{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T10:58:09Z","timestamp":1770548289920,"version":"3.49.0"},"reference-count":79,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100007046","name":"Wuhan University","doi-asserted-by":"publisher","award":["61972290"],"award-info":[{"award-number":["61972290"]}],"id":[{"id":"10.13039\/501100007046","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information and Software Technology"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1016\/j.infsof.2023.107190","type":"journal-article","created":{"date-parts":[[2023,3,6]],"date-time":"2023-03-06T16:19:20Z","timestamp":1678119560000},"page":"107190","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":7,"special_numbering":"C","title":["Detecting multi-type self-admitted technical debt with generative adversarial network-based neural networks"],"prefix":"10.1016","volume":"158","author":[{"given":"Jiaojiao","family":"Yu","sequence":"first","affiliation":[]},{"given":"Xu","family":"Zhou","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8400-5754","authenticated-orcid":false,"given":"Xiao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zhiwen","family":"Xie","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9886-0460","authenticated-orcid":false,"given":"Kunsong","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.infsof.2023.107190_b1","doi-asserted-by":"crossref","unstructured":"N. Brown, Y. Cai, Y. Guo, R. Kazman, M. Kim, P. Kruchten, E. Lim, A. MacCormack, R. Nord, I. Ozkaya, et al., Managing technical debt in software-reliant systems, in: Proceedings of the FSE\/SDP Workshop on Future of Software Engineering Research, 2010, pp. 47\u201352.","DOI":"10.1145\/1882362.1882373"},{"key":"10.1016\/j.infsof.2023.107190_b2","series-title":"2013 4th International Workshop on Managing Technical Debt","first-page":"8","article-title":"Managing technical debt: An industrial case study","author":"Codabux","year":"2013"},{"key":"10.1016\/j.infsof.2023.107190_b3","doi-asserted-by":"crossref","unstructured":"S. Freire, N. Rios, B. Gutierrez, D. Torres, M. Mendon\u00e7a, C. Izurieta, C. Seaman, R.O. Sp\u00ednola, Surveying software practitioners on technical debt payment practices and reasons for not paying off debt items, in: Proceedings of the Evaluation and Assessment in Software Engineering, 2020, pp. 210\u2013219.","DOI":"10.1145\/3383219.3383241"},{"key":"10.1016\/j.infsof.2023.107190_b4","series-title":"2014 IEEE International Conference on Software Maintenance and Evolution","first-page":"91","article-title":"An exploratory study on self-admitted technical debt","author":"Potdar","year":"2014"},{"key":"10.1016\/j.infsof.2023.107190_b5","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1016\/j.infsof.2015.04.001","article-title":"The financial aspect of managing technical debt: A systematic literature review","volume":"64","author":"Ampatzoglou","year":"2015","journal-title":"Inf. Softw. Technol."},{"key":"10.1016\/j.infsof.2023.107190_b6","doi-asserted-by":"crossref","unstructured":"G. Bavota, B. Russo, A large-scale empirical study on self-admitted technical debt, in: Proceedings of the 13th International Conference on Mining Software Repositories, 2016, pp. 315\u2013326.","DOI":"10.1145\/2901739.2901742"},{"key":"10.1016\/j.infsof.2023.107190_b7","series-title":"Self-admitted technical debt in the embedded systems industry: An exploratory case study","author":"Li","year":"2022"},{"key":"10.1016\/j.infsof.2023.107190_b8","series-title":"2017 IEEE International Conference on Software Maintenance and Evolution","first-page":"238","article-title":"An empirical study on the removal of self-admitted technical debt","author":"Maldonado","year":"2017"},{"key":"10.1016\/j.infsof.2023.107190_b9","series-title":"Debt-prone bugs: technical debt in software maintenance","author":"Xuan","year":"2017"},{"issue":"1","key":"10.1016\/j.infsof.2023.107190_b10","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1007\/s10664-017-9522-4","article-title":"Identifying self-admitted technical debt in open source projects using text mining","volume":"23","author":"Huang","year":"2018","journal-title":"Empir. Softw. Eng."},{"key":"10.1016\/j.infsof.2023.107190_b11","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1016\/j.infsof.2015.10.008","article-title":"Identification and management of technical debt: A systematic mapping study","volume":"70","author":"Alves","year":"2016","journal-title":"Inf. Softw. Technol."},{"issue":"4","key":"10.1016\/j.infsof.2023.107190_b12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10664-022-10121-w","article-title":"DebtFree: minimizing labeling cost in self-admitted technical debt identification using semi-supervised learning","volume":"27","author":"Tu","year":"2022","journal-title":"Empir. Softw. Eng."},{"key":"10.1016\/j.infsof.2023.107190_b13","series-title":"Text level graph neural network for text classification","author":"Huang","year":"2019"},{"key":"10.1016\/j.infsof.2023.107190_b14","series-title":"Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing","first-page":"1746","article-title":"Convolutional neural networks for sentence classification","author":"Kim","year":"2014"},{"key":"10.1016\/j.infsof.2023.107190_b15","doi-asserted-by":"crossref","unstructured":"S. Lai, L. Xu, K. Liu, J. Zhao, Recurrent convolutional neural networks for text classification, in: Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015.","DOI":"10.1609\/aaai.v29i1.9513"},{"issue":"3","key":"10.1016\/j.infsof.2023.107190_b16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3324916","article-title":"Neural network-based detection of self-admitted technical debt: From performance to explainability","volume":"28","author":"Ren","year":"2019","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"10.1016\/j.infsof.2023.107190_b17","doi-asserted-by":"crossref","unstructured":"X. Wang, J. Liu, L. Li, X. Chen, X. Liu, H. Wu, Detecting and explaining self-admitted technical debts with attention-based neural networks, in: Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering, 2020, pp. 871\u2013882.","DOI":"10.1145\/3324884.3416583"},{"key":"10.1016\/j.infsof.2023.107190_b18","series-title":"Proceedings of the 2018 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, NAACL-HLT, Volume 1 (Long Papers)","first-page":"2227","article-title":"Deep contextualized word representations","author":"Peters","year":"2018"},{"key":"10.1016\/j.infsof.2023.107190_b19","article-title":"Multiclass classification for self-admitted technical debt based on xgboost","author":"Chen","year":"2021","journal-title":"IEEE Trans. Reliab."},{"key":"10.1016\/j.infsof.2023.107190_b20","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1016\/j.jss.2019.02.056","article-title":"A survey of self-admitted technical debt","volume":"152","author":"Sierra","year":"2019","journal-title":"J. Syst. Softw."},{"key":"10.1016\/j.infsof.2023.107190_b21","doi-asserted-by":"crossref","first-page":"1147","DOI":"10.1016\/j.procs.2018.05.029","article-title":"Sentiment classification of online consumer reviews using word vector representations","volume":"132","author":"Bansal","year":"2018","journal-title":"Procedia Comput. Sci."},{"key":"10.1016\/j.infsof.2023.107190_b22","series-title":"International Conference on Machine Learning","first-page":"1188","article-title":"Distributed representations of sentences and documents","author":"Le","year":"2014"},{"issue":"4","key":"10.1016\/j.infsof.2023.107190_b23","first-page":"301","article-title":"Discriminative features for text document classification","volume":"6","author":"Torkkola","year":"2004","journal-title":"Formal Pattern Anal. Appl."},{"key":"10.1016\/j.infsof.2023.107190_b24","doi-asserted-by":"crossref","DOI":"10.1016\/j.jss.2022.111219","article-title":"Exploiting gated graph neural network for detecting and explaining self-admitted technical debts","volume":"187","author":"Yu","year":"2022","journal-title":"J. Syst. Softw."},{"key":"10.1016\/j.infsof.2023.107190_b25","series-title":"The 22nd International Conference on Artificial Intelligence and Statistics","first-page":"3089","article-title":"Adversarial discrete sequence generation without explicit neuralnetworks as discriminators","author":"Li","year":"2019"},{"key":"10.1016\/j.infsof.2023.107190_b26","series-title":"Codebert: A pre-trained model for programming and natural languages","author":"Feng","year":"2020"},{"issue":"11","key":"10.1016\/j.infsof.2023.107190_b27","doi-asserted-by":"crossref","first-page":"1044","DOI":"10.1109\/TSE.2017.2654244","article-title":"Using natural language processing to automatically detect self-admitted technical debt","volume":"43","author":"da\u00a0Silva\u00a0Maldonado","year":"2017","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/j.infsof.2023.107190_b28","article-title":"Identifying self-admitted technical debt through code comment analysis with a contextualized vocabulary","volume":"121","author":"de\u00a0Freitas\u00a0Farias","year":"2020","journal-title":"Inf. Softw. Technol."},{"issue":"4","key":"10.1016\/j.infsof.2023.107190_b29","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3447247","article-title":"How far have we progressed in identifying self-admitted technical debts? A comprehensive empirical study","volume":"30","author":"Guo","year":"2021","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"10.1016\/j.infsof.2023.107190_b30","doi-asserted-by":"crossref","unstructured":"Z. Liu, Q. Huang, X. Xia, E. Shihab, D. Lo, S. Li, SATD detector: A text-mining-based self-admitted technical debt detection tool, in: Proceedings of the 40th ACM\/IEEE International Conference on Software Engineering, vol. 3, ICSE, 2013, pp. 9\u201312.","DOI":"10.1145\/3183440.3183478"},{"key":"10.1016\/j.infsof.2023.107190_b31","article-title":"Identifying self-admitted technical debts with jitterbug: A two-step approach","author":"Yu","year":"2020","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"4","key":"10.1016\/j.infsof.2023.107190_b32","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11704-020-9281-z","article-title":"Using BiLSTM with attention mechanism to automatically detect self-admitted technical debt","volume":"15","author":"Yu","year":"2021","journal-title":"Front. Comput. Sci."},{"key":"10.1016\/j.infsof.2023.107190_b33","series-title":"2018 9th International Workshop on Empirical Software Engineering in Practice","first-page":"7","article-title":"Identifying design and requirement self-admitted technical debt using n-gram idf","author":"Wattanakriengkrai","year":"2018"},{"issue":"12","key":"10.1016\/j.infsof.2023.107190_b34","doi-asserted-by":"crossref","first-page":"1211","DOI":"10.1109\/TSE.2018.2831232","article-title":"Automating change-level self-admitted technical debt determination","volume":"45","author":"Yan","year":"2018","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/j.infsof.2023.107190_b35","article-title":"Generative adversarial nets","volume":"27","author":"Goodfellow","year":"2014","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.infsof.2023.107190_b36","series-title":"International Conference on Machine Learning","first-page":"214","article-title":"Wasserstein generative adversarial networks","author":"Arjovsky","year":"2017"},{"issue":"6","key":"10.1016\/j.infsof.2023.107190_b37","doi-asserted-by":"crossref","first-page":"921","DOI":"10.1109\/TEVC.2019.2895748","article-title":"Evolutionary generative adversarial networks","volume":"23","author":"Wang","year":"2019","journal-title":"IEEE Trans. Evol. Comput."},{"key":"10.1016\/j.infsof.2023.107190_b38","doi-asserted-by":"crossref","unstructured":"J. Guo, S. Lu, H. Cai, W. Zhang, Y. Yu, J. Wang, Long text generation via adversarial training with leaked information, in: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 32, no. 1, 2018.","DOI":"10.1609\/aaai.v32i1.11957"},{"key":"10.1016\/j.infsof.2023.107190_b39","doi-asserted-by":"crossref","DOI":"10.1016\/j.infsof.2022.106847","article-title":"Predicting the precise number of software defects: Are we there yet?","volume":"146","author":"Yu","year":"2022","journal-title":"Inf. Softw. Technol."},{"issue":"1","key":"10.1016\/j.infsof.2023.107190_b40","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1109\/TR.2019.2931559","article-title":"Improving ranking-oriented defect prediction using a cost-sensitive ranking SVM","volume":"69","author":"Yu","year":"2019","journal-title":"IEEE Trans. Reliab."},{"key":"10.1016\/j.infsof.2023.107190_b41","doi-asserted-by":"crossref","DOI":"10.1016\/j.infsof.2021.106662","article-title":"Investigation on the stability of SMOTE-based oversampling techniques in software defect prediction","volume":"139","author":"Feng","year":"2021","journal-title":"Inf. Softw. Technol."},{"key":"10.1016\/j.infsof.2023.107190_b42","article-title":"On the significance of category prediction for code-comment synchronization","author":"Zhen","year":"2022","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"10.1016\/j.infsof.2023.107190_b43","doi-asserted-by":"crossref","DOI":"10.1016\/j.infsof.2022.106906","article-title":"CASMS: Combining clustering with attention semantic model for identifying security bug reports","volume":"147","author":"Ma","year":"2022","journal-title":"Inf. Softw. Technol."},{"key":"10.1016\/j.infsof.2023.107190_b44","series-title":"Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing, EMNLP-IJCNLP","first-page":"6381","article-title":"EDA: easy data augmentation techniques for boosting performance on text classification tasks","author":"Wei","year":"2019"},{"key":"10.1016\/j.infsof.2023.107190_b45","series-title":"Findings of the Association for Computational Linguistics: EMNLP","first-page":"2748","article-title":"AEDA: an easier data augmentation technique for text classification","author":"Akbar","year":"2021"},{"key":"10.1016\/j.infsof.2023.107190_b46","series-title":"Findings of the Association for Computational Linguistics: EMNLP 2020","first-page":"2411","article-title":"Divgan: Towards diverse paraphrase generation via diversified generative adversarial network","author":"Cao","year":"2020"},{"key":"10.1016\/j.infsof.2023.107190_b47","doi-asserted-by":"crossref","unstructured":"L. Liu, Y. Lu, M. Yang, Q. Qu, J. Zhu, H. Li, Generative adversarial network for abstractive text summarization, in: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 32, no. 1, 2018.","DOI":"10.1609\/aaai.v32i1.12141"},{"key":"10.1016\/j.infsof.2023.107190_b48","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1016\/j.neucom.2021.04.036","article-title":"Generative adversarial network for table-to-text generation","volume":"452","author":"Zhao","year":"2021","journal-title":"Neurocomputing"},{"key":"10.1016\/j.infsof.2023.107190_b49","doi-asserted-by":"crossref","unstructured":"T. Karras, S. Laine, T. Aila, A style-based generator architecture for generative adversarial networks, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2019, pp. 4401\u20134410.","DOI":"10.1109\/CVPR.2019.00453"},{"key":"10.1016\/j.infsof.2023.107190_b50","series-title":"International Conference on Machine Learning","first-page":"7354","article-title":"Self-attention generative adversarial networks","author":"Zhang","year":"2019"},{"key":"10.1016\/j.infsof.2023.107190_b51","doi-asserted-by":"crossref","first-page":"487","DOI":"10.1016\/j.neucom.2018.10.109","article-title":"Data augmentation in fault diagnosis based on the Wasserstein generative adversarial network with gradient penalty","volume":"396","author":"Gao","year":"2020","journal-title":"Neurocomputing"},{"key":"10.1016\/j.infsof.2023.107190_b52","doi-asserted-by":"crossref","first-page":"1009","DOI":"10.1016\/j.ins.2019.10.014","article-title":"Conditional Wasserstein generative adversarial network-gradient penalty-based approach to alleviating imbalanced data classification","volume":"512","author":"Zheng","year":"2020","journal-title":"Inform. Sci."},{"key":"10.1016\/j.infsof.2023.107190_b53","series-title":"2021 IEEE International Conference on Software Maintenance and Evolution","first-page":"425","article-title":"Assessing generalizability of CodeBERT","author":"Zhou","year":"2021"},{"key":"10.1016\/j.infsof.2023.107190_b54","article-title":"Attention is all you need","volume":"30","author":"Vaswani","year":"2017","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.infsof.2023.107190_b55","doi-asserted-by":"crossref","DOI":"10.1016\/j.jss.2020.110862","article-title":"A comprehensive comparative study of clustering-based unsupervised defect prediction models","volume":"172","author":"Xu","year":"2021","journal-title":"J. Syst. Softw."},{"key":"10.1016\/j.infsof.2023.107190_b56","doi-asserted-by":"crossref","DOI":"10.1016\/j.jss.2020.110763","article-title":"Imbalanced metric learning for crashing fault residence prediction","volume":"170","author":"Xu","year":"2020","journal-title":"J. Syst. Softw."},{"key":"10.1016\/j.infsof.2023.107190_b57","doi-asserted-by":"crossref","DOI":"10.1016\/j.jss.2022.111324","article-title":"Graph4Web: A relation-aware graph attention network for web service classification","volume":"190","author":"Zhao","year":"2022","journal-title":"J. Syst. Softw."},{"key":"10.1016\/j.infsof.2023.107190_b58","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TGRS.2022.3231215","article-title":"Deep quadruple-based hashing for remote sensing image-sound retrieval","volume":"60","author":"Chen","year":"2022","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"issue":"1","key":"10.1016\/j.infsof.2023.107190_b59","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1002\/asi.24546","article-title":"Proximity-aware research leadership recommendation in research collaboration via deep neural networks","volume":"73","author":"He","year":"2022","journal-title":"J. Assoc. Inf. Sci. Technol."},{"issue":"10","key":"10.1016\/j.infsof.2023.107190_b60","doi-asserted-by":"crossref","first-page":"7049","DOI":"10.1109\/TGRS.2020.2979273","article-title":"Deep cross-modal image\u2013voice retrieval in remote sensing","volume":"58","author":"Chen","year":"2020","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"key":"10.1016\/j.infsof.2023.107190_b61","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2021.107649","article-title":"AComNN: Attention enhanced Compound Neural Network for financial time-series forecasting with cross-regional features","volume":"111","author":"Yang","year":"2021","journal-title":"Appl. Soft Comput."},{"issue":"5","key":"10.1016\/j.infsof.2023.107190_b62","doi-asserted-by":"crossref","first-page":"4005","DOI":"10.1007\/s11192-021-03943-w","article-title":"Characterizing research leadership on geographically weighted collaboration network","volume":"126","author":"He","year":"2021","journal-title":"Scientometrics"},{"key":"10.1016\/j.infsof.2023.107190_b63","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2020.107368","article-title":"Supervised deep hashing with a joint deep network","volume":"105","author":"Chen","year":"2020","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.infsof.2023.107190_b64","series-title":"Breakthroughs in Statistics","first-page":"196","article-title":"Individual comparisons by ranking methods","author":"Wilcoxon","year":"1992"},{"issue":"2","key":"10.1016\/j.infsof.2023.107190_b65","doi-asserted-by":"crossref","first-page":"848","DOI":"10.1109\/TR.2021.3060937","article-title":"Simplified deep forest model based just-in-time defect prediction for android mobile apps","volume":"70","author":"Zhao","year":"2021","journal-title":"IEEE Trans. Reliab."},{"key":"10.1016\/j.infsof.2023.107190_b66","doi-asserted-by":"crossref","unstructured":"J. Pennington, R. Socher, C.D. Manning, Glove: Global vectors for word representation, in: Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing, EMNLP, 2014, pp. 1532\u20131543.","DOI":"10.3115\/v1\/D14-1162"},{"key":"10.1016\/j.infsof.2023.107190_b67","unstructured":"S. Zhang, D. Zheng, X. Hu, M. Yang, Bidirectional long short-term memory networks for relation classification, in: Proceedings of the 29th Pacific Asia Conference on Language, Information and Computation, 2015, pp. 73\u201378."},{"key":"10.1016\/j.infsof.2023.107190_b68","doi-asserted-by":"crossref","unstructured":"P. Zhou, W. Shi, J. Tian, Z. Qi, B. Li, H. Hao, B. Xu, Attention-based bidirectional long short-term memory networks for relation classification, in: Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers), 2016, pp. 207\u2013212.","DOI":"10.18653\/v1\/P16-2034"},{"key":"10.1016\/j.infsof.2023.107190_b69","series-title":"Empirical evaluation of gated recurrent neural networks on sequence modeling","author":"Chung","year":"2014"},{"key":"10.1016\/j.infsof.2023.107190_b70","series-title":"7th International Conference on Learning Representations, ICLR 2019, New Orleans, la, USA, May 6\u20139, 2019","article-title":"RelGAN: Relational generative adversarial networks for text generation","author":"Weili","year":"2019"},{"key":"10.1016\/j.infsof.2023.107190_b71","series-title":"Maximum-likelihood augmented discrete generative adversarial networks","author":"Tong","year":"2017"},{"key":"10.1016\/j.infsof.2023.107190_b72","series-title":"Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence,February 4\u20139, 2017, San Francisco, California, USA","first-page":"2852","article-title":"SeqGAN: Sequence generative adversarial nets with policy gradient","author":"Lantao","year":"2017"},{"key":"10.1016\/j.infsof.2023.107190_b73","doi-asserted-by":"crossref","first-page":"364","DOI":"10.1016\/j.neucom.2021.03.097","article-title":"DGSAN: Discrete generative self-adversarial network","volume":"448","author":"Ehsan","year":"2021","journal-title":"Neurocomputing"},{"key":"10.1016\/j.infsof.2023.107190_b74","series-title":"2014 Sixth International Workshop on Managing Technical Debt","first-page":"1","article-title":"Towards an ontology of terms on technical debt","author":"Alves","year":"2014"},{"key":"10.1016\/j.infsof.2023.107190_b75","series-title":"Applied Computing and Information Technology","first-page":"17","article-title":"A replicated study on relationship between code quality and method comments","author":"Miyake","year":"2017"},{"key":"10.1016\/j.infsof.2023.107190_b76","series-title":"2016 IEEE International Conference on Software Maintenance and Evolution","first-page":"519","article-title":"Continuous delivery practices in a large financial organization","author":"Vassallo","year":"2016"},{"key":"10.1016\/j.infsof.2023.107190_b77","series-title":"2018 IEEE\/ACM 15th International Conference on Mining Software Repositories","first-page":"526","article-title":"Was self-admitted technical debt removal a real removal? An in-depth perspective","author":"Zampetti","year":"2018"},{"key":"10.1016\/j.infsof.2023.107190_b78","series-title":"QuASoQ\/TDA@ APSEC","first-page":"68","article-title":"Using analytics to quantify interest of self-admitted technical debt","author":"Kamei","year":"2016"},{"key":"10.1016\/j.infsof.2023.107190_b79","doi-asserted-by":"crossref","unstructured":"G. Deshpande, G. Ruhe, Beyond accuracy: Roi-driven data analytics of empirical data, in: Proceedings of the 14th ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement, ESEM, 2020, pp. 1\u20136.","DOI":"10.1145\/3382494.3422159"}],"container-title":["Information and Software Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950584923000447?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950584923000447?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T03:40:13Z","timestamp":1760586013000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0950584923000447"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6]]},"references-count":79,"alternative-id":["S0950584923000447"],"URL":"https:\/\/doi.org\/10.1016\/j.infsof.2023.107190","relation":{},"ISSN":["0950-5849"],"issn-type":[{"value":"0950-5849","type":"print"}],"subject":[],"published":{"date-parts":[[2023,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Detecting multi-type self-admitted technical debt with generative adversarial network-based neural networks","name":"articletitle","label":"Article Title"},{"value":"Information and Software Technology","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.infsof.2023.107190","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"107190"}}