{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T19:10:02Z","timestamp":1770837002712,"version":"3.50.1"},"reference-count":64,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2025,9,16]],"date-time":"2025-09-16T00:00:00Z","timestamp":1757980800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,9,16]],"date-time":"2025-09-16T00:00:00Z","timestamp":1757980800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No.62272126"],"award-info":[{"award-number":["No.62272126"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012476","name":"Fundamental Research Funds for Central Universities of the Central South University","doi-asserted-by":"publisher","award":["No.3072024LJ0602"],"award-info":[{"award-number":["No.3072024LJ0602"]}],"id":[{"id":"10.13039\/501100012476","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1007\/s40747-025-02098-y","type":"journal-article","created":{"date-parts":[[2025,9,16]],"date-time":"2025-09-16T06:36:08Z","timestamp":1758004568000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A three-stage cross-project defect prediction framework based on feature representation and knowledge transfer"],"prefix":"10.1007","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3215-7478","authenticated-orcid":false,"given":"Yifan","family":"Zou","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1007-5589","authenticated-orcid":false,"given":"Huiqiang","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,16]]},"reference":[{"issue":"1","key":"2098_CR1","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s10515-024-00424-1","volume":"31","author":"Z Li","year":"2024","unstructured":"Li Z, Niu J, Jing XY (2024) Software defect prediction: future directions and challenges. Autom Softw Eng 31(1):19","journal-title":"Autom Softw Eng"},{"key":"2098_CR2","doi-asserted-by":"crossref","unstructured":"Grattan N, da Costa DA, Stanger N (2024) A systematic literature review. In: Information and Software Technology. The need for more informative defect prediction, pp. 107456","DOI":"10.1016\/j.infsof.2024.107456"},{"issue":"10","key":"2098_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3567550","volume":"55","author":"Y Zhao","year":"2023","unstructured":"Zhao Y, Damevski K, Chen H (2023) A systematic survey of just-in-time software defect prediction. ACM Comput Surv 55(10):1\u201335","journal-title":"ACM Comput Surv"},{"issue":"5","key":"2098_CR4","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/s10664-023-10371-2","volume":"28","author":"H Song","year":"2023","unstructured":"Song H, Wu G, Ma L, Pan Y, Huang Q, Jiang S (2023) Adversarial domain adaptation for cross-project defect prediction. Empir Softw Eng 28(5):127","journal-title":"Empir Softw Eng"},{"issue":"3","key":"2098_CR5","doi-asserted-by":"publisher","first-page":"1175","DOI":"10.1109\/TNSM.2018.2861717","volume":"15","author":"G Sun","year":"2018","unstructured":"Sun G, Li Y, Liao D, Chang V (2018) Service function chain orchestration across multiple domains: a full mesh aggregation approach. IEEE Trans Netw Serv Manage 15(3):1175\u20131191. https:\/\/doi.org\/10.1109\/TNSM.2018.2861717","journal-title":"IEEE Trans Netw Serv Manage"},{"issue":"10","key":"2098_CR6","doi-asserted-by":"publisher","first-page":"7155","DOI":"10.1109\/TII.2020.3042872","volume":"17","author":"G Sun","year":"2021","unstructured":"Sun G, Xu Z, Yu H, Chang V (2021) Dynamic network function provisioning to enable network in box for industrial applications. IEEE Trans Industr Inf 17(10):7155\u20137164. https:\/\/doi.org\/10.1109\/TII.2020.3042872","journal-title":"IEEE Trans Industr Inf"},{"issue":"6","key":"2098_CR7","doi-asserted-by":"publisher","first-page":"1169","DOI":"10.1007\/s41095-023-0389-6","volume":"10","author":"S Deng","year":"2024","unstructured":"Deng S, Wu L, Shi G, Xing L, Jian M, Xiang Y et al (2024) Learning to compose diversified prompts for image emotion classification. Comput Vis Media 10(6):1169\u20131183. https:\/\/doi.org\/10.1007\/s41095-023-0389-6","journal-title":"Comput Vis Media"},{"issue":"8","key":"2098_CR8","doi-asserted-by":"publisher","first-page":"7057","DOI":"10.1109\/TCSVT.2023.3341840","volume":"34","author":"G Shi","year":"2024","unstructured":"Shi G, Deng S, Wang B, Feng C, Zhuang Y, Wang X (2024) One for all: a unified generative framework for image emotion classification. IEEE Trans Circ Syst Video Technol 34(8):7057\u20137068. https:\/\/doi.org\/10.1109\/TCSVT.2023.3341840","journal-title":"IEEE Trans Circ Syst Video Technol"},{"issue":"4","key":"2098_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10664-024-10495-z","volume":"29","author":"S Jiang","year":"2024","unstructured":"Jiang S, Chen Y, He Z, Shang Y, Ma L (2024) Cross-project defect prediction via semantic and syntactic encoding. Empir Softw Eng 29(4):1\u201339","journal-title":"Empir Softw Eng"},{"issue":"9","key":"2098_CR10","doi-asserted-by":"publisher","first-page":"5366","DOI":"10.1109\/TNNLS.2022.3165627","volume":"34","author":"J Xia","year":"2023","unstructured":"Xia J, Li S, Huang J, Yang Z, Jaimoukha IM, G\u00fcnd\u00fcz D (2023) Metalearning-based alternating minimization algorithm for nonconvex optimization. IEEE Trans Neural Netw Learn Syst 34(9):5366\u20135380. https:\/\/doi.org\/10.1109\/TNNLS.2022.3165627","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"3","key":"2098_CR11","doi-asserted-by":"publisher","first-page":"1196","DOI":"10.1109\/TSC.2024.3355188","volume":"17","author":"P Wang","year":"2024","unstructured":"Wang P, Song W, Qi H, Zhou C, Li F, Wang Y et al (2024) Server-initiated federated unlearning to eliminate impacts of low-quality data. IEEE Trans Serv Comput 17(3):1196\u20131211. https:\/\/doi.org\/10.1109\/TSC.2024.3355188","journal-title":"IEEE Trans Serv Comput"},{"issue":"2","key":"2098_CR12","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1049\/sfw2.12053","volume":"16","author":"Q Huang","year":"2022","unstructured":"Huang Q, Ma L, Jiang S, Wu G, Song H, Jiang L et al (2022) A cross-project defect prediction method based on multi-adaptation and nuclear norm. IET Softw 16(2):200\u2013213","journal-title":"IET Softw"},{"issue":"3","key":"2098_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3507921","volume":"18","author":"X Zou","year":"2022","unstructured":"Zou X, Yuan J, Shilane P, Xia W, Zhang H, Wang X (2022) From hyper-dimensional structures to linear structures: maintaining deduplicated data\u2019s locality. ACM Trans Storage 18(3):1\u201328. https:\/\/doi.org\/10.1145\/3507921","journal-title":"ACM Trans Storage"},{"key":"2098_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.114637","volume":"171","author":"C Jin","year":"2021","unstructured":"Jin C (2021) Cross-project software defect prediction based on domain adaptation learning and optimization. Expert Syst Appl 171:114637","journal-title":"Expert Syst Appl"},{"key":"2098_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijfatigue.2024.108503","volume":"188","author":"X Liu","year":"2024","unstructured":"Liu X, Tan J, Long S (2024) Multi-axis fatigue load spectrum editing for automotive components using generalized s-transform. Int J Fatigue 188:108503. https:\/\/doi.org\/10.1016\/j.ijfatigue.2024.108503","journal-title":"Int J Fatigue"},{"issue":"2","key":"2098_CR16","doi-asserted-by":"publisher","first-page":"647","DOI":"10.1109\/TCSI.2024.3461736","volume":"72","author":"Y Xu","year":"2025","unstructured":"Xu Y, Ding L, He P, Lu Z, Zhang J (2025) Meta: a memory-efficient tri-stage polynomial multiplication accelerator using 2d coupled-bfus. IEEE Trans Circ Syst I Regul Pap 72(2):647\u2013660. https:\/\/doi.org\/10.1109\/TCSI.2024.3461736","journal-title":"IEEE Trans Circ Syst I Regul Pap"},{"key":"2098_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2022.111537","volume":"195","author":"G Giray","year":"2023","unstructured":"Giray G, Bennin KE, K\u00f6ksal \u00d6, Babur \u00d6, Tekinerdogan B (2023) On the use of deep learning in software defect prediction. J Syst Softw 195:111537. https:\/\/doi.org\/10.1016\/j.jss.2022.111537","journal-title":"J Syst Softw"},{"key":"2098_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.119625","volume":"218","author":"S Kanwar","year":"2023","unstructured":"Kanwar S, Awasthi LK, Shrivastava V (2023) Candidate project selection in cross project defect prediction using hybrid method. Expert Syst Appl 218:119625","journal-title":"Expert Syst Appl"},{"key":"2098_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2022.106985","volume":"150","author":"J Bai","year":"2022","unstructured":"Bai J, Jia J, Capretz LF (2022) A three-stage transfer learning framework for multi-source cross-project software defect prediction. Inf Softw Technol 150:106985","journal-title":"Inf Softw Technol"},{"key":"2098_CR20","doi-asserted-by":"crossref","unstructured":"Zhang S, Jiang S, Yan Y (2023) A hierarchical feature ensemble deep learning approach for software defect prediction. Int J Softw Eng Knowl Eng: 1\u201331","DOI":"10.1142\/S0218194023500079"},{"key":"2098_CR21","doi-asserted-by":"crossref","unstructured":"Qiu S, Huang M, Liang Y, Peng C, Yuan Y (2024) Code multiview hypergraph representation learning for software defect prediction. IEEE Trans Reliab","DOI":"10.1109\/TR.2024.3393415"},{"issue":"1","key":"2098_CR22","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/TSE.2018.2881961","volume":"47","author":"HK Dam","year":"2018","unstructured":"Dam HK, Tran T, Pham T, Ng SW, Grundy J, Ghose A (2018) Automatic feature learning for predicting vulnerable software components. IEEE Trans Softw Eng 47(1):67\u201385","journal-title":"IEEE Trans Softw Eng"},{"issue":"12","key":"2098_CR23","doi-asserted-by":"publisher","first-page":"1267","DOI":"10.1109\/apsec48747.2019.00041","volume":"46","author":"S Wang","year":"2018","unstructured":"Wang S, Liu T, Nam J, Tan L (2018) Deep semantic feature learning for software defect prediction. IEEE Trans Softw Eng 46(12):1267\u20131293. https:\/\/doi.org\/10.1109\/apsec48747.2019.00041","journal-title":"IEEE Trans Softw Eng"},{"key":"2098_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2022.107057","volume":"152","author":"C Zhou","year":"2022","unstructured":"Zhou C, He P, Zeng C, Ma J (2022) Software defect prediction with semantic and structural information of codes based on graph neural networks. Inf Softw Technol 152:107057. https:\/\/doi.org\/10.1016\/j.infsof.2022.107057","journal-title":"Inf Softw Technol"},{"key":"2098_CR25","doi-asserted-by":"crossref","unstructured":"Liu J, Xu H, Lu L, Zou Q, Yang Z (2023) A software defect prediction method based on multi-type features and feature selection. In: SEKE, pp. 238\u2013243","DOI":"10.18293\/SEKE2023-118"},{"key":"2098_CR26","doi-asserted-by":"publisher","unstructured":"Zhou W, Xia C, Wang T, Liang X, Lin W, Li X, et\u00a0al (2025) HIDIM: a novel framework of network intrusion detection for hierarchical dependency and class imbalance. Comput Secur: 104155. https:\/\/doi.org\/10.1016\/j.cose.2024.104155","DOI":"10.1016\/j.cose.2024.104155"},{"key":"2098_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2024.111492","volume":"157","author":"L Jing","year":"2024","unstructured":"Jing L, Fan X, Feng D, Lu C, Jiang S (2024) A patent text-based product conceptual design decision-making approach considering the fusion of incomplete evaluation semantic and scheme beliefs. Appl Soft Comput 157:111492. https:\/\/doi.org\/10.1016\/j.asoc.2024.111492","journal-title":"Appl Soft Comput"},{"key":"2098_CR28","doi-asserted-by":"crossref","unstructured":"Nam J, Pan SJ, Kim S (2013) Transfer defect learning. In: 35th international conference on software engineering (ICSE). IEEE, pp. 382\u2013391","DOI":"10.1109\/ICSE.2013.6606584"},{"issue":"3","key":"2098_CR29","doi-asserted-by":"publisher","first-page":"1380","DOI":"10.1109\/TKDE.2024.3523107","volume":"37","author":"C Fu","year":"2025","unstructured":"Fu C, Liu G, Yuan K, Wu J (2025) Nowhere to h2ide: fraud detection from multi-relation graphs via disentangled homophily and heterophily identification. IEEE Trans Knowl Data Eng 37(3):1380\u20131393. https:\/\/doi.org\/10.1109\/TKDE.2024.3523107","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"11","key":"2098_CR30","doi-asserted-by":"publisher","first-page":"16313","DOI":"10.1109\/TNNLS.2023.3293689","volume":"35","author":"H Li","year":"2024","unstructured":"Li H, Xia C, Wang T, Wang Z, Cui P, Li X (2024) Grass: learning spatial-temporal properties from chainlike cascade data for microscopic diffusion prediction. IEEE Trans Neural Netw Learn Syst 35(11):16313\u201316327. https:\/\/doi.org\/10.1109\/TNNLS.2023.3293689","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"2098_CR31","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.patrec.2022.04.039","volume":"160","author":"Y Xing","year":"2022","unstructured":"Xing Y, Qian X, Guan Y, Yang B, Zhang Y (2022) Cross-project defect prediction based on g-lstm model. Pattern Recogn Lett 160:50\u201357","journal-title":"Pattern Recogn Lett"},{"issue":"2","key":"2098_CR32","doi-asserted-by":"publisher","first-page":"284","DOI":"10.3390\/biomedicines13020284","volume":"13","author":"R Remtulla","year":"2025","unstructured":"Remtulla R, Samet A, Kulbay M, Akdag A, Hocini A, Volniansky A et al (2025) A future picture: a review of current generative adversarial neural networks in vitreoretinal pathologies and their future potentials. Biomedicines 13(2):284","journal-title":"Biomedicines"},{"issue":"8","key":"2098_CR33","doi-asserted-by":"publisher","first-page":"3025","DOI":"10.1007\/s10994-022-06169-w","volume":"111","author":"H Nguyen","year":"2022","unstructured":"Nguyen H, Pham H, Nguyen S, Van Linh N, Than K (2022) Adaptive infinite dropout for noisy and sparse data streams. Mach Learn 111(8):3025\u20133060","journal-title":"Mach Learn"},{"key":"2098_CR34","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1016\/j.geb.2024.10.009","volume":"148","author":"Y Cheng","year":"2024","unstructured":"Cheng Y, Deng X, Li Y, Yan X (2024) Tight incentive analysis of sybil attacks against the market equilibrium of resource exchange over general networks. Games Econom Behav 148:566\u2013610. https:\/\/doi.org\/10.1016\/j.geb.2024.10.009","journal-title":"Games Econom Behav"},{"key":"2098_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2025.104165","volume":"238","author":"G Xu","year":"2025","unstructured":"Xu G, Lei L, Mao Y, Li Z, Chen X, Zhang K (2025) Cbrfl: a framework for committee-based byzantine-resilient federated learning. J Netw Comput Appl 238:104165. https:\/\/doi.org\/10.1016\/j.jnca.2025.104165","journal-title":"J Netw Comput Appl"},{"issue":"3","key":"2098_CR36","doi-asserted-by":"publisher","first-page":"1748","DOI":"10.1109\/TSMC.2022.3205365","volume":"53","author":"Z Zhang","year":"2023","unstructured":"Zhang Z, Liu Z, Martin A, Zhou K (2023) Bsc: belief shift clustering. IEEE Trans Syst Man Cybern Syst 53(3):1748\u20131760. https:\/\/doi.org\/10.1109\/TSMC.2022.3205365","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"2098_CR37","doi-asserted-by":"publisher","unstructured":"Li J, He P, Zhu J, Lyu MR (2017) IEEE (2017) Software defect prediction via convolutional neural network, pp. 318\u2013328. https:\/\/doi.org\/10.1016\/j.advengsoft.2022.103138","DOI":"10.1016\/j.advengsoft.2022.103138"},{"key":"2098_CR38","doi-asserted-by":"crossref","unstructured":"Zimmermann T, Nagappan N, Gall H, Giger E, Murphy B (2009) Cross-project defect prediction: a large scale experiment on data vs. domain vs. process. In: Proceedings of the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering; pp. 91\u2013100","DOI":"10.1145\/1595696.1595713"},{"key":"2098_CR39","doi-asserted-by":"crossref","unstructured":"Aslam S, Rasool A, Li X, Wu H (2025) Cel: a continual learning model for disease outbreak prediction by leveraging domain adaptation via elastic weight consolidation. Interdiscip Sci: Comput Life Sci: 1\u201319","DOI":"10.1101\/2024.01.13.575497"},{"key":"2098_CR40","doi-asserted-by":"publisher","unstructured":"Zhang Z, Liu Z, Ning L, Tian H, Wang B (2025) Belief-based fuzzy and imprecise clustering for arbitrary data distributions. IEEE Trans Fuzzy Syst: 1\u201313. https:\/\/doi.org\/10.1109\/TFUZZ.2025.3576588","DOI":"10.1109\/TFUZZ.2025.3576588"},{"key":"2098_CR41","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2025.3571534","author":"J Wang","year":"2025","unstructured":"Wang J, Wang C, Guo L, Zhao S, Wang D, Zhang S et al (2025) Mdkat: multimodal decoupling with knowledge aggregation and transfer for video emotion recognition. IEEE Trans Circ Syst Video Technol. https:\/\/doi.org\/10.1109\/TCSVT.2025.3571534","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"2098_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TIM.2024.3370962","volume":"73","author":"Z Huang","year":"2024","unstructured":"Huang Z, Zhang C, Ge L, Chen Z, Lu K, Wu C (2024) Joining spatial deformable convolution and a dense feature pyramid for surface defect detection. IEEE Trans Instrum Meas 73:1\u201314. https:\/\/doi.org\/10.1109\/TIM.2024.3370962","journal-title":"IEEE Trans Instrum Meas"},{"key":"2098_CR43","doi-asserted-by":"crossref","unstructured":"Wang Y, Wang W, Joty S, Hoi SC (2021) Codet5: identifier-aware unified pre-trained encoder-decoder models for code understanding and generation. arXiv preprint arXiv:2109.00859","DOI":"10.18653\/v1\/2021.emnlp-main.685"},{"key":"2098_CR44","doi-asserted-by":"crossref","unstructured":"Wang Y, Le H, Gotmare AD, Bui ND, Li J, Hoi SC (2023) Codet5+: open code large language models for code understanding and generation. arXiv preprint arXiv:2305.07922","DOI":"10.18653\/v1\/2023.emnlp-main.68"},{"issue":"3","key":"2098_CR45","doi-asserted-by":"publisher","DOI":"10.1002\/smr.70013","volume":"37","author":"K Sekaran","year":"2025","unstructured":"Sekaran K, Lawrence SPA (2025) Leveraging levy flight and greylag goose optimization for enhanced cross-project defect prediction in software evolution. J Softw Evolut Process 37(3):e70013","journal-title":"J Softw Evolut Process"},{"issue":"1","key":"2098_CR46","doi-asserted-by":"publisher","first-page":"1294","DOI":"10.1109\/TIV.2023.3288810","volume":"9","author":"X Zhao","year":"2024","unstructured":"Zhao X, Wang T, Li Y, Zhang B, Liu K, Liu D et al (2024) Target-driven visual navigation by using causal intervention. IEEE Trans Intell Veh 9(1):1294\u20131304. https:\/\/doi.org\/10.1109\/TIV.2023.3288810","journal-title":"IEEE Trans Intell Veh"},{"key":"2098_CR47","doi-asserted-by":"publisher","first-page":"5944","DOI":"10.1109\/TASE.2024.3434610","volume":"22","author":"L Li","year":"2025","unstructured":"Li L, Cherouat A, Snoussi H, Wang T (2025) Grasping with occlusion-aware ally method in complex scenes. IEEE Trans Autom Sci Eng 22:5944\u20135954. https:\/\/doi.org\/10.1109\/TASE.2024.3434610","journal-title":"IEEE Trans Autom Sci Eng"},{"key":"2098_CR48","doi-asserted-by":"crossref","unstructured":"Ma J, Sun YY, He P, Zeng ZF (2023) GSAGE2defect: an improved approach to software defect prediction based on inductive graph neural network. In: SEKE; pp. 45\u201350","DOI":"10.18293\/SEKE2023-068"},{"key":"2098_CR49","unstructured":"Yanqiao Z, Yichen X, Feng Y, Qiang L, Shu W, Liang W (2020) Deep graph contrastive representation learning. arXiv preprint arXiv:2006.04131"},{"issue":"2","key":"2098_CR50","doi-asserted-by":"publisher","first-page":"905","DOI":"10.3390\/app15020905","volume":"15","author":"R Qiu","year":"2025","unstructured":"Qiu R, Yin Y, Su Q, Guan T (2025) Func-bagging: an ensemble learning strategy for improving the performance of heterogeneous anomaly detection models. Appl Sci 15(2):905. https:\/\/doi.org\/10.3390\/app15020905","journal-title":"Appl Sci"},{"issue":"6","key":"2098_CR51","doi-asserted-by":"publisher","first-page":"1781","DOI":"10.1109\/TFUZZ.2025.3536564","volume":"33","author":"J Yang","year":"2025","unstructured":"Yang J, Liu Z, Wang G, Zhang Q, Xia S, Wu D et al (2025) Constructing three-way decision with fuzzy granular-ball rough sets based on uncertainty invariance. IEEE Trans Fuzzy Syst 33(6):1781\u20131792. https:\/\/doi.org\/10.1109\/TFUZZ.2025.3536564","journal-title":"IEEE Trans Fuzzy Syst"},{"issue":"13","key":"2098_CR52","doi-asserted-by":"publisher","first-page":"2660","DOI":"10.3390\/app9132660","volume":"9","author":"S Qiu","year":"2019","unstructured":"Qiu S, Xu H, Deng J, Jiang S, Lu L (2019) Transfer convolutional neural network for cross-project defect prediction. Appl Sci 9(13):2660","journal-title":"Appl Sci"},{"key":"2098_CR53","doi-asserted-by":"crossref","unstructured":"Kramer O (2016) Scikit-learn. In: Machine learning for evolution strategies. Springer, pp. 45\u201353","DOI":"10.1007\/978-3-319-33383-0_5"},{"issue":"4","key":"2098_CR54","doi-asserted-by":"publisher","DOI":"10.1088\/1361-6420\/ad2cf7","volume":"40","author":"Z Tian","year":"2024","unstructured":"Tian Z, Lee A, Zhou S (2024) Adaptive tempered reversible jump algorithm for bayesian curve fitting. Inverse Prob 40(4):045024. https:\/\/doi.org\/10.1088\/1361-6420\/ad2cf7","journal-title":"Inverse Prob"},{"key":"2098_CR55","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2025.104203","volume":"240","author":"M Yue","year":"2025","unstructured":"Yue M, Yan H, Han R, Wu Z (2025) A ddos attack detection method based on iqr and dffcnn in sdn. J Netw Comput Appl 240:104203. https:\/\/doi.org\/10.1016\/j.jnca.2025.104203","journal-title":"J Netw Comput Appl"},{"issue":"1","key":"2098_CR56","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1186\/s40537-023-00694-8","volume":"10","author":"Y Yin","year":"2023","unstructured":"Yin Y, Jang-Jaccard J, Xu W, Singh A, Zhu J, Sabrina F et al (2023) Igrf-rfe: a hybrid feature selection method for mlp-based network intrusion detection on unsw-nb15 dataset. J Big Data 10(1):15","journal-title":"J Big Data"},{"key":"2098_CR57","doi-asserted-by":"crossref","unstructured":"Ai C (2022) A method for cancer genomics feature selection based on lasso-rfe. Iran J Sci Technol Trans A Sci 46(3):731\u2013738","DOI":"10.1007\/s40995-022-01292-8"},{"key":"2098_CR58","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2025.112352","volume":"222","author":"W Zheng","year":"2025","unstructured":"Zheng W, Liu C, Deng P, Chen X, Wu X (2025) Enhancing concurrency vulnerability detection through ast-based static fuzz mutation. J Syst Softw 222:112352. https:\/\/doi.org\/10.1016\/j.jss.2025.112352","journal-title":"J Syst Softw"},{"key":"2098_CR59","doi-asserted-by":"crossref","unstructured":"Zou Y, Wang H, Lv H, Zhao S, Tian H (2024) A cross-project defect prediction approach based on code semantics and cross-version structural information. Int J Softw Eng Knowl Eng: 1\u201337","DOI":"10.1142\/S0218194024500165"},{"key":"2098_CR60","doi-asserted-by":"publisher","first-page":"540","DOI":"10.1007\/s10664-008-9103-7","volume":"14","author":"B Turhan","year":"2009","unstructured":"Turhan B, Menzies T, Bener AB, Di Stefano J (2009) On the relative value of cross-company and within-company data for defect prediction. Empir Softw Eng 14:540\u2013578","journal-title":"Empir Softw Eng"},{"key":"2098_CR61","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.108362","volume":"123","author":"Q Wang","year":"2022","unstructured":"Wang Q, Breckon TP (2022) Cross-domain structure preserving projection for heterogeneous domain adaptation. Pattern Recogn 123:108362","journal-title":"Pattern Recogn"},{"key":"2098_CR62","doi-asserted-by":"publisher","unstructured":"Zhang Y, Feng S, Wang P, Tan Z, Luo X, Ji Y, et\u00a0al (2025) Learning self-growth maps for fast and accurate imbalanced streaming data clustering. IEEE Trans Neural Netw Learn Syst: 1\u201313. https:\/\/doi.org\/10.1109\/TNNLS.2025.3563769","DOI":"10.1109\/TNNLS.2025.3563769"},{"issue":"1","key":"2098_CR63","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/s11265-025-01954-x","volume":"97","author":"X Zenggang","year":"2025","unstructured":"Zenggang X, Qiangqiang L, Youfeng L, Hao C, Xuemin Z, Yuan L et al (2025) Ndlsc: a new deep learning-based approach to smart contract vulnerability detection. J Signal Process Syst 97(1):49\u201368. https:\/\/doi.org\/10.1007\/s11265-025-01954-x","journal-title":"J Signal Process Syst"},{"issue":"04","key":"2098_CR64","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1142\/S0218194025500172","volume":"35","author":"Y Zou","year":"2025","unstructured":"Zou Y, Wang H, Lv H, Zhao S (2025) Peapod: a heterogeneous defect prediction approach based on deep density sampling and deep domain adaptation. Int J Software Eng Knowl Eng 35(04):569\u2013607","journal-title":"Int J Software Eng Knowl Eng"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-025-02098-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-025-02098-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-025-02098-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T22:15:18Z","timestamp":1761948918000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-025-02098-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,16]]},"references-count":64,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["2098"],"URL":"https:\/\/doi.org\/10.1007\/s40747-025-02098-y","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,16]]},"assertion":[{"value":"6 June 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 September 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 September 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We declare that we do not have any known interests or personal relationships that could potentially influence the reported work in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}],"article-number":"459"}}