{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T17:28:51Z","timestamp":1749144531789},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2022,6,10]],"date-time":"2022-06-10T00:00:00Z","timestamp":1654819200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,6,10]],"date-time":"2022-06-10T00:00:00Z","timestamp":1654819200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1007\/s11432-020-3317-2","type":"journal-article","created":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T14:03:24Z","timestamp":1655733804000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Towards characterizing bug fixes through dependency-level changes in Apache Java open source projects"],"prefix":"10.1007","volume":"65","author":[{"given":"Di","family":"Cui","sequence":"first","affiliation":[]},{"given":"Lingling","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Sen","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yuanfang","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Qinghua","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Ting","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,10]]},"reference":[{"key":"3317_CR1","doi-asserted-by":"crossref","unstructured":"Bachmann A, Bird C, Rahman F, et al. The missing links: bugs and bug-fix commits. In: Proceedings of the 18th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2010. 97\u2013106","DOI":"10.1145\/1882291.1882308"},{"key":"3317_CR2","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/s10664-013-9282-8","volume":"20","author":"M Martinez","year":"2015","unstructured":"Martinez M, Monperrus M. Mining software repair models for reasoning on the search space of automated program fixing. Empir Softw Eng, 2015, 20: 176\u2013205","journal-title":"Empir Softw Eng"},{"key":"3317_CR3","doi-asserted-by":"crossref","unstructured":"Wang Y, Meng N, Zhong H. An empirical study of multi-entity changes in real bug fixes. In: Proceedings of IEEE International Conference on Software Maintenance and Evolution (ICSME), 2018. 287\u2013298","DOI":"10.1109\/ICSME.2018.00038"},{"key":"3317_CR4","doi-asserted-by":"crossref","unstructured":"Zhong H, Su Z D. An empirical study on real bug fixes. In: Proceedings of the 37th International Conference on Software Engineering, 2015. 913\u2013923","DOI":"10.1109\/ICSE.2015.101"},{"key":"3317_CR5","doi-asserted-by":"crossref","unstructured":"Falleri J R, Morandat F, Blanc X, et al. Fine-grained and accurate source code differencing. In: Proceedings of the 29th ACM\/IEEE International Conference on Automated Software Engineering, 2014. 313\u2013324","DOI":"10.1145\/2642937.2642982"},{"key":"3317_CR6","doi-asserted-by":"crossref","unstructured":"Huang K F, Chen B H, Peng X, et al. Cldiff: generating concise linked code differences. In: Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering, 2018. 679\u2013690","DOI":"10.1145\/3238147.3238219"},{"key":"3317_CR7","doi-asserted-by":"crossref","unstructured":"Hassan A E. Predicting faults using the complexity of code changes. In: Proceedings of the 31st International Conference on Software Engineering, 2009. 78\u201388","DOI":"10.1109\/ICSE.2009.5070510"},{"key":"3317_CR8","doi-asserted-by":"crossref","unstructured":"Cui D, Liu T, Cai Y F, et al. Investigating the impact of multiple dependency structures on software defects. In: Proceedings of the 41st International Conference on Software Engineering, 2019. 584\u2013595","DOI":"10.1109\/ICSE.2019.00069"},{"key":"3317_CR9","doi-asserted-by":"crossref","unstructured":"Xiao L, Cai Y F, Kazman R. Design rule spaces: a new form of architecture insight. In: Proceedings of the 36th International Conference on Software Engineering, 2014. 967\u2013977","DOI":"10.1145\/2568225.2568241"},{"key":"3317_CR10","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.infsof.2009.07.002","volume":"52","author":"B J Williams","year":"2010","unstructured":"Williams B J, Carver J C. Characterizing software architecture changes: a systematic review. Inf Softw Tech, 2010, 52: 31\u201351","journal-title":"Inf Softw Tech"},{"key":"3317_CR11","volume-title":"Software Architecture in Practice","author":"L Bass","year":"2003","unstructured":"Bass L, Clements P, Kazman R. Software Architecture in Practice. Boston: Addison-Wesley Professional, 2003"},{"key":"3317_CR12","doi-asserted-by":"crossref","unstructured":"Mo R, Cai Y F, Kazman R, Xiao L. Hotspot patterns: the formal definition and automatic detection of architecture smells. In: Proceedings of the 12th Working IEEE\/IFIP Conference on Software Architecture, 2015. 51\u201360","DOI":"10.1109\/WICSA.2015.12"},{"key":"3317_CR13","unstructured":"Park J, Kim M, Ray B, et al. An empirical study of supplementary bug fixes. In: Proceedings of the 9th IEEE Working Conference on Mining Software Repositories, 2012. 40\u201349"},{"key":"3317_CR14","doi-asserted-by":"crossref","unstructured":"Fan L L, Su T, Chen S, et al. Large-scale analysis of framework-specific exceptions in Android apps. In: Proceedings of the 40th International Conference on Software Engineering, 2018. 408\u2013419","DOI":"10.1145\/3180155.3180222"},{"key":"3317_CR15","doi-asserted-by":"crossref","unstructured":"Wu R X, Zhang H Y, Kim S, et al. Relink: recovering links between bugs and changes. In: Proceedings of the 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering, 2011. 15\u201325","DOI":"10.1145\/2025113.2025120"},{"key":"3317_CR16","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/s11416-011-0151-y","volume":"7","author":"J Kinable","year":"2011","unstructured":"Kinable J, Kostakis O. Malware classification based on call graph clustering. J Comput Virol, 2011, 7: 233\u2013245","journal-title":"J Comput Virol"},{"key":"3317_CR17","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1109\/TSE.2016.2616306","volume":"43","author":"D A da Costa","year":"2017","unstructured":"da Costa D A, McIntosh S, Shang W, et al. A framework for evaluating the results of the SZZ approach for identifying bug-introducing changes. IEEE Trans Softw Eng, 2017, 43: 641\u2013657","journal-title":"IEEE Trans Softw Eng"},{"key":"3317_CR18","doi-asserted-by":"crossref","unstructured":"Kim S, Zimmermann T, Jr E J W, et al. Predicting faults from cached history. In: Proceedings of the 29th International Conference on Software Engineering, 2007. 489\u2013498","DOI":"10.1109\/ICSE.2007.66"},{"key":"3317_CR19","doi-asserted-by":"crossref","unstructured":"Chen T H, Nagappan M, Shihab E, et al. An empirical study of dormant bugs. In: Proceedings of the 11th Working Conference on Mining Software Repositories, 2014. 82\u201391","DOI":"10.1145\/2597073.2597108"},{"key":"3317_CR20","doi-asserted-by":"crossref","unstructured":"Zaman S, Adams B, Hassan A E. Security versus performance bugs: a case study on firefox. In: Proceedings of the 8th Working Conference on Mining Software Repositories, 2011. 93\u2013102","DOI":"10.1145\/1985441.1985457"},{"key":"3317_CR21","doi-asserted-by":"crossref","unstructured":"Garcia J, Ivkovic I, Medvidovic N. A comparative analysis of software architecture recovery techniques. In: Proceedings of the 28th IEEE\/ACM International Conference on Automated Software Engineering, 2013. 486\u2013496","DOI":"10.1109\/ASE.2013.6693106"},{"key":"3317_CR22","doi-asserted-by":"crossref","unstructured":"Garcia J, Krka I, Mattmann C, et al. Obtaining ground-truth software architectures. In: Proceedings of International Conference on Software Engineering, 2013. 901\u2013910","DOI":"10.1109\/ICSE.2013.6606639"},{"key":"3317_CR23","doi-asserted-by":"crossref","unstructured":"Lutellier T, Chollak D, Garcia J, et al. Comparing software architecture recovery techniques using accurate dependencies. In: Proceedings of the 37th IEEE International Conference on Software Engineering, 2015. 69\u201378","DOI":"10.1109\/ICSE.2015.136"},{"key":"3317_CR24","doi-asserted-by":"crossref","unstructured":"Paixao M, Krinke J, Han D, et al. Are developers aware of the architectural impact of their changes? In: Proceedings of the 32nd IEEE\/ACM International Conference on Automated Software Engineering, 2017. 95\u2013105","DOI":"10.1109\/ASE.2017.8115622"},{"key":"3317_CR25","doi-asserted-by":"crossref","unstructured":"Wen M, Wu R X, Liu Y P, et al. Exploring and exploiting the correlations between bug-inducing and bug-fixing commits. In: Proceedings of the 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019. 326\u2013337","DOI":"10.1145\/3338906.3338962"},{"key":"3317_CR26","doi-asserted-by":"crossref","unstructured":"Mi Q, Keung J. An empirical analysis of reopened bugs based on open source projects. In: Proceedings of the 20th International Conference on Evaluation and Assessment in Software Engineering, 2016","DOI":"10.1145\/2915970.2915986"},{"key":"3317_CR27","doi-asserted-by":"crossref","unstructured":"Yin Z N, Yuan D, Zhou Y Y, et al. How do fixes become bugs? In: Proceedings of the 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering, 2011. 26\u201336","DOI":"10.1145\/2025113.2025121"},{"key":"3317_CR28","doi-asserted-by":"crossref","unstructured":"Zimmermann T, Nagappan N, Guo P J, et al. Characterizing and predicting which bugs get reopened. In: Proceedings of the 34th International Conference on Software Engineering (ICSE), 2012. 1074\u20131083","DOI":"10.1109\/ICSE.2012.6227112"},{"key":"3317_CR29","unstructured":"Shihab E, Hassan A E, Adams B, et al. An industrial study on the risk of software changes. In: Proceedings of the 20th International Symposium on the Foundations of Software Engineering, 1991. 1\u201311"},{"key":"3317_CR30","doi-asserted-by":"crossref","unstructured":"Eyolfson J, Tan L, Lam P. Do time of day and developer experience affect commit bugginess? In: Proceedings of the 8th Working Conference on Mining Software Repositories, 2011. 153\u2013162","DOI":"10.1145\/1985441.1985464"},{"key":"3317_CR31","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1109\/TSE.2007.70773","volume":"34","author":"S Kim","year":"2008","unstructured":"Kim S, Whitehead, E J, Zhang Y. Classifying software changes: clean or buggy? IEEE Trans Softw Eng, 2008, 34: 181\u2013196","journal-title":"IEEE Trans Softw Eng"},{"key":"3317_CR32","doi-asserted-by":"crossref","unstructured":"Le D M, Behnamghader P, Garcia J, et al. An empirical study of architectural change in open-source software systems. In: Proceedings of the 12th Working Conference on Mining Software Repositories, 2015. 235\u2013245","DOI":"10.1109\/MSR.2015.29"},{"key":"3317_CR33","doi-asserted-by":"crossref","unstructured":"Le D M, Link D, Shahbazian A, et al. An empirical study of architectural decay in open-source software. In: Proceedings of IEEE International Conference on Software Architecture (ICSA), 2018","DOI":"10.1109\/ICSA.2018.00027"},{"key":"3317_CR34","volume-title":"Object-oriented Metrics in Practice: Using Software Metrics to Characterize, Evaluate, and Improve the Design of Object-Oriented Systems","author":"M Lanza","year":"2007","unstructured":"Lanza M, Marinescu R. Object-oriented Metrics in Practice: Using Software Metrics to Characterize, Evaluate, and Improve the Design of Object-Oriented Systems. Berlin: Springer, 2007"},{"key":"3317_CR35","doi-asserted-by":"crossref","unstructured":"Hoang T, Dam H K, Kamei Y, et al. DeepJIT: an end-to-end deep learning framework for just-in-time defect prediction. In: Proceedings of the 16th International Conference on Mining Software Repositories (MSR), 2019. 34\u201345","DOI":"10.1109\/MSR.2019.00016"},{"key":"3317_CR36","doi-asserted-by":"publisher","first-page":"2072","DOI":"10.1007\/s10664-015-9400-x","volume":"21","author":"Y Kamei","year":"2016","unstructured":"Kamei Y, Fukushima T, McIntosh S, et al. Studying just-in-time defect prediction using cross-project models. Empir Softw Eng, 2016, 21: 2072\u20132106","journal-title":"Empir Softw Eng"},{"key":"3317_CR37","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1007\/s10664-019-09736-3","volume":"25","author":"M Kondo","year":"2020","unstructured":"Kondo M, German D M, Mizuno O, et al. The impact of context metrics on just-in-time defect prediction. Empir Softw Eng, 2020, 25: 890\u2013939","journal-title":"Empir Softw Eng"},{"key":"3317_CR38","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1109\/TSE.2017.2693980","volume":"44","author":"S McIntosh","year":"2018","unstructured":"McIntosh S, Kamei Y. Are fix-inducing changes a moving target? A longitudinal case study of just-in-time defect prediction. IEEE Trans Softw Eng, 2018, 44: 412\u2013428","journal-title":"IEEE Trans Softw Eng"},{"key":"3317_CR39","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.jss.2018.12.001","volume":"150","author":"L Pascarella","year":"2019","unstructured":"Pascarella L, Palomba F, Bacchelli A. Fine-grained just-in-time defect prediction. J Syst Softw, 2019, 150: 22\u201336","journal-title":"J Syst Softw"},{"key":"3317_CR40","doi-asserted-by":"crossref","unstructured":"Herzig K. The impact of tangled code changes. In: Proceedings of Working Conference on Mining Software Repositories, 2013","DOI":"10.1109\/MSR.2013.6624018"},{"key":"3317_CR41","doi-asserted-by":"crossref","unstructured":"Herzig K, Just S, Zeller A. It\u2019s not a bug, it\u2019s a feature: how misclassification impacts bug prediction. In: Proceedings of Working Conference on Mining Software Repositories, 2013","DOI":"10.1109\/ICSE.2013.6606585"},{"key":"3317_CR42","doi-asserted-by":"crossref","unstructured":"Fan L L, Su T, Chen S, et al. Efficiently manifesting asynchronous programming errors in Android apps. In: Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering, 2018. 486\u2013497","DOI":"10.1145\/3238147.3238170"},{"key":"3317_CR43","doi-asserted-by":"crossref","unstructured":"Lou Y L, Chen Z P, Cao Y B, et al. Understanding build issue resolution in practice: symptoms and fix patterns. In: Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020. 617\u2013628","DOI":"10.1145\/3368089.3409760"},{"key":"3317_CR44","doi-asserted-by":"crossref","unstructured":"Chen Z P, Yao H H, Lou Y L, et al. An empirical study on deployment faults of deep learning based mobile applications. In: Proceedings of the 43rd International Conference on Software Engineering (ICSE), 2021","DOI":"10.1109\/ICSE43902.2021.00068"},{"key":"3317_CR45","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1109\/32.67595","volume":"17","author":"R W Selby","year":"1991","unstructured":"Selby R W, Basili V R. Analyzing error-prone system structure. IEEE Trans Softw Eng, 1991, 17: 141\u2013152","journal-title":"IEEE Trans Softw Eng"},{"key":"3317_CR46","doi-asserted-by":"crossref","unstructured":"Zimmermann T, Nagappan N. Predicting defects using network analysis on dependency graphs. In: Proceedings of the 30th International Conference on Software Engineering, 2008. 531\u2013540","DOI":"10.1145\/1368088.1368161"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-020-3317-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11432-020-3317-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-020-3317-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,4]],"date-time":"2023-08-04T21:02:35Z","timestamp":1691182955000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11432-020-3317-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,10]]},"references-count":46,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2022,7]]}},"alternative-id":["3317"],"URL":"https:\/\/doi.org\/10.1007\/s11432-020-3317-2","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,10]]},"assertion":[{"value":"24 August 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 May 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 July 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 June 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"172101"}}