{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T02:13:02Z","timestamp":1769739182267,"version":"3.49.0"},"reference-count":78,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,12,31]],"date-time":"2022-12-31T00:00:00Z","timestamp":1672444800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,12,31]],"date-time":"2022-12-31T00:00:00Z","timestamp":1672444800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100002790","name":"Canadian Network for Research and Innovation in Machining Technology, Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002790","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Software Qual J"],"published-print":{"date-parts":[[2023,9]]},"DOI":"10.1007\/s11219-022-09611-3","type":"journal-article","created":{"date-parts":[[2022,12,31]],"date-time":"2022-12-31T02:03:47Z","timestamp":1672452227000},"page":"775-807","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Utilizing source code syntax patterns to detect bug inducing commits using machine learning models"],"prefix":"10.1007","volume":"31","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1765-2462","authenticated-orcid":false,"given":"Md","family":"Nadim","sequence":"first","affiliation":[]},{"given":"Banani","family":"Roy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,31]]},"reference":[{"key":"9611_CR1","unstructured":"albertbup. (2017). A python implementation of deep belief networks built upon numpy and tensorflow with scikit-learn compatibility. https:\/\/github.com\/albertbup\/deep-belief-network"},{"key":"9611_CR2","doi-asserted-by":"crossref","unstructured":"Asaduzzaman, M., Roy, C. K., & Schneider, K. A. (2011). Viscad: Flexible code clone analysis support for nicad. In: Proceedings of the 5th International Workshop on Software Clones (IWSC\u201911). Association for Computing Machinery, New York, NY, USA, pp 77\u201378.","DOI":"10.1145\/1985404.1985425"},{"key":"9611_CR3","doi-asserted-by":"crossref","unstructured":"Asaduzzaman, M., Bullock, M. C., Roy, C. K., et al. (2012). Bug introducing changes: A case study with android. In: Proceedings of the 9th IEEE Working Conference on Mining Software Repositories (MSR\u201912), pp 116\u2013119.","DOI":"10.1109\/MSR.2012.6224267"},{"key":"9611_CR4","doi-asserted-by":"crossref","unstructured":"Asaduzzaman, M., Ahasanuzzaman, M., Roy, C. K., et al. (2016). How developers use exception handling in java? In: Proceedings of the IEEE\/ACM 13th Working Conference on Mining Software Repositories (MSR), pp 516\u2013519.","DOI":"10.1145\/2901739.2903500"},{"key":"9611_CR5","doi-asserted-by":"crossref","unstructured":"Aversano, L., Cerulo, L., & DelGrosso, C. (2007). Learning from bug-introducing changes to prevent fault prone code. In: Proceedings of the 9th International Workshop on Principles of Software Evolution: In Conjunction with the 6th ESEC\/FSE Joint Meeting (IWPSE\u201907), pp 19\u201326.","DOI":"10.1145\/1294948.1294954"},{"key":"9611_CR6","doi-asserted-by":"crossref","unstructured":"Bavota, G., DeCarluccio, B., DeLucia, A., et al. (2012). When does a refactoring induce bugs? an empirical study. In: Proceedings of the IEEE 12th International Working Conference on Source Code Analysis and Manipulation (SCAM\u201912), pp 104\u2013113.","DOI":"10.1109\/SCAM.2012.20"},{"key":"9611_CR7","doi-asserted-by":"crossref","unstructured":"Bernardi, M. L., Canfora, G., Di Lucca, G. A., et al. (2012). Do developers introduce bugs when they do not communicate? the case of eclipse and mozilla. In: Proceedings of the 16th European Conference on Software Maintenance and Reengineering (CSMR\u201912), pp 139\u2013148.","DOI":"10.1109\/CSMR.2012.24"},{"key":"9611_CR8","doi-asserted-by":"crossref","unstructured":"Borg, M., Svensson, O., Berg, K., et al. (2019). Szz unleashed: an open implementation of the szz algorithm - featuring example usage in a study of just-in-time bug prediction for the jenkins project. In: Proceedings of the 3rd ACM SIGSOFT International Workshop on Machine Learning Techniques for Software Quality Evaluation (MaLTeSQuE\u201919).","DOI":"10.1145\/3340482.3342742"},{"key":"9611_CR9","unstructured":"Brownlee, J. (2017). A gentle introduction to the bag-of-words model. https:\/\/machinelearningmastery.com\/gentle-introduction-bag-words-model\/. [Online; Accessed 28 Sept\u00a02021]."},{"key":"9611_CR10","doi-asserted-by":"crossref","unstructured":"Canfora, G., Ceccarelli, M., Cerulo, L., et al. (2011). How long does a bug survive? an empirical study. In: Proceedings of the 18th Working Conference on Reverse Engineering (WCRE\u201911), pp 191\u2013200.","DOI":"10.1109\/WCRE.2011.31"},{"key":"9611_CR11","unstructured":"Casalnuovo, C., Lee, K., Wang, H., et al. (2019). Do people prefer \u201cnatural\u201d code? CoRR."},{"issue":"2","key":"9611_CR12","first-page":"161","volume":"48113","author":"W Cavnar","year":"1994","unstructured":"Cavnar, W., & Trenkle, J. (1994). N-gram-based text categorization. Ann Arbor MI, 48113(2), 161\u2013175.","journal-title":"N-gram-based text categorization. Ann Arbor MI"},{"key":"9611_CR13","doi-asserted-by":"crossref","unstructured":"Cordy, J. R., & Roy, C. K. (2011). The nicad clone detector. In: Proceedings of the IEEE International Conference on Program Comprehension (ICPC\u201911), pp 219\u2013220.","DOI":"10.1109\/ICPC.2011.26"},{"issue":"7","key":"9611_CR14","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1109\/TSE.2016.2616306","volume":"43","author":"DA da Costa","year":"2017","unstructured":"da Costa, D. A., McIntosh, S., Shang, W., et al. (2017). A framework for evaluating the results of the szz approach for identifying bug-introducing changes. IEEE Transactions on Software Engineering, 43(7), 641\u2013657.","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"1","key":"9611_CR15","first-page":"107","volume":"26","author":"S Davies","year":"2014","unstructured":"Davies, S., Roper, M., & Wood, M. (2014). Comparing text-based and dependence-based approaches for determining the origins of bugs. Journal of Software: Evolution and Process, 26(1), 107\u2013139.","journal-title":"Journal of Software: Evolution and Process"},{"key":"9611_CR16","unstructured":"Developers.Google. (2020a). Classification: Precision and Recall - Machine Learning Crash Course. https:\/\/developers.google.com\/machine-learning\/crash-course\/classification\/precision-and-recall. Accessed 26 Aug\u00a02021."},{"key":"9611_CR17","unstructured":"Developers.Google. (2020b). Classification: ROC Curve and AUC - Machine Learning Crash Course. https:\/\/developers.google.com\/machine-learning\/crash-course\/classification\/roc-and-auc. Accessed 26 Aug\u00a02021."},{"key":"9611_CR18","doi-asserted-by":"crossref","unstructured":"Ell, J. (2013). Identifying failure inducing developer pairs within developer networks. In: Proceedings of the 35th International Conference on Software Engineering (ICSE\u201913), pp 1471\u20131473.","DOI":"10.1109\/ICSE.2013.6606748"},{"key":"9611_CR19","doi-asserted-by":"crossref","unstructured":"Eyolfson, J., Tan, L., & Lam, P. (2011). Do time of day and developer experience affect commit bugginess? In: Proceedings of the 8th Working Conference on Mining Software Repositories (MSR\u201911), pp 153\u2013162.","DOI":"10.1145\/1985441.1985464"},{"key":"9611_CR20","doi-asserted-by":"crossref","unstructured":"Fukushima, T., Kamei, Y., McIntosh, S., et al. (2014). An empirical study of just-in-time defect prediction using cross-project models. In: Proceedings of the 11th Working Conference on Mining Software Repositories (MSR\u201914), pp 172\u2013181.","DOI":"10.1145\/2597073.2597075"},{"key":"9611_CR21","doi-asserted-by":"crossref","unstructured":"Goues, C. L., Pradel, M., & Roychoudhury, A. (2019). Automated program repair. Communications of the ACM, p. 56\u201365.","DOI":"10.1145\/3318162"},{"key":"9611_CR22","doi-asserted-by":"crossref","unstructured":"Gu, Z., Barr, E. T., Hamilton, D. J., et al. (2010). Has the bug really been fixed? In: Proceedings of the 32nd ACM\/IEEE International Conference on Software Engineering (ICSE\u201910), pp 55\u201364.","DOI":"10.1145\/1806799.1806812"},{"issue":"6","key":"9611_CR23","doi-asserted-by":"publisher","first-page":"1276","DOI":"10.1109\/TSE.2011.103","volume":"38","author":"T Hall","year":"2012","unstructured":"Hall, T., Beecham, S., Bowes, D., et al. (2012). A systematic literature review on fault prediction performance in software engineering. IEEE Transactions on Software Engineering, 38(6), 1276\u20131304.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"9611_CR24","doi-asserted-by":"crossref","unstructured":"Hinton, G. E. (2007). Learning multiple layers of representation. Trends in Cognitive Sciences, 11(10), 428\u2013434.","DOI":"10.1016\/j.tics.2007.09.004"},{"issue":"5786","key":"9611_CR25","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1126\/science.1127647","volume":"313","author":"GE Hinton","year":"2006","unstructured":"Hinton, G. E., & Salakhutdinov, R. (2006). Reducing the dimensionality of data with neural networks. Science, 313(5786), 504\u2013507.","journal-title":"Science"},{"key":"9611_CR26","doi-asserted-by":"crossref","unstructured":"Hinton, G. E., Osindero, S., & Teh, Y. W. (2006). A fast learning algorithm for deep belief nets. Neural Computation, 18(7), 1527\u20131554.","DOI":"10.1162\/neco.2006.18.7.1527"},{"key":"9611_CR27","doi-asserted-by":"crossref","unstructured":"Hoang, T., Khanh Dam, H., Kamei, Y., et al. (2019). Deepjit: An end-to-end deep learning framework for just-in-time defect prediction. In: Proceedings of the IEEE\/ACM 16th International Conference on Mining Software Repositories (MSR\u201919), pp 34\u201345.","DOI":"10.1109\/MSR.2019.00016"},{"key":"9611_CR28","doi-asserted-by":"crossref","unstructured":"Hoang, T., Kang, H. J., Lo, D., et al. (2020). Cc2vec: Distributed representations of code changes. In: Proceedings of the IEEE\/ACM 42nd International Conference on Software Engineering (ICSE\u201920), pp 518\u2013529.","DOI":"10.1145\/3377811.3380361"},{"key":"9611_CR29","doi-asserted-by":"crossref","unstructured":"Jeffrey, D., Feng, M., Neelam, G., et al. (2009). Bugfix: A learning-based tool to assist developers in fixing bugs. In: Proceedings of the IEEE 17th International Conference on Program Comprehension, pp 70\u201379.","DOI":"10.1109\/ICPC.2009.5090029"},{"key":"9611_CR30","doi-asserted-by":"crossref","unstructured":"Jiang, J., Xiong, Y., Zhang, H, et al. (2018). Shaping program repair space with existing patches and similar code. In: Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA\u201918), p 298\u2013309.","DOI":"10.1145\/3213846.3213871"},{"key":"9611_CR31","doi-asserted-by":"publisher","unstructured":"Jimenez, M., Maxime, C., LeTraon, Y., et al. (2018). On the impact of tokenizer and parameters on n-gram based code analysis. In: 2018 IEEE International Conference on Software Maintenance and Evolution (ICSME), pp 437\u2013448. https:\/\/doi.org\/10.1109\/ICSME.2018.00053","DOI":"10.1109\/ICSME.2018.00053"},{"key":"9611_CR32","doi-asserted-by":"crossref","unstructured":"Kamei, Y., Shihab, E., Adams, B., et al. (2013). A large-scale empirical study of just-in-time quality assurance. IEEE Transactions on Software Engineering, pp. 757\u2013773.","DOI":"10.1109\/TSE.2012.70"},{"key":"9611_CR33","doi-asserted-by":"crossref","unstructured":"Kamei, Y., Fukushima, T., Mcintosh, S., et al. (2016). Studying just-in-time defect prediction using cross-project models. Empirical Software Engineering, p\u00a02072\u20132106.","DOI":"10.1007\/s10664-015-9400-x"},{"key":"9611_CR34","doi-asserted-by":"crossref","unstructured":"Kim, D., Nam, J., Song, J., et al. (2013). Automatic patch generation learned from human-written patches. In: Proceedings of the 2013 International Conference on Software Engineering (ICSE \u201913), p 802\u2013811.","DOI":"10.1109\/ICSE.2013.6606626"},{"key":"9611_CR35","doi-asserted-by":"crossref","unstructured":"Kim, S., & Whitehead Jr, E. J. (2006). How long did it take to fix bugs? In: Proceedings of the International Workshop on Mining Software Repositories (MSR\u201906), pp 173 \u2013 174.","DOI":"10.1145\/1137983.1138027"},{"key":"9611_CR36","doi-asserted-by":"crossref","unstructured":"Kim, S., Pan, K., Whitehead, E. E. J. (2006a). Memories of bug fixes. In: Proceedings of the 14th ACM SIGSOFT International Symposium on Foundations of Software Engineering. Association for Computing Machinery, New York, NY, USA, SIGSOFT \u201906\/FSE-14, p 35\u201345.\u00a0https:\/\/doi.org\/10.1145\/1181775.1181781","DOI":"10.1145\/1181775.1181781"},{"key":"9611_CR37","doi-asserted-by":"crossref","unstructured":"Kim, S., Zimmermann, T., Pan, K., et al. (2006b). Automatic identification of bug-introducing changes. In: Proceedings of the 21st IEEE\/ACM International Conference on Automated Software Engineering (ASE\u201906), pp 81\u201390.","DOI":"10.1109\/ASE.2006.23"},{"key":"9611_CR38","doi-asserted-by":"crossref","unstructured":"Kim, S., Zimmermann, T., Whitehead Jr, E. J., et al. (2007). Predicting faults from cached history. In: Proceedings of the 29th International Conference on Software Engineering (ICSE\u201907), pp 489\u2013498.","DOI":"10.1109\/ICSE.2007.66"},{"issue":"2","key":"9611_CR39","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1109\/TSE.2007.70773","volume":"34","author":"S Kim","year":"2008","unstructured":"Kim, S., Whitehead, E. J., Jr, & Zhang, Y. (2008). Classifying software changes: Clean or buggy? IEEE Transactions on Software Engineering, 34(2), 181\u2013196.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"9611_CR40","doi-asserted-by":"publisher","unstructured":"Kirch, W., (ed). (2008). Pearson\u2019s Correlation Coefficient, Springer Netherlands, Dordrecht, pp 1090\u20131091. https:\/\/doi.org\/10.1007\/978-1-4020-5614-7_2569","DOI":"10.1007\/978-1-4020-5614-7_2569"},{"key":"9611_CR41","unstructured":"Le, Q., & Mikolov, T. (2014). Distributed representations of sentences and documents. In: Proceedings of the 31st International Conference on International Conference on Machine Learning, 32(ICML\u201914), II\u20131188\u2013II\u20131196."},{"key":"9611_CR42","doi-asserted-by":"crossref","unstructured":"Li, K., Xiang, Z., Chen, T., et al. (2020a). Understanding the automated parameter optimization on transfer learning for cross-project defect prediction: An empirical study. In: Proceedings of the IEEE\/ACM 42nd International Conference on Software Engineering (ICSE\u201920), pp 566\u2013577.","DOI":"10.1145\/3377811.3380360"},{"key":"9611_CR43","doi-asserted-by":"crossref","unstructured":"Li, Y., Wang, S., Nguyen, T. N. (2020b). Dlfix: Context-based code transformation learning for automated program repair. In: Proceedings of the IEEE\/ACM 42nd International Conference on Software Engineering (ICSE\u201920), pp 602\u2013614.","DOI":"10.1145\/3377811.3380345"},{"key":"9611_CR44","doi-asserted-by":"crossref","unstructured":"Liu, K., Koyuncu, A., Kim, D., et al. (2019). Tbar: Revisiting template-based automated program repair. In: Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA\u201919), p 31\u201342.","DOI":"10.1145\/3293882.3330577"},{"key":"9611_CR45","doi-asserted-by":"crossref","unstructured":"Martinez, M., & Monperrus, M. (2015). Mining software repair models for reasoning on the search space of automated program fixing. Empirical Software Engineering, p 176\u2013205.","DOI":"10.1007\/s10664-013-9282-8"},{"key":"9611_CR46","doi-asserted-by":"crossref","unstructured":"Martinez, M., Weimer, W., & Monperrus, M. (2014). Do the fix ingredients already exist? an empirical inquiry into the redundancy assumptions of program repair approaches. In: Companion Proceedings of the 36th International Conference on Software Engineering, p 492\u2013495.","DOI":"10.1145\/2591062.2591114"},{"issue":"1","key":"9611_CR47","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1504\/IJRS.2013.055822","volume":"7","author":"O Mizuno","year":"2013","unstructured":"Mizuno, O., & Hata, H. (2013). A metric to detect fault-prone software modules using text filtering. International Journal of Reliability and Safety, 7(1), 17\u201331.","journal-title":"International Journal of Reliability and Safety"},{"key":"9611_CR48","unstructured":"Nadim, M. (2020). Investigating the techniques to detect and reduce bug inducing commits during change operations in software systems. Master\u2019s thesis, University of Saskatchewan, Saskatoon, Canada, https:\/\/harvest.usask.ca\/handle\/10388\/13125"},{"key":"9611_CR49","doi-asserted-by":"crossref","unstructured":"Nadim, M., Mondal, M., & Roy, C. K. (2020). Evaluating performance of clone detection tools in detecting cloned cochange candidates. In: Proceedings of the 14th International Workshop on Software Clones (IWSC\u201920), pp 15\u201321.","DOI":"10.1109\/IWSC50091.2020.9047639"},{"key":"9611_CR50","doi-asserted-by":"crossref","unstructured":"Nayrolles, M., & Hamou-Lhadj, A. (2018). Clever: Combining code metrics with clone detection for just-in-time fault prevention and resolution in large industrial projects. In: Proceedings of the IEEE\/ACM 15th International Conference on Mining Software Repositories (MSR\u201918), pp 153\u2013164.","DOI":"10.1145\/3196398.3196438"},{"key":"9611_CR51","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa, F., Varoquaux, G., Gramfort, A., et al. (2011). Scikit-learn: Machine learning in Python. Journal of Machine Learning Research, 12, 2825\u20132830.","journal-title":"Journal of Machine Learning Research"},{"key":"9611_CR52","doi-asserted-by":"crossref","unstructured":"Pei, Y., Furia, C. A., Nordio, M., et al. (2014). Automatic program repair by fixing contracts. In: Proceedings of Fundamental Approaches to Software Engineering, pp 246\u2013260.","DOI":"10.1007\/978-3-642-54804-8_17"},{"key":"9611_CR53","doi-asserted-by":"crossref","unstructured":"Pornprasit, C., & Tantithamthavorn, C. (2021). Jitline: A simpler, better, faster, finer-grained just-in-time defect prediction. In: Proceedings of the International Conference on Mining Software Repositories (MSR), p To Appear.","DOI":"10.1109\/MSR52588.2021.00049"},{"key":"9611_CR54","doi-asserted-by":"publisher","unstructured":"Pornprasit, C., Tantithamthavorn, C., Jiarpakdee, J., et al. (2021). Pyexplainer: Explaining the predictions of just-in-time defect models. In: 2021 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp 407\u2013418. https:\/\/doi.org\/10.1109\/ASE51524.2021.9678763","DOI":"10.1109\/ASE51524.2021.9678763"},{"key":"9611_CR55","doi-asserted-by":"crossref","unstructured":"Rahman, M. M., & Roy, C. K. (2018). Improving ir-based bug localization with context-aware query reformulation. In: Proceedings of the 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC\/FSE\u201918). Association for Computing Machinery, p 621\u2013632.","DOI":"10.1145\/3236024.3236065"},{"key":"9611_CR56","doi-asserted-by":"crossref","unstructured":"Rosen, C., Grawi, B., & Shihab, E. (2015). Commit guru: Analytics and risk prediction of software commits. In: Proceedings of the 10th Joint Meeting on Foundations of Software Engineering (ESEC\/FSE\u201915), pp 966\u2013969.","DOI":"10.1145\/2786805.2803183"},{"issue":"1","key":"9611_CR57","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1111\/j.1541-0420.2005.00389.x","volume":"62","author":"B Rosner","year":"2006","unstructured":"Rosner, B., Glynn, R. J., & Lee, M. L. T. (2006). The wilcoxon signed rank test for paired comparisons of clustered data. Biometrics, 62(1), 185\u2013192.","journal-title":"Biometrics"},{"issue":"4","key":"9611_CR58","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1109\/TSE.2012.43","volume":"39","author":"S Shivaji","year":"2013","unstructured":"Shivaji, S., James Whitehead, E., Akella, R., et al. (2013). Reducing features to improve code change-based bug prediction. IEEE Transactions on Software Engineering, 39(4), 552\u2013569.","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"5","key":"9611_CR59","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1145\/1095430.1081725","volume":"30","author":"J \u015aliwerski","year":"2005","unstructured":"\u015aliwerski, J., Zimmermann, T., & Zeller, A. (2005a). Hatari: Raising risk awareness. ACM SIGSOFT Software Engineering Notes, 30(5), 107\u2013110.","journal-title":"ACM SIGSOFT Software Engineering Notes"},{"issue":"4","key":"9611_CR60","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1082983.1083147","volume":"30","author":"J \u015aliwerski","year":"2005","unstructured":"\u015aliwerski, J., Zimmermann, T., & Zeller, A. (2005b). When do changes induce fixes? ACM SIGSOFT Software Engineering Notes, 30(4), 1\u20135.","journal-title":"ACM SIGSOFT Software Engineering Notes"},{"key":"9611_CR61","doi-asserted-by":"publisher","unstructured":"Spearman Rank Correlation Coefficient. (2008).\u00a0Springer New York, New York, NY, pp 502\u2013505. https:\/\/doi.org\/10.1007\/978-0-387-32833-1_379","DOI":"10.1007\/978-0-387-32833-1_379"},{"key":"9611_CR62","doi-asserted-by":"crossref","unstructured":"Tabassum, S., Minku, L. L., Feng, D., et al. (2020). An investigation of cross-project learning in online just-in-time software defect prediction. In: Proceedings of the IEEE\/ACM 42nd International Conference on Software Engineering (ICSE\u201920), pp 554\u2013565.","DOI":"10.1145\/3377811.3380403"},{"key":"9611_CR63","doi-asserted-by":"crossref","unstructured":"Tan, M., Tan, L., Dara, S., et al. (2015). Online defect prediction for imbalanced data. In: Proceedings of the 37th International Conference on Software Engineering (ICSE\u201915), pp 99\u2013108.","DOI":"10.1109\/ICSE.2015.139"},{"key":"9611_CR64","doi-asserted-by":"publisher","unstructured":"Taunk, K., De, S., Verma, S., et al. (2019). A brief review of nearest neighbor algorithm for learning and classification. In: 2019 International Conference on Intelligent Computing and Control Systems (ICCS), pp 1255\u20131260. https:\/\/doi.org\/10.1109\/ICCS45141.2019.9065747","DOI":"10.1109\/ICCS45141.2019.9065747"},{"key":"9611_CR65","doi-asserted-by":"crossref","unstructured":"Vieira, R., da Silva, A., Rocha, L., et al. (2019). From reports to bug-fix commits: A 10 years dataset of bug-fixing activity from 55 apache\u2019s open source projects. In: Proceedings of the Fifteenth International Conference on Predictive Models and Data Analytics in Software Engineering. Association for Computing Machinery, New York, NY, USA, PROMISE\u201919, p 80\u201389.\u00a0https:\/\/doi.org\/10.1145\/3345629.3345639","DOI":"10.1145\/3345629.3345639"},{"key":"9611_CR66","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1038\/s41592-019-0686-2","volume":"17","author":"P Virtanen","year":"2020","unstructured":"Virtanen, P., Gommers, R., Oliphant, T., et al. (2020). SciPy 1.0: Fundamental Algorithms for Scientific Computing in Python. Nature Methods, 17, 261\u2013272.","journal-title":"Nature Methods"},{"key":"9611_CR67","doi-asserted-by":"crossref","unstructured":"Wen, M., Wu, R., & Cheung, S. C. (2016). Locus: Locating bugs from software changes. In: Proceedings of the 31st IEEE\/ACM International Conference on Automated Software Engineering (ASE\u201916), pp 262\u2013273.","DOI":"10.1145\/2970276.2970359"},{"key":"9611_CR68","doi-asserted-by":"crossref","unstructured":"Wen, M., Wu, R., Liu, Y., et al. (2019). Exploring and exploiting the correlations between bug-inducing and bug-fixing commits. In: Proceedings of the 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC\/FSE\u201919), pp 326\u2013337.","DOI":"10.1145\/3338906.3338962"},{"key":"9611_CR69","doi-asserted-by":"crossref","unstructured":"Wen, M., Liu, Y., & Cheung, S. C. (2020). Boosting automated program repair with bug-inducing commits. In: Proceedings of the IEEE\/ACM 42nd International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER\u201920), pp 77\u201380.","DOI":"10.1145\/3377816.3381743"},{"key":"9611_CR70","doi-asserted-by":"crossref","unstructured":"Wilcoxon, F. (1945). Individual comparisons by ranking methods. Biometrics Bulletin, 1(6), 80\u201383. http:\/\/www.jstor.org\/stable\/3001968","DOI":"10.2307\/3001968"},{"issue":"5","key":"9611_CR71","doi-asserted-by":"publisher","first-page":"2866","DOI":"10.1007\/s10664-017-9567-4","volume":"23","author":"R Wu","year":"2018","unstructured":"Wu, R., Wen, M., Cheung, S. C., et al. (2018). Changelocator: locate crash-inducing changes based on crash reports. Empirical Software Engineering, 23(5), 2866\u20132900.","journal-title":"Empirical Software Engineering"},{"key":"9611_CR72","doi-asserted-by":"crossref","unstructured":"Xin, Q., & Reiss, S. P. (2019). Better code search and reuse for better program repair. In: Proceedings of the 6th International Workshop on Genetic Improvement (GI \u201919), p 10\u201317.","DOI":"10.1109\/GI.2019.00012"},{"key":"9611_CR73","doi-asserted-by":"crossref","unstructured":"Yang, X., Lo, D., Xia, X., et al. (2015). Deep learning for just-in-time defect prediction. In: Proceedings of the IEEE International Conference on Software Quality, Reliability and Security (QRS\u201915), pp 17\u201326.","DOI":"10.1109\/QRS.2015.14"},{"key":"9611_CR74","doi-asserted-by":"crossref","unstructured":"Yin, Z., Yuan, D., Zhou, Y., et al. (2011). How do fixes become bugs? In: Proceedings of the 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering (ESEC\/FSE \u201911), pp 26\u201336.","DOI":"10.1145\/2025113.2025121"},{"key":"9611_CR75","doi-asserted-by":"publisher","unstructured":"Yue, R., Meng, N., & Wang, Q. (2017). A characterization study of repeated bug fixes. In: 2017 IEEE International Conference on Software Maintenance and Evolution (ICSME), pp 422\u2013432. https:\/\/doi.org\/10.1109\/ICSME.2017.16","DOI":"10.1109\/ICSME.2017.16"},{"key":"9611_CR76","doi-asserted-by":"publisher","unstructured":"Zeng, Z., Zhang, Y., Zhang, H., et al. (2021). Deep just-in-time defect prediction: How far are we? In: Proceedings of the 30th ACM SIGSOFT International Symposium on Software Testing and Analysis. Association for Computing Machinery, New York, NY, USA, ISSTA 2021, p 427\u2013438. https:\/\/doi.org\/10.1145\/3460319.3464819","DOI":"10.1145\/3460319.3464819"},{"issue":"2","key":"9611_CR77","doi-asserted-by":"publisher","first-page":"794","DOI":"10.1109\/TFUZZ.2017.2690222","volume":"26","author":"R Zhao","year":"2018","unstructured":"Zhao, R., & Mao, K. (2018). Fuzzy bag-of-words model for document representation. IEEE Transactions on Fuzzy Systems, 26(2), 794\u2013804.","journal-title":"IEEE Transactions on Fuzzy Systems"},{"key":"9611_CR78","doi-asserted-by":"crossref","unstructured":"Zibran, M. F., & Roy, C. K. (2012). Ide-based real-time focused search for near-miss clones. In: Proceedings of the 27th Annual ACM Symposium on Applied Computing, New York, NY, USA, SAC 2012, pp 1235\u20131242.","DOI":"10.1145\/2245276.2231970"}],"container-title":["Software Quality Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-022-09611-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11219-022-09611-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-022-09611-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,31]],"date-time":"2023-08-31T10:19:44Z","timestamp":1693477184000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11219-022-09611-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,31]]},"references-count":78,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,9]]}},"alternative-id":["9611"],"URL":"https:\/\/doi.org\/10.1007\/s11219-022-09611-3","relation":{},"ISSN":["0963-9314","1573-1367"],"issn-type":[{"value":"0963-9314","type":"print"},{"value":"1573-1367","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,31]]},"assertion":[{"value":"4 December 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 December 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}