{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T20:07:28Z","timestamp":1762027648461,"version":"build-2065373602"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-025-04426-y","type":"journal-article","created":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T08:06:23Z","timestamp":1761984383000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Software Fault Prediction Using Swarm Intelligence and Deep Learning Approach: Optimizing Accuracy and Robustness"],"prefix":"10.1007","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-8484-2431","authenticated-orcid":false,"given":"Seema","family":"Kalonia","sequence":"first","affiliation":[]},{"given":"Amrita","family":"Upadhyay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,1]]},"reference":[{"issue":"1","key":"4426_CR1","first-page":"1","volume":"1","author":"RS Wahono","year":"2015","unstructured":"Wahono RS. A systematic literature review of software defect prediction. J Softw Eng. 2015;1(1):1\u201316.","journal-title":"J Softw Eng"},{"issue":"4","key":"4426_CR2","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1109\/TSE.2008.35","volume":"34","author":"S Lessmann","year":"2008","unstructured":"Lessmann S, Baesens B, Mues C, Pietsch S. Benchmarking classification models for software defect prediction: a proposed framework and novel findings. IEEE Trans Softw Eng. 2008;34(4):485\u201396.","journal-title":"IEEE Trans Software Eng"},{"issue":"1","key":"4426_CR3","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TSE.2007.256941","volume":"33","author":"T Menzies","year":"2006","unstructured":"Menzies T, Greenwald J, Frank A. Data mining static code attributes to learn defect predictors. IEEE Trans Softw Eng. 2006;33(1):2\u201313.","journal-title":"IEEE Trans Software Eng"},{"key":"4426_CR4","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/J.INS.2011.01.039","volume":"191","author":"D Rodr\u00b4\u0131guez","year":"2012","unstructured":"Rodr\u00b4\u0131guez D, Ruiz R, Riquelme JC, Aguilar-Ruiz JS. Searching for rules to detect defective modules. Inf Sci. 2012;191:14\u201330. https:\/\/doi.org\/10.1016\/J.INS.2011.01.039.","journal-title":"Inf Sci"},{"key":"4426_CR5","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun Y, Bengio Y, Hinton G. Deep learning. Nature. 2015;521:436\u201344. https:\/\/doi.org\/10.1038\/nature14539.","journal-title":"Nature"},{"key":"4426_CR6","unstructured":"Kitchenham B, Charters S, et al. Guidelines for performing systematic literature reviews in software engineering. UK; (2007)."},{"key":"4426_CR7","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1109\/TSE.1976.233837","volume":"4","author":"TJ McCabe","year":"1976","unstructured":"McCabe TJ. A complexity measure. IEEE Trans Softw Eng. 1976;4:308\u201320.","journal-title":"IEEE Trans Softw Eng"},{"issue":"6","key":"4426_CR8","doi-asserted-by":"publisher","first-page":"476","DOI":"10.1109\/32.295895","volume":"20","author":"SR Chidamber","year":"1994","unstructured":"Chidamber SR, Kemerer CF. A metrics suite for object-oriented design. IEEE Trans Softw Eng. 1994;20(6):476\u201393. https:\/\/doi.org\/10.1109\/32.295895.","journal-title":"IEEE Trans Software Eng"},{"issue":"9","key":"4426_CR9","doi-asserted-by":"publisher","first-page":"1208","DOI":"10.1109\/TSE.2013.11","volume":"39","author":"M Shepperd","year":"2013","unstructured":"Shepperd M, Song Q, Sun Z, Mair C. Data quality: some comments on the Nasa software defect datasets. IEEE Trans Softw Eng. 2013;39(9):1208\u201315.","journal-title":"IEEE Trans Software Eng"},{"key":"4426_CR10","doi-asserted-by":"crossref","unstructured":"Jureczko M, Madeyski L. Towards identifying software project clusters with regard to defect prediction. In: Proceedings of the 6th international conference on predictive models in software engineering; 2010. pp. 1\u201310.","DOI":"10.1145\/1868328.1868342"},{"key":"4426_CR11","doi-asserted-by":"crossref","unstructured":"Bennin KE, Toda K, Kamei Y, Keung J, Monden A, Ubayashi N. Empirical evaluation of cross-release effort-aware defect prediction models. In: 2016 IEEE international conference on software quality, reliability, and security; 2016. pp. 214\u2013221.","DOI":"10.1109\/QRS.2016.33"},{"key":"4426_CR12","doi-asserted-by":"crossref","unstructured":"Omri S, Sinz C. Deep learning for software defect prediction: a survey. In: Proceedings of the IEEE\/ACM 42nd international conference on software engineering workshops; 2020. pp. 209\u2013214.","DOI":"10.1145\/3387940.3391463"},{"issue":"6","key":"4426_CR13","doi-asserted-by":"publisher","first-page":"1090","DOI":"10.1007\/s11390-017-1785-0","volume":"32","author":"C Ni","year":"2017","unstructured":"Ni C, Liu WS, Chen X, Gu Q, Chen DX, Huang QG. A cluster-based feature selection method for cross-project software defect prediction. J 23 Comput Sci Technol. 2017;32(6):1090\u2013107.","journal-title":"J 23 Comput Sci Technol"},{"key":"4426_CR14","doi-asserted-by":"publisher","first-page":"106892","DOI":"10.1016\/J.INFSOF.2022.106892","volume":"147","author":"H Chen","year":"2022","unstructured":"Chen H, Jing X-Y, Zhou Y, Li B, Xu B. Aligned metric representation based on balanced multiset ensemble learning for heterogeneous defect predic- Tion. \u200eInf Softw Technol. 2022;147:106892. https:\/\/doi.org\/10.1016\/J.INFSOF.2022.106892.","journal-title":"\u200eInf Softw Technol"},{"issue":"09","key":"4426_CR15","doi-asserted-by":"publisher","first-page":"874","DOI":"10.1109\/TSE.2017.2720603","volume":"44","author":"J Nam","year":"2018","unstructured":"Nam J, Fu W, Kim S, Menzies T, Tan L. Heterogeneous defect prediction. IEEE Trans Software Eng. 2018;44(09):874\u201396. https:\/\/doi.org\/10.1109\/TSE.2017.2720603.","journal-title":"IEEE Trans Software Eng"},{"issue":"6","key":"4426_CR16","doi-asserted-by":"publisher","first-page":"757","DOI":"10.1109\/TSE.2012.70","volume":"39","author":"Y Kamei","year":"2013","unstructured":"Kamei Y, Shihab E, Adams B, Hassan AE, Mockus A, Sinha A, Ubayashi N. A large-scale empirical study of just-in-time quality assurance. IEEE Trans Actions Softw Eng. 2013;39(6):757\u201373. https:\/\/doi.org\/10.1109\/TSE.2012.70.","journal-title":"IEEE Trans- Actions Softw Eng"},{"key":"4426_CR17","doi-asserted-by":"publisher","unstructured":"Cabral GG, Minku LL, Shihab E, Mujahid S. Class imbalance evolution and verification latency in just-in-time software defect prediction. In: Proceedings international conference on software engineering; 2019. pp. 666\u2013676. https:\/\/doi.org\/10.1109\/ICSE.2019.00076","DOI":"10.1109\/ICSE.2019.00076"},{"key":"4426_CR18","doi-asserted-by":"publisher","first-page":"111245","DOI":"10.1016\/j.jss.2022.111245","volume":"188","author":"W Zheng","year":"2022","unstructured":"Zheng W, Shen T, Chen X, Deng P. Interpretability application of the just- in-time software defect prediction model. J Syst Softw. 2022;188:111245.","journal-title":"J Syst Softw"},{"key":"4426_CR19","doi-asserted-by":"publisher","first-page":"110059","DOI":"10.1109\/ACCESS.2020.3001440","volume":"8","author":"J Zhang","year":"2020","unstructured":"Zhang J, Zhang J, Wu J, Wu J, Chen C, Lyu MR. Cds: a cross-version software defect prediction model with data selection. IEEE Access. 2020;8:110059\u201372. https:\/\/doi.org\/10.1109\/ACCESS.2020.3001440.","journal-title":"IEEE Access"},{"key":"4426_CR20","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/J.ASOC.2015.04.045","volume":"33","author":"O\u00a8F Arar","year":"2015","unstructured":"Arar O\u00a8F, Ayan K. Software defect prediction using cost-sensitive neural network. Appl Soft Comput. 2015;33:263\u201377. https:\/\/doi.org\/10.1016\/J.ASOC.2015.04.045.","journal-title":"Appl Soft Comput"},{"issue":"7","key":"4426_CR21","doi-asserted-by":"publisher","first-page":"2551","DOI":"10.3390\/s22072551","volume":"22","author":"M Jorayeva","year":"2022","unstructured":"Jorayeva M, Akbulut A, Catal C, Mishra A. Machine learning-based software defect prediction for mobile applications: a systematic literature review. Sensors. 2022;22(7):2551.","journal-title":"Sensors"},{"key":"4426_CR22","volume-title":"Deep learning","author":"I Goodfellow","year":"2016","unstructured":"Goodfellow I, Bengio Y, Courville A. Deep learning. MIT Press; 2016."},{"issue":"1","key":"4426_CR23","doi-asserted-by":"publisher","first-page":"14771","DOI":"10.1038\/s41598-024-65639-4","volume":"14","author":"A Abdu","year":"2024","unstructured":"Abdu A, Zhai Z, Abdo HA, Algabri R, Al-Masni MA, Muhammad MS, Gu YH. Semantic and traditional feature fusion for software defect prediction using hybrid deep learning model. Sci Rep. 2024;14(1):14771.","journal-title":"Sci Rep"},{"key":"4426_CR24","doi-asserted-by":"crossref","unstructured":"Kalonia S, Upadhyay A. A systematic review of software fault prediction using deep learning: challenges and future perspectives. In: International conference on advances in data-driven computing and intelligent systems. Singapore: Springer Nature Singapore; 2023. pp. 533\u2013548.","DOI":"10.1007\/978-981-99-9518-9_39"},{"issue":"4","key":"4426_CR25","first-page":"407","volume":"50","author":"H Alsghaier","year":"2020","unstructured":"Alsghaier H, Akour M. Software fault prediction using particle swarm algorithm with genetic algorithm and support vector machine classifier. Softw Pract Exp. 2020;50(4):407\u201327.","journal-title":"Software: Pract Experience"},{"key":"4426_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.dsp.2017.10.011","volume":"73","author":"G Montavon","year":"2018","unstructured":"Montavon G, Samek W, Mu\u00a8ller KR. Methods for interpreting and under- standing deep neural networks. Digit Signal Proc. 2018;73:1\u201315.","journal-title":"Digit Signal Proc"},{"key":"4426_CR27","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.neunet.2021.01.026","volume":"138","author":"A Apicella","year":"2021","unstructured":"Apicella A, Donnarumma F, Isgr`o F, Prevete R. A survey on modern trainable activation functions. Neural Netw. 2021;138:14\u201332.","journal-title":"Neural Netw"},{"key":"4426_CR28","unstructured":"Rao D, McMahan B. Natural language processing with pytorch : build intelligent language applications using deep learning; (2019)."},{"issue":"8","key":"4426_CR29","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter S, Schmidhuber J. Long short-term memory. Neural Comput. 1997;9(8):1735\u201380. https:\/\/doi.org\/10.1162\/neco.1997.9.8.1735.","journal-title":"Neural Comput"},{"key":"4426_CR30","unstructured":"Chung J, Gulcehre C, Cho K, Bengio Y. Empirical evaluation of gated recurrent neural networks on sequence modeling. 2014. http:\/\/arxiv.org\/abs\/1412.3555"},{"key":"4426_CR31","doi-asserted-by":"crossref","unstructured":"Golovko V, Kroshchanka A, Rubanau U, Jankowski S. A learning technique for deep belief neural networks. In: International conference on neural networks and artificial intelligence; 2014. pp. 136\u2013146.","DOI":"10.1007\/978-3-319-08201-1_13"},{"key":"4426_CR32","doi-asserted-by":"crossref","unstructured":"Cho K, Van Merri\u00a8enboer B, Gulcehre C, Bahdanau D, Bougares F, Schwenk H, Bengio Y. Learning phrase representations using Rnn encoder\u2013decoder for statistical machine translation. 2014. arXiv preprint arXiv:1406.1078.","DOI":"10.3115\/v1\/D14-1179"},{"key":"4426_CR33","doi-asserted-by":"crossref","unstructured":"Chollampatt S, Ng HT. A multi-layer convolutional encoder\u2013decoder neural network for grammatical error correction. 2018; 32(1).","DOI":"10.1609\/aaai.v32i1.12069"},{"issue":"3","key":"4426_CR34","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1049\/iet-sen.2019.0278","volume":"14","author":"K Zhu","year":"2020","unstructured":"Zhu K, Zhang N, Ying S, Zhu D. Within-project and cross-project justin- time defect prediction based on denoising autoencoder and convolutional neural network. IET Softw. 2020;14(3):185\u201395.","journal-title":"IET Software"},{"key":"4426_CR35","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.infsof.2017.11.008","volume":"96","author":"H Tong","year":"2018","unstructured":"Tong H, Liu B, Wang S. Software defect prediction using stacked denois- Ing autoencoders and two-stage ensemble learning. \u200eInf Softw Technol. 2018;96:94\u2013111. https:\/\/doi.org\/10.1016\/j.infsof.2017.11.008.","journal-title":"\u200eInf Softw Technol"},{"issue":"2","key":"4426_CR36","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/s11219-021-09553-2","volume":"29","author":"J Wu","year":"2021","unstructured":"Wu J, Wu Y, Niu N, Zhou M. Mhcpdp: multi-source heterogeneous cross- project defect prediction via multi-source transfer learning and autoencoder. Softw Qual J. 2021;29(2):405\u201330.","journal-title":"Software Qual J"},{"key":"4426_CR37","doi-asserted-by":"crossref","unstructured":"Zhang T, Du Q, Xu J, Li J, Li X. Software defect prediction and localization with attention-based models and ensemble learning. In: 2020 27th Asia-pacific software engineering conference (APSEC). IEEE; 2020. pp. 81\u201390.","DOI":"10.1109\/APSEC51365.2020.00016"},{"issue":"1\u20133","key":"4426_CR38","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1016\/J.NEUCOM.2005.12.126","volume":"70","author":"GB Huang","year":"2006","unstructured":"Huang GB, Zhu QY, Siew CK. Extreme learning machine: theory and applications. Neurocomputing. 2006;70(1\u20133):489\u2013501. https:\/\/doi.org\/10.1016\/J.NEUCOM.2005.12.126.","journal-title":"Neurocomputing"},{"key":"4426_CR39","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/J.NEUNET.2012.04.002","volume":"33","author":"X Liu","year":"2012","unstructured":"Liu X, Gao C, Li P. A comparative analysis of support vector machines and extreme learning machines. Neural Netw. 2012;33:58\u201366. https:\/\/doi.org\/10.1016\/J.NEUNET.2012.04.002.","journal-title":"Neural Netw"},{"key":"4426_CR40","unstructured":"Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Bengio Y. Generative adversarial Nets. Adv Neural Inf Process Syst. 2014;25."},{"key":"4426_CR41","doi-asserted-by":"publisher","first-page":"7663","DOI":"10.1109\/ACCESS.2018.2889061","volume":"7","author":"L Zhao","year":"2018","unstructured":"Zhao L, Shang Z, Zhao L, Qin A, Tang YY. Siamese dense neural network for software defect prediction with small data. IEEE Access. 2018;7:7663\u201377.","journal-title":"IEEE Access"},{"key":"4426_CR42","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.neucom.2019.03.076","volume":"352","author":"L Zhao","year":"2019","unstructured":"Zhao L, Shang Z, Zhao L, Zhang T, Tang YY. Software defect prediction via cost-sensitive Siamese parallel fully-connected neural networks. Neurocomputing. 2019;352:64\u201374.","journal-title":"Neurocomputing"},{"key":"4426_CR43","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.ins.2018.02.027","volume":"441","author":"DL Miholca","year":"2018","unstructured":"Miholca DL, Czibula G, Czibula IG. A novel approach for software defect prediction through hybridizing gradual relational association rules with artificial neural networks. Inf Sci. 2018;441:152\u201370.","journal-title":"Inf Sci"},{"key":"4426_CR44","doi-asserted-by":"crossref","unstructured":"Pan C, Lu M, Xu B, Gao H. An improved Cnn model for within-project software defect prediction. Appl Sci. 2019;9.","DOI":"10.3390\/app9102138"},{"key":"4426_CR45","doi-asserted-by":"crossref","unstructured":"Fan G, Diao X, Yu H, Yang K, Chen L. Software defect prediction via attention-based recurrent neural network. Sci Progr. 2019;2019.","DOI":"10.1155\/2019\/6230953"},{"key":"4426_CR46","doi-asserted-by":"publisher","first-page":"768","DOI":"10.1049\/iet-sen.2020.0119","volume":"14","author":"SK Pandey","year":"2020","unstructured":"Pandey SK, Rathee D, Tripathi AK. Software defect prediction using k- Pca and various kernel-based extreme learning machine: an empirical study. IET Softw. 2020;14:768\u201382.","journal-title":"IET Software"},{"key":"4426_CR47","unstructured":"Yedida R, Menzies T. On the value of oversampling for deep learning in software defect prediction (2020)."},{"key":"4426_CR48","doi-asserted-by":"crossref","unstructured":"Pandey SK, Haldar A, Tripathi AK. Is deep learning good enough for software defect prediction? Innov Syst Softw Eng. 2023;1\u201316.","DOI":"10.2139\/ssrn.4089137"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04426-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-025-04426-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04426-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T20:03:14Z","timestamp":1762027394000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-025-04426-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,1]]},"references-count":48,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["4426"],"URL":"https:\/\/doi.org\/10.1007\/s42979-025-04426-y","relation":{},"ISSN":["2661-8907"],"issn-type":[{"type":"electronic","value":"2661-8907"}],"subject":[],"published":{"date-parts":[[2025,11,1]]},"assertion":[{"value":"30 January 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 September 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"None.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}],"article-number":"937"}}