{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:42:57Z","timestamp":1775068977438,"version":"3.50.1"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.2968362","type":"journal-article","created":{"date-parts":[[2020,1,22]],"date-time":"2020-01-22T21:40:41Z","timestamp":1579729241000},"page":"20954-20964","source":"Crossref","is-referenced-by-count":49,"title":["Hyper-Parameter Optimization of Classifiers, Using an Artificial Immune Network and Its Application to Software Bug Prediction"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3031-7506","authenticated-orcid":false,"given":"Faiza","family":"Khan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8933-7894","authenticated-orcid":false,"given":"Summrina","family":"Kanwal","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8429-6598","authenticated-orcid":false,"given":"Sultan","family":"Alamri","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8867-0513","authenticated-orcid":false,"given":"Bushra","family":"Mumtaz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-018-1696-z"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-018-1730-1"},{"key":"ref33","article-title":"Software engineering for fairness: A case study with hyperparameter optimization","author":"chakraborty","year":"2019","journal-title":"arXiv 1905 05786"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2002.1007011"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.04.017"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2322358"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2018.090212"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.05.071"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3390\/sym11020212"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"3515","DOI":"10.1007\/s13369-018-3564-9","article-title":"Comparing hyperparameter optimization in cross-and within-project defect prediction: A case study","volume":"44","author":"\u00f6zt\u00fcrk","year":"2019","journal-title":"Arabian J Sci Eng"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SBRN.2000.889718"},{"key":"ref40","first-page":"1","article-title":"Software bug prediction using supervised machine learning algorithms","author":"immaculate","year":"2019","journal-title":"Proc Int Conf Data Sci Commun (IconDSC)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2010.5463279"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884857"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2009.11.003"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2245276.2231967"},{"key":"ref15","first-page":"822","article-title":"Efficient hyperparameter optimization for deep learning algorithms using deterministic RBF surrogates","author":"ilievski","year":"2017","journal-title":"Proc 31st AAAI Conf Artif Intell"},{"key":"ref16","first-page":"187","article-title":"A new method to predict the software fault using improved genetic algorithm","volume":"85","author":"fazel","year":"2016","journal-title":"Bulletin de la Soci&#x00E9;t&#x00E9; Royale des Sciences de Li&#x00E8;ge"},{"key":"ref17","first-page":"888","article-title":"Defect prediction in software projects-using genetic algorithm based fuzzy C-means clustering and random forest classifier","volume":"5","author":"pushpavathi","year":"2014","journal-title":"Int J Sci Eng Res"},{"key":"ref18","first-page":"1","article-title":"A systematic literature review of software defect prediction: Research trends, datasets, methods and frameworks","volume":"1","author":"wahono","year":"2015","journal-title":"J Softw Eng"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICTCS.2017.39"},{"key":"ref28","first-page":"3460","article-title":"Speeding up automatic hyperparameter optimization of deep neural networks by extrapolation of learning curves","author":"domhan","year":"2015","journal-title":"Proc 24th Int Joint Conf Artif Intell"},{"key":"ref4","first-page":"80","article-title":"An improved version of opt-AiNet algorithm (I-opt-AiNet) for function optimization","volume":"11","author":"agiza","year":"2011","journal-title":"Int J Comput Sci Netw Secur"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.08.454"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MALTESQUE.2017.7882014"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2017914816"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2010.5463279"},{"key":"ref5","article-title":"Survey on software defect prediction","author":"nam","year":"2014"},{"key":"ref8","author":"brownlee","year":"2011","journal-title":"Clever Algorithms Nature-Inspired Programming Recipes"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2009.11.003"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2794977"},{"key":"ref9","article-title":"Artificial immune systems: Part I&#x2014;Basic theory and applications","volume":"210","author":"de castro","year":"1999"},{"key":"ref1","first-page":"1","article-title":"A systematic literature review of software defect prediction: Research trends, datasets, methods and frameworks","volume":"1","author":"wahono","year":"2018","journal-title":"J Softw Eng"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889256"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2015.14"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2834892.2834896"},{"key":"ref42","first-page":"1","article-title":"A danger-theory-based immune network optimization algorithm","volume":"2013","author":"zhang","year":"2012","journal-title":"Sci World J"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884804"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.113085"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.4114\/IA.V18I56.1159"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106256"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2019.07.009"},{"key":"ref25","article-title":"Deep learning using linear support vector machines","author":"tang","year":"2013","journal-title":"arXiv 1306 0239"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/08966271.pdf?arnumber=8966271","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:51:05Z","timestamp":1639770665000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8966271\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/access.2020.2968362","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}