{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:13:34Z","timestamp":1772039614487,"version":"3.50.1"},"reference-count":57,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information and Software Technology"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1016\/j.infsof.2023.107175","type":"journal-article","created":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T16:33:30Z","timestamp":1676392410000},"page":"107175","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":43,"special_numbering":"C","title":["Application of Deep Learning in Software Defect Prediction: Systematic Literature Review and Meta-analysis"],"prefix":"10.1016","volume":"158","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5973-387X","authenticated-orcid":false,"given":"Zuhaira Muhammad","family":"Zain","sequence":"first","affiliation":[]},{"given":"Sapiah","family":"Sakri","sequence":"additional","affiliation":[]},{"given":"Nurul Halimatul Asmak","family":"Ismail","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.infsof.2023.107175_bib0001","series-title":"Proceedings - 2020 IEEE\/ACM 42nd International Conference on Software Engineering Workshops, ICSEW","article-title":"Deep Learning for Software Defect Prediction: A Survey","volume":"2020","author":"Omri","year":"2020"},{"key":"10.1016\/j.infsof.2023.107175_bib0002","doi-asserted-by":"crossref","first-page":"1276","DOI":"10.1109\/TSE.2011.103","article-title":"A systematic literature review on fault prediction performance in software engineering","volume":"38","author":"Hall","year":"2012","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/j.infsof.2023.107175_bib0003","series-title":"2017 IEEE International Conference on Cybernetics and Computational Intelligence, CyberneticsCOM 2017 - Proceedings","article-title":"Software metrics for fault prediction using machine learning approaches: A literature review with PROMISE repository dataset","author":"Meiliana","year":"2018"},{"key":"10.1016\/j.infsof.2023.107175_bib0004","doi-asserted-by":"crossref","DOI":"10.1016\/j.jss.2018.06.025","article-title":"Early software defect prediction: A systematic map and review","volume":"144","author":"\u00d6zak\u0131nc\u0131","year":"2018","journal-title":"Journal of Systems and Software"},{"key":"10.1016\/j.infsof.2023.107175_bib0005","doi-asserted-by":"crossref","DOI":"10.1016\/j.infsof.2020.106287","article-title":"A systematic review of unsupervised learning techniques for software defect prediction","volume":"122","author":"Li","year":"2020","journal-title":"Inf Softw Technol"},{"key":"10.1016\/j.infsof.2023.107175_bib0006","doi-asserted-by":"crossref","unstructured":"E.N. Akimova, A.Y. Bersenev, A.A. Deikov, K.S. Kobylkin, A. v. Konygin, I.P. Mezentsev, V.E. Misilov, A survey on software defect prediction using deep learning, Mathematics. 9 (2021). https:\/\/doi.org\/10.3390\/math9111180.","DOI":"10.3390\/math9111180"},{"key":"10.1016\/j.infsof.2023.107175_bib0007","first-page":"27","article-title":"A systematic review of machine learning techniques for software fault prediction","author":"Malhotra","year":"2015","journal-title":"Applied Soft Computing Journal"},{"key":"10.1016\/j.infsof.2023.107175_bib0008","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-38980-6_21","article-title":"The role of process in early software defect prediction: Methods, attributes and metrics","author":"Ozakinci","year":"2016","journal-title":"Communications in Computer and Information Science"},{"key":"10.1016\/j.infsof.2023.107175_bib0009","article-title":"A Systematic Literature Review of Software Defect Prediction: Research Trends, Datasets, Methods and Frameworks","volume":"1","author":"Wahono","year":"2015","journal-title":"Journal of Software Engineering"},{"key":"10.1016\/j.infsof.2023.107175_bib0010","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2008.10.027","article-title":"A systematic review of software fault prediction studies","volume":"36","author":"Catal","year":"2009","journal-title":"Expert Syst Appl"},{"key":"10.1016\/j.infsof.2023.107175_bib0011","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2010.10.024","article-title":"Software fault prediction: A literature review and current trends","volume":"38","author":"Catal","year":"2011","journal-title":"Expert Syst Appl"},{"key":"10.1016\/j.infsof.2023.107175_bib0012","doi-asserted-by":"crossref","DOI":"10.1016\/j.infsof.2013.02.009","article-title":"Software fault prediction metrics: A systematic literature review","volume":"55","author":"Radjenovi\u0107","year":"2013","journal-title":"Inf Softw Technol"},{"key":"10.1016\/j.infsof.2023.107175_bib0013","doi-asserted-by":"crossref","DOI":"10.1109\/TSE.2014.2322358","article-title":"Researcher bias: The use of machine learning in software defect prediction","volume":"40","author":"Shepperd","year":"2014","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/j.infsof.2023.107175_bib0014","series-title":"CIBSE 2015 - XVIII Ibero-American Conference on Software Engineering","article-title":"Software fault prediction: A systematic mapping study","author":"Murillo-Morera","year":"2015"},{"key":"10.1016\/j.infsof.2023.107175_bib0015","series-title":"2015 International Conference on Computing for Sustainable Global Development, INDIACom","first-page":"2015","article-title":"A systematic review on software defect prediction","author":"Singh","year":"2015"},{"key":"10.1016\/j.infsof.2023.107175_bib0016","unstructured":"S. Hosseini, B. Turhan, D. Gunarathna, A Systematic Literature Review and Meta-analysis on Cross Project Defect Prediction, 2016."},{"key":"10.1016\/j.infsof.2023.107175_bib0017","doi-asserted-by":"crossref","DOI":"10.3844\/jcssp.2021.490.510","article-title":"A Systematic Literature Review of Software Defect Prediction Using Deep Learning","volume":"17","author":"Bahaa","year":"2021","journal-title":"Journal of Computer Science"},{"key":"10.1016\/j.infsof.2023.107175_bib0018","first-page":"1","article-title":"Guidelines for performing systematic literature reviews in software engineering","author":"Kitchenham","year":"2007","journal-title":"EBSE Technical Report. EBSE."},{"key":"10.1016\/j.infsof.2023.107175_bib0019","doi-asserted-by":"crossref","DOI":"10.1016\/j.autrev.2015.11.001","article-title":"Risk of thrombosis in patients with primary immune thrombocytopenia and antiphospholipid antibodies: A systematic review and meta-analysis","volume":"15","author":"Moulis","year":"2016","journal-title":"Autoimmun Rev"},{"key":"10.1016\/j.infsof.2023.107175_bib0020","doi-asserted-by":"crossref","DOI":"10.1016\/j.autrev.2015.10.002","article-title":"Subclinical atherosclerosis in patients with systemic lupus erythematosus: A systemic review and meta-analysis","volume":"15","author":"Wu","year":"2016","journal-title":"Autoimmun Rev"},{"key":"10.1016\/j.infsof.2023.107175_bib0021","series-title":"ACM International Conference Proceeding Series","article-title":"Guidelines for snowballing in systematic literature studies and a replication in software engineering","author":"Wohlin","year":"2014"},{"key":"10.1016\/j.infsof.2023.107175_bib0022","doi-asserted-by":"crossref","DOI":"10.1109\/TSE.2012.28","article-title":"The effects of test-driven development on external quality and productivity: A meta-analysis","volume":"39","author":"Rafique","year":"2013","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/j.infsof.2023.107175_bib0023","doi-asserted-by":"crossref","DOI":"10.1109\/TSE.2007.1001","article-title":"Cross versus within-company cost estimation studies: A systematic review","volume":"33","author":"Kitchenham","year":"2007","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/j.infsof.2023.107175_bib0024","doi-asserted-by":"crossref","DOI":"10.1109\/TSE.2008.35","article-title":"Benchmarking classification models for software defect prediction: A proposed framework and novel findings","author":"Lessmann","year":"2008","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/j.infsof.2023.107175_bib0025","doi-asserted-by":"crossref","DOI":"10.1348\/000711010X502733","article-title":"How to do a meta-analysis","volume":"63","author":"Field","year":"2010","journal-title":"British Journal of Mathematical and Statistical Psychology"},{"key":"10.1016\/j.infsof.2023.107175_bib0026","unstructured":"J., Akers, R., Aguiar-Ib\u00e1\u00f1ez, A. Baba-Akbari, Systematic reviews: CRD's guidance for undertaking reviews in health care, 2009."},{"key":"10.1016\/j.infsof.2023.107175_bib0027","article-title":"Statistical power analysis for the behavioral sciences","volume":"14","author":"Cohen","year":"1990","journal-title":"Comput Environ Urban Syst"},{"key":"10.1016\/j.infsof.2023.107175_bib0028","series-title":"ACM International Conference Proceeding Series","article-title":"Towards identifying software project clusters with regard to defect prediction","author":"Jureczko","year":"2010"},{"key":"10.1016\/j.infsof.2023.107175_bib0029","doi-asserted-by":"crossref","DOI":"10.1109\/TSE.2013.11","article-title":"Data quality: Some comments on the NASA software defect datasets","volume":"39","author":"Shepperd","year":"2013","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/j.infsof.2023.107175_bib0030","doi-asserted-by":"crossref","DOI":"10.1109\/TSE.2012.70","article-title":"A large-scale empirical study of just-in-time quality assurance","volume":"39","author":"Kamei","year":"2013","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/j.infsof.2023.107175_bib0031","doi-asserted-by":"crossref","DOI":"10.1109\/TSE.2017.2693980","article-title":"Are Fix-Inducing Changes a Moving Target? A Longitudinal Case Study of Just-In-Time Defect Prediction","volume":"44","author":"McIntosh","year":"2018","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/j.infsof.2023.107175_bib0032","series-title":"SIGSOFT\/FSE 2011 - Proceedings of the 19th ACM SIGSOFT Symposium on Foundations of Software Engineering","article-title":"ReLink: Recovering links between bugs and changes","author":"Wu","year":"2011"},{"key":"10.1016\/j.infsof.2023.107175_bib0033","series-title":"Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)","article-title":"A public bug database of GitHub projects and its application in bug prediction","author":"T\u00f3th","year":"2016"},{"key":"10.1016\/j.infsof.2023.107175_bib0034","article-title":"Code4Bench: A multidimensional benchmark of Codeforces data for different program analysis techniques","volume":"53","author":"Majd","year":"2019","journal-title":"J Comput Lang"},{"key":"10.1016\/j.infsof.2023.107175_bib0035","series-title":"Proceedings - International Conference on Software Engineering","article-title":"An extensive comparison of bug prediction approaches","author":"D'Ambros","year":"2010"},{"key":"10.1016\/j.infsof.2023.107175_bib0036","series-title":"Proceedings - ICSE 2007 Workshops: Third International Workshop on Predictor Models in Software Engineering, PROMISE\u201907","article-title":"Predicting defects for eclipse","author":"Zimmermann","year":"2007"},{"key":"10.1016\/j.infsof.2023.107175_bib0037","series-title":"Handbook of Software Reliability Engineering","author":"Lyu","year":"1996"},{"key":"10.1016\/j.infsof.2023.107175_bib0038","doi-asserted-by":"crossref","DOI":"10.1007\/s10664-011-9182-8","article-title":"On the dataset shift problem in software engineering prediction models","volume":"17","author":"Turhan","year":"2012","journal-title":"Empir Softw Eng"},{"key":"10.1016\/j.infsof.2023.107175_bib0039","first-page":"25","article-title":"A transfer cost-sensitive boosting approach for cross-project defect prediction","author":"Ryu","year":"2017","journal-title":"Software Quality Journal"},{"key":"10.1016\/j.infsof.2023.107175_bib0040","doi-asserted-by":"crossref","unstructured":"I.H. Witten, E. Frank, M.A. Hall, C.J. Pal, Data Mining: Practical Machine Learning Tools and Techniques, 2016. https:\/\/doi.org\/10.1016\/c2009-0-19715-5.","DOI":"10.1016\/C2009-0-19715-5"},{"key":"10.1016\/j.infsof.2023.107175_bib0041","article-title":"Data preprocessing for supervised leaning","volume":"1","author":"Kotsiantis","year":"2006","journal-title":"International Journal of \u2026"},{"key":"10.1016\/j.infsof.2023.107175_bib0042","doi-asserted-by":"crossref","DOI":"10.1007\/BF03192573","article-title":"Pre-processing for noise detection in gene expression classification data","volume":"15","author":"Libralon","year":"2009","journal-title":"Journal of the Brazilian Computer Society"},{"key":"10.1016\/j.infsof.2023.107175_bib0043","series-title":"Proceedings of 2015 the 1st International Conference on Reliability Systems Engineering, ICRSE","first-page":"2015","article-title":"Software defect prediction via transfer learning based neural network","author":"Cao","year":"2015"},{"key":"10.1016\/j.infsof.2023.107175_bib0044","doi-asserted-by":"crossref","DOI":"10.1109\/TNN.2010.2091281","article-title":"Domain adaptation via transfer component analysis","volume":"22","author":"Pan","year":"2011","journal-title":"IEEE Trans Neural Netw"},{"key":"10.1016\/j.infsof.2023.107175_bib0045","article-title":"Log-transformation and its implications for data analysis","volume":"26","author":"Feng","year":"2014","journal-title":"Shanghai Arch Psychiatry"},{"key":"10.1016\/j.infsof.2023.107175_bib0046","first-page":"405","article-title":"Comparison of the predicted and observed secondary structure of T4 phage lysozyme","author":"Matthews","year":"1975","journal-title":"BBA - Protein Structure"},{"key":"10.1016\/j.infsof.2023.107175_bib0047","series-title":"ACM International Conference Proceeding Series","article-title":"The relationship between precision-recall and ROC curves","author":"Davis","year":"2006"},{"key":"10.1016\/j.infsof.2023.107175_bib0048","series-title":"2013 28th IEEE\/ACM International Conference on Automated Software Engineering, ASE 2013 - Proceedings","article-title":"Personalized defect prediction","author":"Jiang","year":"2013"},{"key":"10.1016\/j.infsof.2023.107175_bib0049","article-title":"Mean squared error: Lot it or leave it? A new look at signal fidelity measures","volume":"26","author":"Wang","year":"2009","journal-title":"IEEE Signal Process Mag"},{"key":"10.1016\/j.infsof.2023.107175_bib0050","doi-asserted-by":"crossref","DOI":"10.1016\/j.jmva.2013.02.008","article-title":"Estimation of mean squared error of model-based estimators of small area means under a nested error linear regression model","volume":"117","author":"Torabi","year":"2013","journal-title":"J Multivar Anal"},{"key":"10.1016\/j.infsof.2023.107175_bib0051","doi-asserted-by":"crossref","DOI":"10.1016\/j.jeconom.2018.09.011","article-title":"Optimum thresholding using mean and conditional mean squared error","volume":"208","author":"Figueroa-L\u00f3pez","year":"2019","journal-title":"J Econom"},{"key":"10.1016\/j.infsof.2023.107175_bib0052","doi-asserted-by":"crossref","DOI":"10.5705\/ss.2012.053","article-title":"On Estimation of Mean Squared Errors of Benchmarked Empirical Bayes Estimators","author":"Steorts","year":"2013","journal-title":"Stat Sin"},{"key":"10.1016\/j.infsof.2023.107175_bib0053","first-page":"55","article-title":"Beware of R2: Simple, Unambiguous Assessment of the Prediction Accuracy of QSAR and QSPR Models","author":"Alexander","year":"2015","journal-title":"J Chem Inf Model"},{"key":"10.1016\/j.infsof.2023.107175_bib0054","article-title":"Cautionary note about r2","volume":"39","author":"Kv\u00a5lseth","year":"1985","journal-title":"American Statistician"},{"key":"10.1016\/j.infsof.2023.107175_bib0055","article-title":"Linear regression analysis: part 14 of a series on evaluation of scientific publications","volume":"107","author":"Schneider","year":"2010","journal-title":"Dtsch Arztebl Int"},{"key":"10.1016\/j.infsof.2023.107175_bib0056","series-title":"Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7700 LECTURE NO","article-title":"Practical recommendations for gradient-based training of deep architectures","author":"Bengio","year":"2012"},{"key":"10.1016\/j.infsof.2023.107175_bib0057","first-page":"V2","article-title":"Data Extracted from Selected Primary Studies","author":"Zain","year":"2022","journal-title":"Mendeley Data"}],"container-title":["Information and Software Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950584923000290?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950584923000290?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T03:37:24Z","timestamp":1760585844000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0950584923000290"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6]]},"references-count":57,"alternative-id":["S0950584923000290"],"URL":"https:\/\/doi.org\/10.1016\/j.infsof.2023.107175","relation":{},"ISSN":["0950-5849"],"issn-type":[{"value":"0950-5849","type":"print"}],"subject":[],"published":{"date-parts":[[2023,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Application of Deep Learning in Software Defect Prediction: Systematic Literature Review and Meta-analysis","name":"articletitle","label":"Article Title"},{"value":"Information and Software Technology","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.infsof.2023.107175","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"107175"}}