{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T03:34:29Z","timestamp":1773977669449,"version":"3.50.1"},"reference-count":55,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62403044"],"award-info":[{"award-number":["62403044"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372021"],"award-info":[{"award-number":["62372021"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20250443"],"award-info":[{"award-number":["BK20250443"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100008996","name":"Capital Normal University","doi-asserted-by":"publisher","award":["LIP2025S300"],"award-info":[{"award-number":["LIP2025S300"]}],"id":[{"id":"10.13039\/100008996","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005022","name":"Beijing Jiaotong University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100005022","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Systems and Software"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1016\/j.jss.2026.112795","type":"journal-article","created":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T16:22:15Z","timestamp":1769098935000},"page":"112795","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["ARFT-Transformer: Modeling metric dependencies for cross-project aging-related bug prediction"],"prefix":"10.1016","volume":"236","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-5705-4927","authenticated-orcid":false,"given":"Shuning","family":"Ge","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3407-5161","authenticated-orcid":false,"given":"Fangyun","family":"Qin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6498-8570","authenticated-orcid":false,"given":"Xiaohui","family":"Wan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2222-3232","authenticated-orcid":false,"given":"Yang","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0003-6035-9605","authenticated-orcid":false,"given":"Qian","family":"Dai","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7922-9067","authenticated-orcid":false,"given":"Zheng","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jss.2026.112795_bib0001","series-title":"IFIP Congress (1)","first-page":"353","article-title":"An example of software system debugging","volume":"71","author":"Akiyama","year":"1971"},{"key":"10.1016\/j.jss.2026.112795_bib0002","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2023.106205","article-title":"On the effects of data normalization for domain adaptation on EEG data","volume":"123","author":"Apicella","year":"2023","journal-title":"Eng. Appl. Artif. Intell."},{"key":"10.1016\/j.jss.2026.112795_bib0003","series-title":"AICCSA","first-page":"330","article-title":"Software defect prediction using regression via classification","author":"Bibi","year":"2006"},{"issue":"2","key":"10.1016\/j.jss.2026.112795_bib0004","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1147\/rd.452.0311","article-title":"Proactive management of software aging","volume":"45","author":"Castelli","year":"2001","journal-title":"IBM J. Res. Dev."},{"issue":"2","key":"10.1016\/j.jss.2026.112795_bib0005","doi-asserted-by":"crossref","first-page":"626","DOI":"10.1109\/TR.2021.3052510","article-title":"Generative adversarial networks-based imbalance learning in software aging-related bug prediction","volume":"70","author":"Chouhan","year":"2021","journal-title":"IEEE Trans. Reliab."},{"key":"10.1016\/j.jss.2026.112795_bib0006","series-title":"2013 IEEE 24Th International Symposium on Software Reliability Engineering (ISSRE)","first-page":"178","article-title":"Fault triggers in open-source software: an experience report","author":"Cotroneo","year":"2013"},{"key":"10.1016\/j.jss.2026.112795_bib0007","series-title":"2010 IEEE Second International Workshop on Software Aging and Rejuvenation","first-page":"1","article-title":"Is software aging related to software metrics?","author":"Cotroneo","year":"2010"},{"issue":"3","key":"10.1016\/j.jss.2026.112795_bib0008","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1016\/j.peva.2012.09.004","article-title":"Predicting aging-related bugs using software complexity metrics","volume":"70","author":"Cotroneo","year":"2013","journal-title":"Perf. Eval."},{"issue":"1","key":"10.1016\/j.jss.2026.112795_bib0009","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2539117","article-title":"A survey of software aging and rejuvenation studies","volume":"10","author":"Cotroneo","year":"2014","journal-title":"ACM J. Emerging Technol. Comput. Syst. (JETC)"},{"key":"10.1016\/j.jss.2026.112795_bib0010","series-title":"Handbook of Software Aging and Rejuvenation: Fundamentals, Methods, Applications, and Future Directions","author":"Dohi","year":"2020"},{"key":"10.1016\/j.jss.2026.112795_bib0011","unstructured":"Dosovitskiy, A., Beyer, L., Kolesnikov, A., Weissenborn, D., Zhai, X., Unterthiner, T., Dehghani, M., Minderer, M., Heigold, G., Gelly, S., et al., 2020. An image is worth 16x16 words: Transformers for image recognition at scale. arXiv: 2010.11929."},{"key":"10.1016\/j.jss.2026.112795_bib0012","doi-asserted-by":"crossref","DOI":"10.1016\/j.jss.2022.111537","article-title":"On the use of deep learning in software defect prediction","volume":"195","author":"Giray","year":"2023","journal-title":"J. Syst. Softw."},{"key":"10.1016\/j.jss.2026.112795_bib0013","first-page":"18932","article-title":"Revisiting deep learning models for tabular data","volume":"34","author":"Gorishniy","year":"2021","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.jss.2026.112795_bib0014","series-title":"2008 IEEE International Conference on Software Reliability Engineering Workshops (ISSRE Wksp)","first-page":"1","article-title":"The fundamentals of software aging","author":"Grottke","year":"2008"},{"key":"10.1016\/j.jss.2026.112795_bib0015","series-title":"2010 IEEE\/IFIP International Conference on Dependable Systems & Networks (DSN)","first-page":"447","article-title":"An empirical investigation of fault types in space mission system software","author":"Grottke","year":"2010"},{"key":"10.1016\/j.jss.2026.112795_bib0016","series-title":"Elements of Software Science (Operating and programming systems series)","author":"Halstead","year":"1977"},{"issue":"1","key":"10.1016\/j.jss.2026.112795_bib0017","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1109\/TPAMI.2022.3152247","article-title":"A survey on vision transformer","volume":"45","author":"Han","year":"2022","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"2","key":"10.1016\/j.jss.2026.112795_bib0018","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1109\/TSE.2017.2770124","article-title":"A systematic literature review and meta-analysis on cross project defect prediction","volume":"45","author":"Hosseini","year":"2017","journal-title":"IEEE Trans. Software Eng."},{"key":"10.1016\/j.jss.2026.112795_bib0019","series-title":"Twenty-fifth International Symposium on Fault-tolerant Computing. Digest of Papers","first-page":"381","article-title":"Software rejuvenation: analysis, module and applications","author":"Huang","year":"1995"},{"issue":"3","key":"10.1016\/j.jss.2026.112795_bib0020","doi-asserted-by":"crossref","first-page":"580","DOI":"10.1109\/TETC.2023.3258503","article-title":"Software aging prediction for cloud services using a gate recurrent unit neural network model based on time series decomposition","volume":"11","author":"Jia","year":"2023","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"10.1016\/j.jss.2026.112795_bib0021","unstructured":"Jiarpakdee, J., Tantithamthavorn, C., Hassan, A. E., 2018. The impact of correlated metrics on defect models. arXiv: 1801.10271."},{"issue":"10s","key":"10.1016\/j.jss.2026.112795_bib0022","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3505244","article-title":"Transformers in vision: a survey","volume":"54","author":"Khan","year":"2022","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"10.1016\/j.jss.2026.112795_bib0023","series-title":"2017 14Th IEEE India Council International Conference (INDICON)","first-page":"1","article-title":"Aging related bug prediction using extreme learning machines","author":"Kumar","year":"2017"},{"key":"10.1016\/j.jss.2026.112795_bib0024","series-title":"Proceedings of the 11Th Innovations in Software Engineering Conference","first-page":"1","article-title":"Feature selection techniques to counter class imbalance problem for aging related bug prediction: aging related bug prediction","author":"Kumar","year":"2018"},{"key":"10.1016\/j.jss.2026.112795_bib0025","series-title":"2021 IEEE 21St International Conference on Software Quality, Reliability and Security Companion (QRS-C)","first-page":"350","article-title":"A cross-project aging-related bug prediction approach based on joint probability domain adaptation and k-means SMOTE","author":"Li","year":"2021"},{"key":"10.1016\/j.jss.2026.112795_bib0026","series-title":"Proceedings of the IEEE International Conference on Computer Vision","first-page":"2980","article-title":"Focal loss for dense object detection","author":"Lin","year":"2017"},{"key":"10.1016\/j.jss.2026.112795_bib0027","series-title":"International Conference on Machine Learning","first-page":"97","article-title":"Learning transferable features with deep adaptation networks","author":"Long","year":"2015"},{"key":"10.1016\/j.jss.2026.112795_bib0028","series-title":"Proceedings of the 27Th International Workshop on Software Measurement and 12Th International Conference on Software Process and Product Measurement","first-page":"255","article-title":"Correlations of software code metrics: an empirical study","author":"Mamun","year":"2017"},{"issue":"4","key":"10.1016\/j.jss.2026.112795_bib0029","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1109\/TSE.1976.233837","article-title":"A complexity measure","author":"McCabe","year":"1976","journal-title":"IEEE Trans. Software Eng."},{"issue":"559-569","key":"10.1016\/j.jss.2026.112795_bib0030","first-page":"4","article-title":"Data mining: concepts and techniques","volume":"10","author":"Mining","year":"2006","journal-title":"Morgan Kaufinann"},{"issue":"7","key":"10.1016\/j.jss.2026.112795_bib0031","doi-asserted-by":"crossref","first-page":"5723","DOI":"10.1007\/s11831-022-09787-8","article-title":"A survey of software defect prediction based on deep learning","volume":"29","author":"Nevendra","year":"2022","journal-title":"Arch. Comput. Methods Eng."},{"key":"10.1016\/j.jss.2026.112795_bib0032","series-title":"2015 IEEE International Conference on Software Quality, Reliability and Security","first-page":"43","article-title":"Cross-project aging related bug prediction","author":"Qin","year":"2015"},{"issue":"3","key":"10.1016\/j.jss.2026.112795_bib0033","doi-asserted-by":"crossref","first-page":"1134","DOI":"10.1109\/TR.2018.2864960","article-title":"Studying aging-related bug prediction using cross-project models","volume":"68","author":"Qin","year":"2018","journal-title":"IEEE Trans. Reliab."},{"issue":"3","key":"10.1016\/j.jss.2026.112795_bib0034","doi-asserted-by":"crossref","first-page":"566","DOI":"10.1109\/TETC.2023.3279388","article-title":"Predicting aging-related bugs using network analysis on aging-related dependency networks","volume":"11","author":"Qin","year":"2023","journal-title":"IEEE Trans. Emerg. Top Comput."},{"key":"10.1016\/j.jss.2026.112795_bib0035","doi-asserted-by":"crossref","first-page":"842","DOI":"10.1162\/tacl_a_00349","article-title":"A primer in BERTology: what we know about how BERT works","volume":"8","author":"Rogers","year":"2021","journal-title":"Trans. Association for Comput. linguistics"},{"key":"10.1016\/j.jss.2026.112795_bib0036","series-title":"Icsoft","first-page":"290","article-title":"Analysis of ensemble models for aging related bug prediction in software systems","author":"Sharma","year":"2018"},{"issue":"6","key":"10.1016\/j.jss.2026.112795_bib0037","doi-asserted-by":"crossref","first-page":"603","DOI":"10.1109\/TSE.2014.2322358","article-title":"Researcher bias: the use of machine learning in software defect prediction","volume":"40","author":"Shepperd","year":"2014","journal-title":"IEEE Trans. Software Eng."},{"key":"10.1016\/j.jss.2026.112795_bib0038","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","first-page":"761","article-title":"Training region-based object detectors with online hard example mining","author":"Shrivastava","year":"2016"},{"key":"10.1016\/j.jss.2026.112795_bib0039","doi-asserted-by":"crossref","unstructured":"Spearman, C., 1961. The proof and measurement of association between two things.","DOI":"10.1037\/11491-005"},{"issue":"6","key":"10.1016\/j.jss.2026.112795_bib0040","doi-asserted-by":"crossref","first-page":"1806","DOI":"10.1109\/TSMCC.2012.2226152","article-title":"Using coding-based ensemble learning to improve software defect prediction","volume":"42","author":"Sun","year":"2012","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews)"},{"key":"10.1016\/j.jss.2026.112795_bib0041","unstructured":"Tashtoush, Y., Al-Maolegi, M., Arkok, B., 2014. The correlation among software complexity metrics with case study. arXiv: 1408.4523."},{"key":"10.1016\/j.jss.2026.112795_bib0042","doi-asserted-by":"crossref","DOI":"10.1109\/TETC.2025.3531051","article-title":"Towards label-efficient deep learning-based aging-related bug prediction with spiking convolutional neural networks","author":"Tian","year":"2025","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"10.1016\/j.jss.2026.112795_bib0043","doi-asserted-by":"crossref","DOI":"10.1002\/9780470050118.ecse394","article-title":"Software aging and rejuvenation","author":"Trivedi","year":"2007","journal-title":"Wiley Encyclopedia of Computer Science and Engineering"},{"key":"10.1016\/j.jss.2026.112795_bib0044","article-title":"Attention is all you need","volume":"30","author":"Vaswani","year":"2017","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.jss.2026.112795_bib0045","series-title":"2019 IEEE 30Th International Symposium on Software Reliability Engineering (ISSRE)","first-page":"163","article-title":"Supervised representation learning approach for cross-project aging-related bug prediction","author":"Wan","year":"2019"},{"issue":"12","key":"10.1016\/j.jss.2026.112795_bib0046","doi-asserted-by":"crossref","first-page":"1267","DOI":"10.1109\/TSE.2018.2877612","article-title":"Deep semantic feature learning for software defect prediction","volume":"46","author":"Wang","year":"2018","journal-title":"IEEE Trans. Software Eng."},{"key":"10.1016\/j.jss.2026.112795_bib0047","series-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision","first-page":"322","article-title":"Symmetric cross entropy for robust learning with noisy labels","author":"Wang","year":"2019"},{"key":"10.1016\/j.jss.2026.112795_bib0048","series-title":"2023 IEEE 34Th International Symposium on Software Reliability Engineering Workshops (ISSREW)","first-page":"206","article-title":"Cross-project aging-related bug prediction based on feature transfer and class imbalance learning","author":"Xie","year":"2023"},{"key":"10.1016\/j.jss.2026.112795_bib0049","series-title":"2020 IEEE 31St International Symposium on Software Reliability Engineering (ISSRE)","first-page":"325","article-title":"Cross-project aging-related bug prediction based on joint distribution adaptation and improved subclass discriminant analysis","author":"Xu","year":"2020"},{"key":"10.1016\/j.jss.2026.112795_bib0050","article-title":"Cross-project aging-related bug prediction based on transfer learning and class imbalance learning","author":"Xu","year":"2025","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"10.1016\/j.jss.2026.112795_bib0051","series-title":"2023 IEEE 34Th International Symposium on Software Reliability Engineering (ISSRE)","first-page":"590","article-title":"Ifcm: an improved fuzzy c-means clustering method to handle class overlap on aging-related software bug prediction","author":"Zhang","year":"2023"},{"key":"10.1016\/j.jss.2026.112795_bib0052","doi-asserted-by":"crossref","DOI":"10.1016\/j.jss.2024.112156","article-title":"Sgt: aging-related bug prediction via semantic feature learning based on graph-transformer","volume":"217","author":"Zhang","year":"2024","journal-title":"Journal of Systems and Software"},{"key":"10.1016\/j.jss.2026.112795_bib0053","article-title":"NegCPARBP: enhancing privacy protection for cross-project aging-related bug prediction based on negative database","author":"Zhao","year":"2025","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"issue":"10","key":"10.1016\/j.jss.2026.112795_bib0054","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3567550","article-title":"A systematic survey of just-in-time software defect prediction","volume":"55","author":"Zhao","year":"2023","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.jss.2026.112795_bib0055","series-title":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","first-page":"185","article-title":"A software aging-related bug prediction framework based on deep learning and weakly supervised oversampling","author":"Zhou","year":"2022"}],"container-title":["Journal of Systems and Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121226000294?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121226000294?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T02:37:30Z","timestamp":1773974250000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0164121226000294"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,6]]},"references-count":55,"alternative-id":["S0164121226000294"],"URL":"https:\/\/doi.org\/10.1016\/j.jss.2026.112795","relation":{},"ISSN":["0164-1212"],"issn-type":[{"value":"0164-1212","type":"print"}],"subject":[],"published":{"date-parts":[[2026,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"ARFT-Transformer: Modeling metric dependencies for cross-project aging-related bug prediction","name":"articletitle","label":"Article Title"},{"value":"Journal of Systems and Software","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jss.2026.112795","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Inc. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"112795"}}