{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T12:42:48Z","timestamp":1775047368168,"version":"3.50.1"},"reference-count":86,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100000190","name":"Electrical and Computer Engineering (ECE)-Huawei Research Initiative (HERI) at the University of Alberta","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000190","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3402543","type":"journal-article","created":{"date-parts":[[2024,5,17]],"date-time":"2024-05-17T17:48:59Z","timestamp":1715968139000},"page":"70676-70689","source":"Crossref","is-referenced-by-count":73,"title":["Keeping Deep Learning Models in Check: A History-Based Approach to Mitigate Overfitting"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4468-5972","authenticated-orcid":false,"given":"Hao","family":"Li","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Alberta, Edmonton, AB, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1812-5365","authenticated-orcid":false,"given":"Gopi Krishnan","family":"Rajbahadur","sequence":"additional","affiliation":[{"name":"Centre for Software Excellence, Huawei Technologies, Kingston, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4034-6650","authenticated-orcid":false,"given":"Dayi","family":"Lin","sequence":"additional","affiliation":[{"name":"Centre for Software Excellence, Huawei Technologies, Kingston, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0474-5718","authenticated-orcid":false,"given":"Cor-Paul","family":"Bezemer","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Alberta, Edmonton, AB, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3063-3197","authenticated-orcid":false,"given":"Zhen Ming","family":"Jiang","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, York University, Toronto, ON, Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s11063-018-9921-6"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3392093"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2019.00021"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2013.72"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11749-016-0481-7"},{"key":"ref6","volume-title":"UCI Repository of Machine Learning Databases","author":"Blake","year":"1998"},{"key":"ref7","first-page":"1035","article-title":"Small data, big decisions: Model selection in the small-data regime","volume-title":"Proc. 37th Int. Conf. Mach. Learn.","author":"Bornschein"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/springerreference_179250"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/b97391"},{"key":"ref10","first-page":"1459","article-title":"Circuit-based intrinsic methods to detect overfitting","volume-title":"Proc. 37th Int. Conf. Mach. Learn.","volume":"119","author":"Chatterjee"},{"key":"ref11","article-title":"Robust overfitting may be mitigated by properly learned smoothening","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Chen"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2792473"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SANER48275.2020.9054866"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-38919-2_1"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.02.030"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.14778\/1454159.1454226"},{"key":"ref17","first-page":"1435","article-title":"Towards the use of the readily available tests from the release pipeline as performance tests. Are we there yet?","volume-title":"Proc. IEEE\/ACM 42nd Int. Conf. Softw. Eng. (ICSE)","author":"Ding"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330265"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106256"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2011.06.026"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCS51430.2021.9441783"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/89.279278"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950308"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.2165\/00002018-200730070-00010"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.2478\/v10117-011-0021-1"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1021\/ci0342472"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00016"},{"key":"ref28","first-page":"4287","article-title":"Learning curves for analysis of deep networks","volume-title":"Proc. 38th Int. Conf. Mach. Learn.","volume":"139","author":"Hoiem"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SANER48275.2020.9054830"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.5555\/3045118.3045167"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.85"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i9.16989"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2001858.2002060"},{"key":"ref34","article-title":"Regularization for deep learning: A taxonomy","author":"Kuka\u010d ka","year":"2017","journal-title":"arXiv:1710.10686"},{"key":"ref35","first-page":"2796","article-title":"Accurate uncertainties for deep learning using calibrated regression","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Kuleshov"},{"key":"ref36","first-page":"361","article-title":"Where shall we log? Studying and suggesting logging locations in code blocks","volume-title":"Proc. 35th IEEE\/ACM Int. Conf. Automated Softw. Eng. (ASE)","author":"Li"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-007-0064-z"},{"key":"ref38","first-page":"473","article-title":"Multi-task learning based pre-trained language model for code completion","volume-title":"Proc. 35th IEEE\/ACM Int. Conf. Automated Softw. Eng. (ASE)","author":"Liu"},{"key":"ref39","first-page":"585","article-title":"Automating just-in-time comment updating","volume-title":"Proc. 35th IEEE\/ACM Int. Conf. Automated Softw. Eng. (ASE)","author":"Liu"},{"key":"ref40","article-title":"Dropout reduces underfitting","author":"Liu","year":"2023","journal-title":"arXiv:2303.01500"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1002\/0471264385.wei0225"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/SANER48275.2020.9054792"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177730491.MR0022058.Zbl0041.26103"},{"key":"ref44","article-title":"Towards model selection using learning curve cross-validation","volume-title":"Proc. 8th ICML Workshop Automated Mach. Learn. (AutoML)","author":"Mohr"},{"key":"ref45","article-title":"Learning curves for decision making in supervised machine learning\u2014A survey","author":"Mohr","year":"2022","journal-title":"arXiv:2201.12150"},{"key":"ref46","volume-title":"Statistical Techniques for Transportation Engineering","author":"Molugaram","year":"2017"},{"key":"ref47","first-page":"630","article-title":"Generalization and parameter estimation in feedforward nets: Some experiments","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"2","author":"Morgan"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICST49551.2021.00033"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3040"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35289-8_5"},{"key":"ref51","article-title":"PROBEN1: A set of neural network benchmark problems and benchmarking rules","author":"Prechelt","year":"1994"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3324916"},{"key":"ref53","first-page":"8093","article-title":"Overfitting in adversarially robust deep learning","volume-title":"Proc. 37th Int. Conf. Mach. Learn.","author":"Rice"},{"key":"ref54","first-page":"1","article-title":"Exploring methods for evaluating group differences on the NSSE and other surveys: Are the t-test and Cohen\u2019sd indices the most appropriate choices","volume-title":"Proc. Annu. Meeting Southern Assoc. Institutional Res.","author":"Romano"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-33327-0_12"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/361219.361220"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.3233\/IDA-2007-11508"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-015-0441-y"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2247596.2247656"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/SANER56733.2023.00049"},{"key":"ref61","first-page":"641","article-title":"Detection of hidden feature requests from massive chat messages via deep Siamese network","volume-title":"Proc. IEEE\/ACM 42nd Int. Conf. Softw. Eng. (ICSE)","author":"Shi"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.107978"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-019-0197-0"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-52452-8"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01611"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786825"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1093\/ije\/dyq191"},{"issue":"1","key":"ref68","first-page":"1929","article-title":"Dropout: A simple way to prevent neural networks from overfitting","volume":"15","author":"Srivastava","year":"2014","journal-title":"J. Mach. Learn. Res."},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01768-2_25"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.mex.2021.101477"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2584050"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180220"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/SANER53432.2022.00128"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/3340544"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24465-5_26"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1140\/epjds\/s13688-017-0111-y"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3068379"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/3485275"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00152"},{"key":"ref80","first-page":"7858","article-title":"Detecting overfitting via adversarial examples","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"32","author":"Werpachowski"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143974"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/3092703.3092718"},{"key":"ref83","first-page":"51","article-title":"Predicting semantically linkable knowledge in developer online forums via convolutional neural network","volume-title":"Proc. 31st IEEE\/ACM Int. Conf. Automated Softw. Eng. (ASE)","author":"Xu"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/3505243"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/SANER48275.2020.9054868"},{"key":"ref86","article-title":"Model validation using mutated training labels: An exploratory study","author":"Zhang","year":"2019","journal-title":"arXiv:1905.10201"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10380310\/10533733.pdf?arnumber=10533733","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,24]],"date-time":"2024-05-24T04:56:29Z","timestamp":1716526589000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10533733\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":86,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3402543","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}