{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:50:44Z","timestamp":1740124244815,"version":"3.37.3"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T00:00:00Z","timestamp":1726185600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T00:00:00Z","timestamp":1726185600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62002161"],"award-info":[{"award-number":["62002161"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Software Qual J"],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1007\/s11219-024-09695-z","type":"journal-article","created":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T07:02:45Z","timestamp":1726210965000},"page":"1655-1682","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["KeyTitle: towards better bug report title generation by keywords planning"],"prefix":"10.1007","volume":"32","author":[{"given":"Qianshuang","family":"Meng","sequence":"first","affiliation":[]},{"given":"Weiqin","family":"Zou","sequence":"additional","affiliation":[]},{"given":"Biyu","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Jingxuan","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,13]]},"reference":[{"key":"9695_CR1","doi-asserted-by":"crossref","unstructured":"Ahmed, T., & Devanbu, P. (2022). Few-shot training llms for project-specific code-summarization. In: 37th IEEE\/ACM International Conference on Automated Software Engineering, pp. 1\u20135.","DOI":"10.1145\/3551349.3559555"},{"key":"9695_CR2","doi-asserted-by":"publisher","unstructured":"Bettenburg, N., Premraj, R., Zimmermann, T., & Kim, S. (2008). Extracting structural information from bug reports. In: Proceedings of the 2008 International Working Conference on Mining Software Repositories, MSR \u201908, pp. 27\u201330. New York, NY, USA: Association for Computing Machinery. https:\/\/doi.org\/10.1145\/1370750.1370757.","DOI":"10.1145\/1370750.1370757"},{"key":"9695_CR3","doi-asserted-by":"crossref","unstructured":"Bhavya, B., Xiong, J., & Zhai, C. (2022). Analogy generation by prompting large language models: a case study of instructgpt. arXiv:2210.04186.","DOI":"10.18653\/v1\/2022.inlg-main.25"},{"key":"9695_CR4","doi-asserted-by":"crossref","unstructured":"Budhiraja, A., Dutta, K., Shrivastava, M., & Reddy, R. (2018). Towards word embeddings for improved duplicate bug report retrieval in software repositories. In: Proceedings of the 2018 ACM SIGIR International Conference on Theory of Information Retrieval, ICTIR \u201918, pp. 167\u2013170. New York, NY, USA: Association for Computing Machinery.","DOI":"10.1145\/3234944.3234949"},{"key":"9695_CR5","doi-asserted-by":"crossref","unstructured":"Chaparro, O. (2017). Improving bug reporting, duplicate detection, and localization. In: 2017 IEEE\/ACM 39th International Conference on Software Engineering Companion (ICSE-C), IEEE, pp. 421\u2013424.","DOI":"10.1109\/ICSE-C.2017.27"},{"key":"9695_CR6","doi-asserted-by":"publisher","first-page":"2947","DOI":"10.1007\/s10664-018-9672-z","volume":"24","author":"O Chaparro","year":"2019","unstructured":"Chaparro, O., Florez, J. M., & Marcus, A. (2019). Using bug descriptions to reformulate queries during text-retrieval-based bug localization. Empirical Software Engineering, 24, 2947\u20133007.","journal-title":"Empirical Software Engineering"},{"key":"9695_CR7","doi-asserted-by":"publisher","unstructured":"Chen, S., Xie, X., Yin, B., Ji, Y., Chen, L., & Xu, B. (2021). Stay professional and efficient: automatically generate titles for your bug reports. In: Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering. ASE \u201920, pp. 385\u2013397. New York, NY, USA: Association for Computing Machinery. https:\/\/doi.org\/10.1145\/3324884.3416538.","DOI":"10.1145\/3324884.3416538"},{"key":"9695_CR8","doi-asserted-by":"crossref","unstructured":"Davies, S., & Roper, M. (2014). What\u2019s in a bug report? In: Proceedings of the 8th ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement, pp. 1\u201310.","DOI":"10.1145\/2652524.2652541"},{"key":"9695_CR9","unstructured":"Devlin, J., Chang, M.-W., Lee, K., & Toutanova, K. (2018). Bert: pre-training of deep bidirectional transformers for language understanding. arXiv:1810.04805."},{"key":"9695_CR10","doi-asserted-by":"publisher","unstructured":"Dong, J., Lou, Y., Zhu, Q., Sun, Z., Li, Z., Zhang, W., & Hao, D. (2022). FIRA: fine-grained graph-based code change representation for automated commit message generation. In: 44th IEEE\/ACM 44th International Conference on Software Engineering, ICSE 2022, Pittsburgh, PA, USA, May 25-27, 2022, ACM, pp. 970\u2013981. New York, NY, USA. https:\/\/doi.org\/10.1145\/3510003.3510069.","DOI":"10.1145\/3510003.3510069"},{"key":"9695_CR11","doi-asserted-by":"publisher","first-page":"111160","DOI":"10.1016\/j.jss.2021.111160","volume":"185","author":"S Fang","year":"2022","unstructured":"Fang, S., Zhang, T., Tan, Y.-S., Xu, Z., Yuan, Z.-X., & Meng, L.-Z. (2022). Prhan: automated pull request description generation based on hybrid attention network. Journal of Systems and Software, 185, 111160.","journal-title":"Journal of Systems and Software"},{"key":"9695_CR12","unstructured":"Fiaz, A., Devi, N., & Aarthi, S. (2013). Bug tracking and reporting system. arXiv:1309.1232."},{"issue":"212\u2013236","key":"9695_CR13","first-page":"22","volume":"2","author":"JL Fleiss","year":"1981","unstructured":"Fleiss, J. L., Levin, B., Paik, M. C., et al. (1981). The measurement of interrater agreement. Statistical methods for rates and proportions, 2(212\u2013236), 22\u201323.","journal-title":"Statistical methods for rates and proportions"},{"key":"9695_CR14","doi-asserted-by":"publisher","first-page":"681","DOI":"10.1007\/s11023-020-09548-1","volume":"30","author":"L Floridi","year":"2020","unstructured":"Floridi, L., & Chiriatti, M. (2020). Gpt-3: its nature, scope, limits, and consequences. Minds and Machines, 30, 681\u2013694.","journal-title":"Minds and Machines"},{"issue":"2","key":"9695_CR15","first-page":"23","volume":"12","author":"P Gage","year":"1994","unstructured":"Gage, P. (1994). A new algorithm for data compression. C Users Journal, 12(2), 23\u201338.","journal-title":"C Users Journal"},{"key":"9695_CR16","unstructured":"Huang, L., Yu, W., Ma, W., Zhong, W., Feng, Z., Wang, H., Chen, Q., Peng, W., Feng, X., Qin, B., et al. (2023). A survey on hallucination in large language models: Principles, taxonomy, challenges, and open questions. arXiv:2311.05232."},{"key":"9695_CR17","doi-asserted-by":"crossref","unstructured":"Isotani, H., Washizaki, H., Fukazawa, Y., Nomoto, T., Ouji, S., & Saito, S. (2021). Duplicate bug report detection by using sentence embedding and fine-tuning. In: 2021 IEEE International Conference on Software Maintenance and Evolution (ICSME), IEEE, pp. 535\u2013544.","DOI":"10.1109\/ICSME52107.2021.00054"},{"key":"9695_CR18","doi-asserted-by":"publisher","unstructured":"Jiang, S. (2019). Boosting neural commit message generation with code semantic analysis. In: 2019 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 1280\u20131282. https:\/\/doi.org\/10.1109\/ASE.2019.00162.","DOI":"10.1109\/ASE.2019.00162"},{"key":"9695_CR19","doi-asserted-by":"crossref","unstructured":"Jiang, Y., Liu, H., Zhang, Y., Niu, N., Zhao, Y., & Zhang, L. (2021). Which abbreviations should be expanded? In: Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 578\u2013589.","DOI":"10.1145\/3468264.3468616"},{"key":"9695_CR20","doi-asserted-by":"crossref","unstructured":"Jiang, H., Zhu, J., Yang, L., Liang, G., & Zuo, C. (2021). Deeprelease: language-agnostic release notes generation from pull requests of open-source software. In: 2021 28th Asia-Pacific Software Engineering Conference (APSEC), IEEE, pp. 101\u2013110.","DOI":"10.1109\/APSEC53868.2021.00018"},{"key":"9695_CR21","doi-asserted-by":"crossref","unstructured":"Kudo, T., & Richardson, J. (2018). Sentencepiece: a simple and language independent subword tokenizer and detokenizer for neural text processing. arXiv:1808.06226.","DOI":"10.18653\/v1\/D18-2012"},{"key":"9695_CR22","doi-asserted-by":"crossref","unstructured":"Landis, J.R., & Koch, G.G. (1977). The measurement of observer agreement for categorical data. Biometrics, 159\u2013174.","DOI":"10.2307\/2529310"},{"key":"9695_CR23","doi-asserted-by":"crossref","unstructured":"Lee, J., Han, K., & Yu, H. (2022). A light bug triage framework for applying large pre-trained language model. In: 37th IEEE\/ACM International Conference on Automated Software Engineering, pp. 1\u201311.","DOI":"10.1145\/3551349.3556898"},{"key":"9695_CR24","doi-asserted-by":"crossref","unstructured":"Li, X., Jiang, H., Liu, D., Ren, Z., & Li, G. (2018). Unsupervised deep bug report summarization. In: Proceedings of the 26th Conference on Program Comprehension, pp. 144\u2013155.","DOI":"10.1145\/3196321.3196326"},{"key":"9695_CR25","doi-asserted-by":"publisher","first-page":"111513","DOI":"10.1016\/j.jss.2022.111513","volume":"195","author":"H Lin","year":"2023","unstructured":"Lin, H., Chen, X., Chen, X., Cui, Z., Miao, Y., Zhou, S., Wang, J., & Su, Z. (2023). Gen-fl: Quality prediction-based filter for automated issue title generation. Journal of Systems and Software, 195, 111513.","journal-title":"Journal of Systems and Software"},{"key":"9695_CR26","unstructured":"Liu, Y., Ott, M., Goyal, N., Du, J., Joshi, M., Chen, D., Levy, O., Lewis, M., Zettlemoyer, L., & Stoyanov, V. (2019). RoBERTa: a robustly optimized BERT pretraining approach."},{"key":"9695_CR27","doi-asserted-by":"crossref","unstructured":"Liu, Z., Xia, X., Treude, C., Lo, D., & Li, S. (2019). Automatic generation of pull request descriptions. In: 2019 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE), IEEE, pp. 176\u2013188.","DOI":"10.1109\/ASE.2019.00026"},{"key":"9695_CR28","doi-asserted-by":"crossref","unstructured":"Liu, H., Yu, Y., Li, S., Guo, Y., Wang, D., & Mao, X. (2020). Bugsum: deep context understanding for bug report summarization. In: Proceedings of the 28th International Conference on Program Comprehension, pp. 94\u2013105.","DOI":"10.1145\/3387904.3389272"},{"key":"9695_CR29","doi-asserted-by":"crossref","unstructured":"Ma, X., Keung, J.W., Yu, X., Zou, H., Zhang, J., & Li, Y. (2023). Attsum: a deep attention-based summarization model for bug report title generation. IEEE Transactions on Reliability.","DOI":"10.1109\/TR.2023.3236404"},{"key":"9695_CR30","doi-asserted-by":"crossref","unstructured":"Mani, S., Sankaran, A., & Aralikatte, R. (2019). Deeptriage: exploring the effectiveness of deep learning for bug triaging. In: Proceedings of the ACM India Joint International Conference on Data Science and Management of Data, pp. 171\u2013179.","DOI":"10.1145\/3297001.3297023"},{"key":"9695_CR31","doi-asserted-by":"publisher","first-page":"3086","DOI":"10.1007\/s10664-020-09823-w","volume":"25","author":"C Mills","year":"2020","unstructured":"Mills, C., Parra, E., Pantiuchina, J., Bavota, G., & Haiduc, S. (2020). On the relationship between bug reports and queries for text retrieval-based bug localization. Empirical Software Engineering, 25, 3086\u20133127.","journal-title":"Empirical Software Engineering"},{"key":"9695_CR32","doi-asserted-by":"publisher","unstructured":"Moreno, L., Treadway, J.J., Marcus, A., & Shen, W. On the use of stack traces to improve text retrieval-based bug localization. In: 2014 IEEE International Conference on Software Maintenance and Evolution, pp. 151\u2013160 (2014). https:\/\/doi.org\/10.1109\/ICSME.2014.37.","DOI":"10.1109\/ICSME.2014.37"},{"key":"9695_CR33","doi-asserted-by":"crossref","unstructured":"Pascarella, L., & Bacchelli, A. (2017). Classifying code comments in java open-source software systems. In: 2017 IEEE\/ACM 14th International Conference on Mining Software Repositories (MSR), IEEE, pp. 227\u2013237.","DOI":"10.1109\/MSR.2017.63"},{"key":"9695_CR34","doi-asserted-by":"crossref","unstructured":"Qiu, X., Pei, H., Yan, H., & Huang, X. (2019). A concise model for multi-criteria chinese word segmentation with transformer encoder. arXiv:1906.12035.","DOI":"10.18653\/v1\/2020.findings-emnlp.260"},{"issue":"1","key":"9695_CR35","first-page":"5485","volume":"21","author":"C Raffel","year":"2020","unstructured":"Raffel, C., Shazeer, N., Roberts, A., Lee, K., Narang, S., Matena, M., Zhou, Y., Li, W., & Liu, P. J. (2020). Exploring the limits of transfer learning with a unified text-to-text transformer. The Journal of Machine Learning Research, 21(1), 5485\u20135551.","journal-title":"The Journal of Machine Learning Research"},{"key":"9695_CR36","doi-asserted-by":"crossref","unstructured":"Rahman, M.M., & Roy, C.K. (2018) Improving ir-based bug localization with context-aware query reformulation. In: Proceedings of the 2018 26th ACM Joint Meeting on Europea Software Engineering Conference and Symposium on the Foundations of Software Engineering. ESEC\/FSE 2018, pp. 621\u2013632. New York, NY, USA:Association for Computing Machinery.","DOI":"10.1145\/3236024.3236065"},{"issue":"4","key":"9695_CR37","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1109\/TSE.2013.2297712","volume":"40","author":"S Rastkar","year":"2014","unstructured":"Rastkar, S., Murphy, G. C., & Murray, G. (2014). Automatic summarization of bug reports. IEEE Transactions on Software Engineering, 40(4), 366\u2013380.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"9695_CR38","doi-asserted-by":"crossref","unstructured":"Ray, P.P. (2023). Chatgpt: a comprehensive review on background, applications, key challenges, bias, ethics, limitations and future scope. Internet of Things and Cyber-Physical Systems.","DOI":"10.1016\/j.iotcps.2023.04.003"},{"key":"9695_CR39","unstructured":"Sutskever, I., Vinyals, O., & Le, Q.V. (2014). Sequence to sequence learning with neural networks. Advances in neural information processing systems, 27."},{"key":"9695_CR40","unstructured":"Vaswani, A., Shazeer, N., Parmar, N., Uszkoreit, J., Jones, L., Gomez, A.N., Kaiser, \u0141., & Polosukhin, I. (2017). Attention is all you need. Advances in neural information processing systems, 30."},{"issue":"1","key":"9695_CR41","first-page":"1","volume":"1","author":"RS Wahono","year":"2015","unstructured":"Wahono, R. S. (2015). A systematic literature review of software defect prediction. Journal of software engineering, 1(1), 1\u201316.","journal-title":"Journal of software engineering"},{"key":"9695_CR42","doi-asserted-by":"crossref","unstructured":"Wang, H., Xia, X., Lo, D., Grundy, J., & Wang, X.(2021). Automatic solution summarization for crash bugs. In: 2021 IEEE\/ACM 43rd International Conference on Software Engineering (ICSE), IEEE, pp. 1286\u20131297.","DOI":"10.1109\/ICSE43902.2021.00117"},{"key":"9695_CR43","doi-asserted-by":"crossref","unstructured":"Wolf, T., Debut, L., Sanh, V., Chaumond, J., Delangue, C., Moi, A., Cistac, P., Rault, T., Louf, R., Funtowicz, M., et al. (2020). Transformers: state-of-the-art natural language processing. In: Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing: System Demonstrations, pp. 38\u201345.","DOI":"10.18653\/v1\/2020.emnlp-demos.6"},{"key":"9695_CR44","doi-asserted-by":"crossref","unstructured":"Wong, C.-P., Xiong, Y., Zhang, H., Hao, D., Zhang, L., & Mei, H. (2014). Boosting bug-report-oriented fault localization with segmentation and stack-trace analysis. In: 2014 IEEE International Conference on Software Maintenance and Evolution, IEEE, pp. 181\u2013190.","DOI":"10.1109\/ICSME.2014.40"},{"key":"9695_CR45","doi-asserted-by":"crossref","unstructured":"Xie, R., Hu, T., Ye, W., & Zhang, S. (2022). Low-resources project-specific code summarization. In: 37th IEEE\/ACM International Conference on Automated Software Engineering, pp. 1\u201312.","DOI":"10.1145\/3551349.3556909"},{"key":"9695_CR46","doi-asserted-by":"crossref","unstructured":"Xuan, J., Jiang, H., Ren, Z., & Zou, W. (2012). Developer prioritization in bug repositories. In: 2012 34th International Conference on Software Engineering (ICSE), IEEE, pp. 25\u201335.","DOI":"10.1109\/ICSE.2012.6227209"},{"key":"9695_CR47","doi-asserted-by":"crossref","unstructured":"Zhang, T., Irsan, I.C., Thung, F., Han, D., Lo, D., & Jiang, L. (2022). Automatic pull request title generation. In: 2022 IEEE International Conference on Software Maintenance and Evolution (ICSME), IEEE, pp. 71\u201381.","DOI":"10.1109\/ICSME55016.2022.00015"},{"key":"9695_CR48","doi-asserted-by":"crossref","unstructured":"Zhang, T., Irsan, I.C., Thung, F., Han, D., Lo, D., & Jiang, L. (2022). Itiger: an automatic issue title generation tool. In: Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 1637\u20131641.","DOI":"10.1145\/3540250.3558934"},{"key":"9695_CR49","doi-asserted-by":"crossref","unstructured":"Zhang, J., Wang, X., Zhang, H., Sun, H., & Liu, X. (2020). Retrieval-based neural source code summarization. In: Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering, pp. 1385\u20131397.","DOI":"10.1145\/3377811.3380383"},{"key":"9695_CR50","doi-asserted-by":"crossref","unstructured":"Zhou, Y., & Sharma, A. (2017). Automated identification of security issues from commit messages and bug reports. In: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, ESEC\/FSE 2017, pp. 914\u2013919. New York, NY, USA:Association for Computing Machinery.","DOI":"10.1145\/3106237.3117771"}],"container-title":["Software Quality Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-024-09695-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11219-024-09695-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-024-09695-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T13:16:27Z","timestamp":1730985387000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11219-024-09695-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,13]]},"references-count":50,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["9695"],"URL":"https:\/\/doi.org\/10.1007\/s11219-024-09695-z","relation":{},"ISSN":["0963-9314","1573-1367"],"issn-type":[{"type":"print","value":"0963-9314"},{"type":"electronic","value":"1573-1367"}],"subject":[],"published":{"date-parts":[[2024,9,13]]},"assertion":[{"value":"15 August 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 September 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}