{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:48:18Z","timestamp":1775666898453,"version":"3.50.1"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,11,16]],"date-time":"2024-11-16T00:00:00Z","timestamp":1731715200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,16]],"date-time":"2024-11-16T00:00:00Z","timestamp":1731715200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Iran J Comput Sci"],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1007\/s42044-024-00214-8","type":"journal-article","created":{"date-parts":[[2024,11,16]],"date-time":"2024-11-16T16:56:08Z","timestamp":1731776168000},"page":"151-162","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Reinforcing defect prediction: a reinforcement learning approach to mitigate class imbalance in software defect prediction"],"prefix":"10.1007","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0668-9796","authenticated-orcid":false,"given":"Mahfooz","family":"Alam","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5055-5969","authenticated-orcid":false,"given":"Mohd","family":"Mustaqeem","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,16]]},"reference":[{"issue":"10","key":"214_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3567550","volume":"55","author":"Y Zhao","year":"2023","unstructured":"Zhao, Y., Damevski, K., Chen, H.: A systematic survey of just-in-time software defect prediction. ACM Comput. Surv. 55(10), 1\u201335 (2023)","journal-title":"ACM Comput. Surv."},{"key":"214_CR2","doi-asserted-by":"publisher","first-page":"2581","DOI":"10.1007\/s10586-021-03282-8","volume":"24","author":"M Mustaqeem","year":"2021","unstructured":"Mustaqeem, M., Saqib, M.: Principal component based support vector machine (PC-SVM): a hybrid technique for software defect detection. Clust. Comput. 24, 2581\u20132595 (2021). https:\/\/doi.org\/10.1007\/s10586-021-03282-8","journal-title":"Clust. Comput."},{"key":"214_CR3","doi-asserted-by":"publisher","first-page":"63579","DOI":"10.1109\/ACCESS.2023.3287326","volume":"11","author":"I Mehmood","year":"2023","unstructured":"Mehmood, I., Shahid, S., Hussain, H., Khan, I., Ahmad, S., Rahman, S., Ullah, N., Huda, S.: A novel approach to improve software defect prediction accuracy using machine learning. IEEE Access 11, 63579\u201363597 (2023)","journal-title":"IEEE Access"},{"key":"214_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121084","volume":"235","author":"S Feng","year":"2024","unstructured":"Feng, S., Keung, J., Xiao, Y., Zhang, P., Yu, X., Cao, X.: Improving the undersampling technique by optimizing the termination condition for software defect prediction. Expert Syst. Appl. 235, 121084 (2024). https:\/\/doi.org\/10.1016\/j.eswa.2023.121084","journal-title":"Expert Syst. Appl."},{"key":"214_CR5","doi-asserted-by":"publisher","unstructured":"Ghotra, B., McIntosh, S. and Hassan, A. E.: A large-scale study of the impact of feature selection techniques on defect classification models. In: 2017 IEEE\/ACM 14th International Conference on Mining Software Repositories (MSR), pp. 146\u2013157 (2017). https:\/\/doi.org\/10.1109\/MSR.2017.18.","DOI":"10.1109\/MSR.2017.18"},{"key":"214_CR6","doi-asserted-by":"crossref","unstructured":"Bahaweres, R. B. and Nuraini, I. K.: Cost-sensitive approach for improving AUC-ROC curve of software defect prediction. In: 2024 International Seminar on Intelligent Technology and Its Applications (ISITIA), pp. 178\u2013183 (2024)","DOI":"10.1109\/ISITIA63062.2024.10668184"},{"issue":"2","key":"214_CR7","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1108\/IJICC-11-2023-0385","volume":"17","author":"M Mustaqeem","year":"2024","unstructured":"Mustaqeem, M., Mustajab, S., Alam, M.: A hybrid approach for optimizing software defect prediction using a gray wolf optimization and multilayer perceptron. Int. J. Intell. Comput. Cybern. 17(2), 436\u2013464 (2024). https:\/\/doi.org\/10.1108\/IJICC-11-2023-0385","journal-title":"Int. J. Intell. Comput. Cybern."},{"issue":"7","key":"214_CR8","doi-asserted-by":"publisher","first-page":"1546","DOI":"10.3390\/electronics12071546","volume":"12","author":"W Yao","year":"2023","unstructured":"Yao, W., Shafiq, M., Lin, X., Yu, X.: A software defect prediction method based on program semantic feature mining. Electronics 12(7), 1546 (2023)","journal-title":"Electronics"},{"key":"214_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2022.111537","volume":"195","author":"G Giray","year":"2023","unstructured":"Giray, G., Bennin, K.E., K\u00f6ksal, \u00d6., Babur, \u00d6., Tekinerdogan, B.: On the use of deep learning in software defect prediction. J. Syst. Softw. 195, 111537 (2023). https:\/\/doi.org\/10.1016\/j.jss.2022.111537","journal-title":"J. Syst. Softw."},{"issue":"6","key":"214_CR10","doi-asserted-by":"publisher","first-page":"757","DOI":"10.1109\/TSE.2012.70","volume":"39","author":"Y Kamei","year":"2012","unstructured":"Kamei, Y., Shihab, E., Adams, B., Hassan, A.E., Mockus, A., Sinha, A., Ubayashi, N.: A large-scale empirical study of just-in-time quality assurance. IEEE Trans. Softw. Eng. 39(6), 757\u2013773 (2012). https:\/\/doi.org\/10.1109\/TSE.2012.70","journal-title":"IEEE Trans. Softw. Eng."},{"key":"214_CR11","doi-asserted-by":"publisher","unstructured":"Balogun, A.O., Lafenwa-Balogun, F.B., Mojeed, H.A., Usman-Hamza, F.E., Bajeh, A.O., Adeyemo, V.E., Adewole, K.S. and Jimoh, R.G.: Data sampling-based feature selection framework for software defect prediction. In: International Conference on Emerging Applications and Technologies for Industry 4.0 (EATI\u20192020), pp. 39\u201352 (2021). https:\/\/doi.org\/10.1007\/978-3-030-80216-5_4.","DOI":"10.1007\/978-3-030-80216-5_4"},{"key":"214_CR12","doi-asserted-by":"publisher","unstructured":"Roy, N. K. S. and Rossi, B.: Cost-sensitive strategies for data imbalance in bug severity classification: experimental results. In: 2017 43rd Euromicro Conference on Software Engineering and Advanced Applications (SEAA), pp. 426\u2013429 (2017). https:\/\/doi.org\/10.1109\/SEAA.2017.71.","DOI":"10.1109\/SEAA.2017.71"},{"issue":"7","key":"214_CR13","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0307112","volume":"19","author":"M Mustaqeem","year":"2024","unstructured":"Mustaqeem, M., Mustajab, S., Alam, M., Jeribi, F., Alam, S., Shuaib, M.: A trustworthy hybrid model for transparent software defect prediction: SPAM-XAI. PLoS ONE 19(7), e0307112 (2024). https:\/\/doi.org\/10.1371\/journal.pone.0307112","journal-title":"PLoS ONE"},{"key":"214_CR14","doi-asserted-by":"publisher","unstructured":"Liu, X.-Y. and Zhou, Z.-H.: The influence of class imbalance on cost-sensitive learning: an empirical study. In: Sixth International Conference on Data Mining (ICDM\u201906), pp. 970\u2013974 (2006). https:\/\/doi.org\/10.1109\/ICDM.2006.158.","DOI":"10.1109\/ICDM.2006.158"},{"key":"214_CR15","volume-title":"Reinforcement Learning: An Introduction","author":"RS Sutton","year":"2018","unstructured":"Sutton, R.S., Barto, A.G.: Reinforcement Learning: An Introduction. MIT Press (2018)"},{"issue":"8","key":"214_CR16","doi-asserted-by":"publisher","first-page":"2836","DOI":"10.1109\/TSE.2021.3070549","volume":"48","author":"M Bagherzadeh","year":"2021","unstructured":"Bagherzadeh, M., Kahani, N., Briand, L.: Reinforcement learning for test case prioritization. IEEE Trans. Softw. Eng. 48(8), 2836\u20132856 (2021). https:\/\/doi.org\/10.1109\/TSE.2021.3070549","journal-title":"IEEE Trans. Softw. Eng."},{"key":"214_CR17","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/s11219-020-09532-z","volume":"30","author":"MH Moghadam","year":"2022","unstructured":"Moghadam, M.H., Saadatmand, M., Borg, M., Bohlin, M., Lisper, B.: An autonomous performance testing framework using self-adaptive fuzzy reinforcement learning. Softw. Qual. J. 30, 127\u2013159 (2022). https:\/\/doi.org\/10.1007\/s11219-020-09532-z","journal-title":"Softw. Qual. J."},{"key":"214_CR18","doi-asserted-by":"publisher","first-page":"47568","DOI":"10.1109\/ACCESS.2024.3382991","volume":"12","author":"AM Ismail","year":"2024","unstructured":"Ismail, A.M., Ab Hamid, S.H., Sani, A.A., Daud, N.N.M.: Toward reduction in false positives just-in-time software defect prediction using deep reinforcement learning. IEEE Access 12, 47568\u201347580 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3382991","journal-title":"IEEE Access"},{"key":"214_CR19","doi-asserted-by":"publisher","first-page":"87832","DOI":"10.1109\/ACCESS.2022.3195039","volume":"10","author":"A Wang","year":"2022","unstructured":"Wang, A., Zhao, Y., Li, G., Zhang, J., Wu, H., Iwahori, Y.: Heterogeneous defect prediction based on federated reinforcement learning via gradient clustering. IEEE Access 10, 87832\u201387843 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3195039","journal-title":"IEEE Access"},{"key":"214_CR20","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: SMOTE: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321\u2013357 (2002). https:\/\/doi.org\/10.1613\/jair.953","journal-title":"J. Artif. Intell. Res."},{"issue":"4","key":"214_CR21","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1109\/TSMCC.2011.2161285","volume":"42","author":"I Galar","year":"2012","unstructured":"Galar, I., Fernandez, A., Barrenechea, E., Bustince, H., Herrera, F.: A review on ensembles for the class imbalance problem: bagging-, boosting-, and hybrid-based approaches. IEEE Trans. Syst. Man Cybern. Part C Appl. Rev. 42(4), 463\u2013484 (2012). https:\/\/doi.org\/10.1109\/TSMCC.2011.2161285","journal-title":"IEEE Trans. Syst. Man Cybern. Part C Appl. Rev."},{"key":"214_CR22","doi-asserted-by":"publisher","unstructured":"Han, H., Wang, W. and Mao, B.: Borderline-SMOTE: a new over-sampling method in imbalanced data sets learning. In: Proceedings of International Conference on Intelligent Computing, pp. 878\u2013887 (2005). https:\/\/doi.org\/10.1007\/11538059_91.","DOI":"10.1007\/11538059_91"},{"key":"214_CR23","doi-asserted-by":"publisher","unstructured":"Chawla, N. V., Lazarevic, A., Hall, L. O. and Bowyer, K. W.: SMOTEBoost: improving prediction of the minority class in boosting. In: Proceedings of the Seventh European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD 2003), pp. 107\u2013119 (2003). https:\/\/doi.org\/10.1007\/978-3-540-39804-2_12.","DOI":"10.1007\/978-3-540-39804-2_12"},{"key":"214_CR24","doi-asserted-by":"publisher","unstructured":"Chen, T. and Guestrin, C.: XGBoost: a scalable tree boosting system. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 785\u2013794 (2016). https:\/\/doi.org\/10.1145\/2939672.2939785.","DOI":"10.1145\/2939672.2939785"},{"key":"214_CR25","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.ins.2018.03.002","volume":"445","author":"S Garc\u00eda","year":"2018","unstructured":"Garc\u00eda, S., Zhang, Z.-L., Altalhi, A., Alshomrani, S., Herrera, F.: Dynamic ensemble selection for multi-class imbalanced datasets. Inf. Sci. (Ny) 445, 22\u201337 (2018)","journal-title":"Inf. Sci. (Ny)"}],"container-title":["Iran Journal of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42044-024-00214-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42044-024-00214-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42044-024-00214-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T10:51:21Z","timestamp":1741085481000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42044-024-00214-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,16]]},"references-count":25,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["214"],"URL":"https:\/\/doi.org\/10.1007\/s42044-024-00214-8","relation":{},"ISSN":["2520-8438","2520-8446"],"issn-type":[{"value":"2520-8438","type":"print"},{"value":"2520-8446","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,16]]},"assertion":[{"value":"11 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 November 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 November 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies involving animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical standards"}}]}}