\/j.patcog.2013.11.007","volume":"47","author":"HD Liu","year":"2014","unstructured":"Liu HD, Yang M, Gao Y, Yin YL, Chen L (2014) Bilinear discriminative dictionary learning for face recognition. Pattern Recognit 47(5):1835\u20131845","journal-title":"Pattern Recognit"},{"key":"10355_CR22","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1016\/j.jss.2018.06.025","volume":"144","author":"R \u00d6zak\u0131nc\u0131","year":"2018","unstructured":"\u00d6zak\u0131nc\u0131 R, Tarhan A (2018) Early software defect prediction: a systematic map and review. J Syst Softw 144:216\u2013239","journal-title":"J Syst Softw"},{"issue":"2","key":"10355_CR23","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1007\/s10462-017-9563-5","volume":"51","author":"SS Rathore","year":"2019","unstructured":"Rathore SS, Kumar S (2019) A study on software fault prediction techniques. Artif Intell Rev 51(2):255\u2013327","journal-title":"Artif Intell Rev"},{"key":"10355_CR24","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1016\/j.infsof.2018.10.004","volume":"106","author":"Z Xu","year":"2019","unstructured":"Xu Z, Liu J, Luo X, Yang Z, Zhang Y, Yuan P, Zhang T (2019) Software defect prediction based on kernel PCA and weighted extreme learning machine. Inf Softw Technol 106:182\u2013200","journal-title":"Inf Softw Technol"},{"issue":"1","key":"10355_CR25","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/s10515-016-0194-x","volume":"24","author":"ZW Zhang","year":"2017","unstructured":"Zhang ZW, Jing XY, Wang TJ (2017) Label propagation based semi-supervised learning for software defect prediction. Automat Softw Eng 24(1):47\u201369","journal-title":"Automat Softw Eng"},{"issue":"4","key":"10355_CR26","doi-asserted-by":"crossref","first-page":"1925","DOI":"10.1007\/s10664-018-9679-5","volume":"24","author":"M Kondo","year":"2019","unstructured":"Kondo M, Bezemer CP, Kamei Y, Hassan AE, Mizuno O (2019) The impact of feature reduction techniques on defect prediction models. Empir Softw Eng 24(4):1925\u20131963","journal-title":"Empir Softw Eng"},{"key":"10355_CR27","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1016\/j.infsof.2017.03.007","volume":"87","author":"X Yang","year":"2017","unstructured":"Yang X, Lo D, Xia X, Sun J (2017) TLEL: a two-layer ensemble learning approach for just-in-time defect prediction. Inf Softw Technol 87:206\u2013220","journal-title":"Inf Softw Technol"},{"key":"10355_CR28","doi-asserted-by":"crossref","unstructured":"Xu Z, Liu J, Luo X, Zhang T (2018) Cross-version defect prediction via hybrid active learning with kernel principal component analysis. In: Proceedings of IEEE 25th international conference on software analysis, evolution and reengineering (SANER), pp. 209\u2013220","DOI":"10.1109\/SANER.2018.8330210"},{"key":"10355_CR29","doi-asserted-by":"crossref","unstructured":"Jing XY, Wu F, Dong X, Qi F, Xu B (2015) Heterogeneous cross-company defect prediction by unified metric representation and CCA-based transfer learning. In: Proceedings of the 10th joint meeting on foundations of software engineering, pp 496\u2013507","DOI":"10.1145\/2786805.2786813"},{"issue":"2","key":"10355_CR30","doi-asserted-by":"crossref","first-page":"602","DOI":"10.1007\/s10664-018-9633-6","volume":"24","author":"KE Bennin","year":"2019","unstructured":"Bennin KE, Keung JW, Monden A (2019) On the relative value of data resampling approaches for software defect prediction. Empir Softw Eng 24(2):602\u2013636","journal-title":"Empir Softw Eng"},{"issue":"9","key":"10355_CR31","doi-asserted-by":"crossref","first-page":"1263","DOI":"10.1109\/TKDE.2008.239","volume":"21","author":"H He","year":"2009","unstructured":"He H, Garcia EA (2009) Learning from imbalanced data. IEEE Trans Knowl Data Eng 21(9):1263\u20131284","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"25","key":"10355_CR32","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1016\/j.neucom.2014.10.059","volume":"152","author":"JW Wan","year":"2015","unstructured":"Wan JW, Yang M, Chen YJ (2015) Discriminative cost sensitive Laplacian score for face recognition. Neurocomputing 152(25):333\u2013344","journal-title":"Neurocomputing"},{"issue":"2","key":"10355_CR33","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1007\/s11063-016-9532-z","volume":"45","author":"JW Wan","year":"2017","unstructured":"Wan JW, Wang HY, Yang M (2017) Cost sensitive semi-supervised canonical correlation analysis for multi-view dimensionality reduction. Neural Process Lett 45(2):411\u2013430","journal-title":"Neural Process Lett"},{"key":"10355_CR34","doi-asserted-by":"crossref","unstructured":"Khoshgoftaar TM, Geleyn E, Nguyen L, Bullard L (2002) Cost-sensitive boosting in software quality modeling. In: Proceedings of international symposium on high assurance systems engineering, pp 51\u201360","DOI":"10.1109\/HASE.2002.1173102"},{"issue":"6","key":"10355_CR35","doi-asserted-by":"crossref","first-page":"4537","DOI":"10.1016\/j.eswa.2009.12.056","volume":"37","author":"J Zheng","year":"2010","unstructured":"Zheng J (2010) Cost-sensitive boosting neural networks for software defect prediction. Expert Syst Appl 37(6):4537\u20134543","journal-title":"Expert Syst Appl"},{"key":"10355_CR36","doi-asserted-by":"crossref","unstructured":"Moser R, Pedrycz W, Succi G (2008) A comparative analysis of the efficiency of change metrics and static code attributes for defect prediction. In: Proceedings of 30th international conference on software engineering, pp 181\u2013190","DOI":"10.1145\/1368088.1368114"},{"issue":"5","key":"10355_CR37","doi-asserted-by":"crossref","first-page":"2019","DOI":"10.1109\/TIP.2014.2311377","volume":"23","author":"J Yu","year":"2014","unstructured":"Yu J, Rui Y, Tao DC (2014) Click prediction for web image reranking using multimodal sparse coding. IEEE Trans Image Process 23(5):2019\u20132032","journal-title":"IEEE Trans Image Process"},{"key":"10355_CR38","doi-asserted-by":"publisher","unstructured":"Yu J, Tan M, Zhang H, Tao DC, Rui Y (2019) Hierarchical deep click feature prediction for fine-grained image recognition. IEEE Trans Pattern Anal Mach Intell. https:\/\/doi.org\/10.1109\/TPAMI.2019.2932058","DOI":"10.1109\/TPAMI.2019.2932058"},{"issue":"2","key":"10355_CR39","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1109\/TPAMI.2008.79","volume":"31","author":"J Wright","year":"2008","unstructured":"Wright J, Yang AY, Ganesh A, Sastry SS, Ma Y (2008) Robust face recognition via sparse representation. IEEE Trans Pattern Anal Mach Intell 31(2):210\u2013227","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"10355_CR40","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1016\/j.patcog.2016.06.012","volume":"60","author":"GQ Zhang","year":"2016","unstructured":"Zhang GQ, Sun HJ, Ji ZX, Yuan YH, Sun QS (2016) Cost-sensitive dictionary learning for face recognition. Pattern Recognit 60:613\u2013629","journal-title":"Pattern Recognit"},{"issue":"2","key":"10355_CR41","doi-asserted-by":"crossref","first-page":"649","DOI":"10.1007\/s11063-016-9545-7","volume":"45","author":"F Wu","year":"2017","unstructured":"Wu F, Jing XY, Yue D (2017) Multi-view discriminant dictionary learning via learning view-specific and shared structured dictionaries for image classification. Neural Process Lett 45(2):649\u2013666","journal-title":"Neural Process Lett"},{"key":"10355_CR42","doi-asserted-by":"crossref","unstructured":"Zhang Z, Sun Y, Wang Y, Zha Z, Yan SC, Wang M (2019) Convolutional dictionary pair learning network for image representation learning. arXiv:1912.12138","DOI":"10.36227\/techrxiv.11459574"},{"issue":"3","key":"10355_CR43","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1109\/TIM.2016.2514779","volume":"65","author":"H Liu","year":"2016","unstructured":"Liu H, Guo D, Sun F (2016) Object recognition using tactile measurements: kernel sparse coding methods. IEEE Trans Instrum Meas 65(3):656\u2013665","journal-title":"IEEE Trans Instrum Meas"},{"issue":"3","key":"10355_CR44","doi-asserted-by":"crossref","first-page":"786","DOI":"10.1109\/TNNLS.2019.2910146","volume":"31","author":"Z Li","year":"2019","unstructured":"Li Z, Zhang Z, Qin J, Zhang Z, Shao L (2019) Discriminative fisher embedding dictionary learning algorithm for object recognition. IEEE Trans Neural Netw Learn Syst 31(3):786\u2013800","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"11","key":"10355_CR45","doi-asserted-by":"crossref","first-page":"3283","DOI":"10.1016\/j.patcog.2014.07.031","volume":"48","author":"A Shrivastava","year":"2015","unstructured":"Shrivastava A, Patel VM, Chellappa R (2015) Non-linear dictionary learning with partially labeled data. Pattern Recognit 48(11):3283\u20133292","journal-title":"Pattern Recognit"},{"key":"10355_CR46","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511809682","volume-title":"Kernel methods for pattern analysis","author":"J Shawe-Taylor","year":"2004","unstructured":"Shawe-Taylor J, Cristianini N (2004) Kernel methods for pattern analysis. Cambridge University Press, Cambridge"},{"key":"10355_CR47","doi-asserted-by":"crossref","unstructured":"Jing XY, Ying S, Zhang ZW, Wu SS, Liu J (2014) Dictionary learning based software defect prediction. In: Proceedings of the 36th international conference on software engineering, pp 414\u2013423","DOI":"10.1145\/2568225.2568320"},{"issue":"2","key":"10355_CR48","doi-asserted-by":"crossref","first-page":"581","DOI":"10.1109\/TR.2018.2804922","volume":"67","author":"F Wu","year":"2018","unstructured":"Wu F, Jing XY, Sun Y, Sun J, Huang L, Cui F, Sun Y (2018) Cross-project and within-project semisupervised software defect prediction: a unified approach. IEEE Trans Reliab 67(2):581\u2013597","journal-title":"IEEE Trans Reliab"},{"key":"10355_CR49","doi-asserted-by":"crossref","unstructured":"Wan JW, Yang M, Wang HY (2017) Cost sensitive matrix factorization for face recognition. In: Proceedings of intelligence data engineering and automated learning, pp 136\u2013145","DOI":"10.1007\/978-3-319-68935-7_16"},{"issue":"10","key":"10355_CR50","doi-asserted-by":"crossref","first-page":"1569","DOI":"10.1109\/TIFS.2014.2343833","volume":"9","author":"JW Wan","year":"2014","unstructured":"Wan JW, Yang M, Gao Y, Chen YJ (2014) Pairwise costs in semisupervised discriminant analysis for face recognition. IEEE Trans Inf Forensic Secur 9(10):1569\u20131580","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"3","key":"10355_CR51","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1109\/TKDE.2002.1000348","volume":"14","author":"KM Ting","year":"2002","unstructured":"Ting KM (2002) An instance-weighting method to induce cost-sensitive trees. IEEE Trans Knowl Data Eng 14(3):659\u2013665","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"10355_CR52","volume-title":"Pattern classification","author":"RO Duda","year":"2012","unstructured":"Duda RO, Hart PE, Stork DG (2012) Pattern classification. Wiley, Hoboken"},{"key":"10355_CR53","unstructured":"Rosasco L, Verri A, Santoro M, Mosci S, Villa S (2009) Iterative projection methods for structured sparsity regularization. MIT Technical Reports, MIT-CSAIL-TR-2009-050, CBCL-282"},{"key":"10355_CR54","doi-asserted-by":"crossref","unstructured":"Yang M, Zhang L, Yang J, Zhang D (2010) Metaface learning for sparse representation based face recognition. In: Proceedings of IEEE international conference on image processing, pp 1601\u20131604","DOI":"10.1109\/ICIP.2010.5652363"},{"issue":"9","key":"10355_CR55","doi-asserted-by":"crossref","first-page":"1208","DOI":"10.1109\/TSE.2013.11","volume":"39","author":"M Shepperd","year":"2013","unstructured":"Shepperd M, Song QB, Sun Z, Mair C (2013) Data quality: some comments on the nasa software defect datasets. IEEE Trans Softw Eng 39(9):1208\u20131215","journal-title":"IEEE Trans Softw Eng"},{"key":"10355_CR56","unstructured":"D\u2019Ambros M, Lanza M, Robbes R (2012) An extensive comparison of bug prediction approaches. In: Proceedings of IEEE working conference on mining software repositories, pp 31\u201341"},{"key":"10355_CR57","doi-asserted-by":"crossref","unstructured":"Wu R, Zhang H, Kim S, Cheung SC (2011) Relink: recovering links between bugs and changes. In: Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on foundations of software engineering, pp 15\u201325","DOI":"10.1145\/2025113.2025120"},{"key":"10355_CR58","doi-asserted-by":"crossref","unstructured":"Jureczko M, Madeyski L (2010) Towards identifying software project clusters with regard to defect prediction. In: Proceedings of the 6th international conference on predictive models in software engineering, pp 1\u201310","DOI":"10.1145\/1868328.1868342"},{"issue":"3","key":"10355_CR59","doi-asserted-by":"crossref","first-page":"923","DOI":"10.1007\/s11219-018-9436-4","volume":"27","author":"H Ji","year":"2019","unstructured":"Ji H, Huang S, Wu Y, Hui Z, Zheng C (2019) A new weighted naive Bayes method based on information diffusion for software defect prediction. Softw Qual J 27(3):923\u2013968","journal-title":"Softw Qual J"},{"issue":"7","key":"10355_CR60","doi-asserted-by":"crossref","first-page":"1729","DOI":"10.1109\/TIFS.2018.2885252","volume":"14","author":"JW Wan","year":"2019","unstructured":"Wan JW, Wang Y (2019) Cost-sensitive label propagation for semi-supervised face recognition. IEEE Trans Inf Forensic Secur 14(7):1729\u20131743","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"10355_CR61","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/j.jss.2019.03.027","volume":"154","author":"Z Xu","year":"2019","unstructured":"Xu Z, Li S, Luo X, Liu J, Zhang T, Tang Y, Keung J (2019) TSTSS: a two-stage training subset selection framework for cross version defect prediction. J Syst Soft 154:59\u201378","journal-title":"J Syst Soft"},{"key":"10355_CR62","unstructured":"Elkan C (2001) The foundations of cost-sensitive learning. In: Proceedings of international joint conference on artificial intelligence, pp 973\u2013978"},{"issue":"6","key":"10355_CR63","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1080\/03610928008827904","volume":"9","author":"RL Iman","year":"1980","unstructured":"Iman RL, Davenport JM (1980) Approximations of the critical region of the Friedman statistic. Commun Stat Theory Methods 9(6):571\u2013595","journal-title":"Commun Stat Theory Methods"},{"issue":"1","key":"10355_CR64","first-page":"1","volume":"7","author":"J Demsar","year":"2006","unstructured":"Demsar J (2006) Statistical comparisons of classifiers over multiple data sets. J Mach Learn Res 7(1):1\u201330","journal-title":"J Mach Learn Res"},{"issue":"200","key":"10355_CR65","doi-asserted-by":"crossref","first-page":"675","DOI":"10.1080\/01621459.1937.10503522","volume":"32","author":"M Friedman","year":"1937","unstructured":"Friedman M (1937) The use of ranks to avoid the assumption of normality implicit in the analysis of variance. J Am Stat Assoc 32(200):675\u2013701","journal-title":"J Am Stat Assoc"},{"key":"10355_CR66","unstructured":"Nemenyi PB (1963) Distribution-free multiple comparisons. PhD Thesis, Princeton University, Princeton"},{"key":"10355_CR67","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511804441","volume-title":"Convex optimization","author":"S Boyd","year":"2004","unstructured":"Boyd S, Boyd SP, Vandenberghe L (2004) Convex optimization. Cambridge University Press, Cambridge"}],"container-title":["Neural Processing Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11063-020-10355-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11063-020-10355-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11063-020-10355-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,25]],"date-time":"2021-09-25T02:25:16Z","timestamp":1632536716000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11063-020-10355-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,25]]},"references-count":67,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["10355"],"URL":"https:\/\/doi.org\/10.1007\/s11063-020-10355-z","relation":{},"ISSN":["1370-4621","1573-773X"],"issn-type":[{"value":"1370-4621","type":"print"},{"value":"1573-773X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,25]]},"assertion":[{"value":"16 September 2020","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 September 2020","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}