{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T12:03:57Z","timestamp":1777637037985,"version":"3.51.4"},"reference-count":91,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Ministry of Research, Innovation and Digitization, CNCS\/CCCDI\u2013UEFISCDI, within PNCDI III","award":["PN-III-P4-ID-PCE-2020-0800"],"award-info":[{"award-number":["PN-III-P4-ID-PCE-2020-0800"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3181995","type":"journal-article","created":{"date-parts":[[2022,6,10]],"date-time":"2022-06-10T20:37:09Z","timestamp":1654893429000},"page":"64801-64818","source":"Crossref","is-referenced-by-count":15,"title":["An in-Depth Analysis of the Software Features\u2019 Impact on the Performance of Deep Learning-Based Software Defect Predictors"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3832-7848","authenticated-orcid":false,"given":"Diana-Lucia","family":"Miholca","sequence":"first","affiliation":[{"name":"Department of Computer Science, Babes-Bolyai University, Cluj-Napoca, Romania"}]},{"given":"Vlad-Ioan","family":"Tomescu","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Babes-Bolyai University, Cluj-Napoca, Romania"}]},{"given":"Gabriela","family":"Czibula","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Babes-Bolyai University, Cluj-Napoca, Romania"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.4304\/jsw.6.11.2114-2120"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.12.031"},{"key":"ref3","first-page":"1","article-title":"How good is a software: A review on defect prediction techniques","volume-title":"Proc. Softw. Eng. Symp","author":"Clark"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2007.12.029"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1515\/fcds-2018-0002"},{"issue":"2","key":"ref6","first-page":"891","article-title":"Within-project and cross-project software defect prediction based on improved transfer naive Bayes algorithm","volume":"63","author":"Zhu","year":"2020","journal-title":"Comput. Mater. Continua"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.103"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2014.11.023"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3229161"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-021-10092-4"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884804"},{"key":"ref12","first-page":"1","article-title":"A defect prediction model for open source software","volume-title":"Proc. World Congr. Eng.","volume":"2","author":"Malhotra"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1142\/s0218194012400037"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2013.38"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2695664.2695959"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SYNASC.2016.046"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2017.42"},{"key":"ref18","article-title":"A deep tree-based model for software defect prediction","volume-title":"arXiv:1802.00921","author":"Dam","year":"2018"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2018.00133"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60618-7_28"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.02.027"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SYNASC.2018.00074"},{"key":"ref23","article-title":"The PROMISE repository of software engineering databases","author":"Sayyad","year":"2015"},{"key":"ref24","article-title":"The seacraft repository of empirical software engineering data","year":"2017"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/118014.117970"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233837"},{"key":"ref27","volume-title":"The Metrics Data Program Data Repository"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/PROMISE.2007.10"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9103-7"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025120"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-011-9173-9"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2013.6698911"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.70"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-014-9241-7"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2015.72"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2961111.2962620"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-42089-9_44"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00075"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2018.12.001"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110691"},{"key":"ref41","volume-title":"Practical Software Metrics for Project Management and Process Improvement","author":"Grady","year":"1992"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/1083142.1083147"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/PROMISE.2007.10"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2018.00046"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2616306"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330225"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2014.03.032"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR-WCRE.2014.6747166"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1080\/16843703.2012.11673302"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786814"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3172871.3172878"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.08.004"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/SYNASC51798.2020.00032"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-017-9563-5"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29551-6_23"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2877612"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3144598"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2889061"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.03.076"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3190662"},{"key":"ref62","article-title":"Calcite data set with Boolean label","author":"Tomescu","year":"2022"},{"key":"ref63","volume-title":"Shark"},{"key":"ref64","volume-title":"PMD\u2014An Extensible Cross-Language Static Code Analyzer"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70731"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.14"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368114"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070510"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2599161"},{"key":"ref70","first-page":"52","article-title":"Improving credibility of machine learner models in software engineering","volume-title":"Proc. Adv. Mach. Learn. Appl. Softw. Eng.","author":"Zhang"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-32833-1"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9088-2"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2018.10.052"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2015.14"},{"key":"ref75","article-title":"Distributed representations of sentences and documents","volume-title":"arXiv:1405.4053","author":"Le","year":"2014"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9"},{"key":"ref77","first-page":"45","article-title":"Software framework for topic modelling with large corpora","volume-title":"Proc. LREC Workshop New Challenges NLP Frameworks","author":"\u0158eh\u00e5\u0159ek"},{"key":"ref78","volume-title":"Fastai","author":"Howard","year":"2018"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.10.010"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0177678"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-08-102939-8.00015-3"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1163\/1877-5888_rpp_sim_124722"},{"key":"ref83","first-page":"2579","article-title":"Visualizing data using t-SNE","volume":"9","author":"van der Maaten","year":"2008","journal-title":"J. Mach. Learn. Res."},{"key":"ref84","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"Pedregosa","year":"2011","journal-title":"J. Mach. Learn. Res."},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1016\/j.cam.2005.09.009"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1145\/3439961.3439979"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-815739-8.00006-7"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9102-8"},{"key":"ref91","volume-title":"Apache Commons"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09793667.pdf?arnumber=9793667","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T03:03:19Z","timestamp":1706756599000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9793667\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":91,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3181995","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}