{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T22:45:55Z","timestamp":1775774755057,"version":"3.50.1"},"reference-count":60,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,5]]},"DOI":"10.1109\/icse.2013.6606584","type":"proceedings-article","created":{"date-parts":[[2013,10,1]],"date-time":"2013-10-01T14:38:03Z","timestamp":1380638283000},"page":"382-391","source":"Crossref","is-referenced-by-count":405,"title":["Transfer defect learning"],"prefix":"10.1109","author":[{"given":"Jaechang","family":"Nam","sequence":"first","affiliation":[]},{"given":"Sinno Jialin","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Sunghun","family":"Kim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"35","article-title":"Revisiting common bug prediction findings using effortaware models","author":"kamei","year":"2010","journal-title":"Proceedings of ICSM"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453106"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985859"},{"key":"34","year":"0"},{"key":"39","year":"0"},{"key":"37","article-title":"Highimpact defects: A study of breakage and surprise defects","author":"shihab","year":"2011","journal-title":"Proceedings of ESEC\/FSE"},{"key":"38","year":"0"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9103-7"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.2307\/3001968"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1145\/1007730.1007741"},{"key":"40","article-title":"Liblinear: A library for large linear classification","volume":"9","author":"fan","year":"2008","journal-title":"J Mach Learn Res"},{"key":"22","author":"witten","year":"2005","journal-title":"Data Mining Practical Machine Learning Tools and Techniques"},{"key":"23","author":"alpaydin","year":"2010","journal-title":"Introduction to Machine Learning"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557045"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772767"},{"key":"26","article-title":"Normalization in support vector machines","author":"graf","year":"2001","journal-title":"Proceedings of DAGM"},{"key":"27","article-title":"Data preprocessing for supervised learning","volume":"1","author":"kotsiantis","year":"2006","journal-title":"Internaltional Journal of Computer Science"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.49"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2009.5306304"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.256941"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70773"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070510"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368114"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/32.544352"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025156"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368161"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595716"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134349"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/32.553637"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1810295.1810313"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025120"},{"key":"59","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2007.35"},{"key":"58","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595715"},{"key":"57","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.81"},{"key":"56","article-title":"Domain transfer svm for video concept detection","author":"duan","year":"2009","journal-title":"proceedings of CVPR"},{"key":"19","author":"han","year":"2012","journal-title":"Data Mining Concepts and Techniques"},{"key":"55","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2008.4"},{"key":"17","article-title":"Direct importance estimation with model selection and its application to covariate shift adaptation","author":"sugiyama","year":"2008","journal-title":"Proceedings of NIPS"},{"key":"18","doi-asserted-by":"crossref","DOI":"10.1109\/TNN.2010.2091281","article-title":"Domain adaptation via transfer component analysis","volume":"22","author":"pan","year":"2011","journal-title":"IEEE Transactions on Neural Networks"},{"key":"15","article-title":"Transferring naive bayes classifiers for text classification","author":"dai","year":"2007","journal-title":"Proceedings of AAAI"},{"key":"16","article-title":"Correcting sample selection bias by unlabeled data","author":"huang","year":"2007","journal-title":"Proceedings of NIPS"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.191"},{"key":"14","article-title":"An improved categorization of classifier's sensitivity on sample selection bias","author":"fan","year":"2005","journal-title":"Proceedings of ICDM"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/564376.564421"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595713"},{"key":"21","author":"montgomery","year":"2001","journal-title":"Engineering Statistics"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2010.5463279"},{"key":"60","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134336"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.1145\/1273496.1273521"},{"key":"48","doi-asserted-by":"crossref","DOI":"10.1016\/j.infsof.2011.09.007","article-title":"Transfer learning for crosscompany software defect prediction","volume":"54","author":"ma","year":"2012","journal-title":"Inf Softw Technol"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.76"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1109\/32.815326"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393669"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2011.30"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453105"},{"key":"51","article-title":"Transfer learning via dimensionality reduction","author":"pan","year":"2008","journal-title":"Proceedings of AAAI"},{"key":"52","article-title":"Analysis of representations for domain adaptation","author":"ben-david","year":"2007","journal-title":"Proceedings of NIPS"},{"key":"53","doi-asserted-by":"publisher","DOI":"10.1145\/1390334.1390441"},{"key":"54","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143934"},{"key":"50","article-title":"Instance weighting for domain adaptation in NLP","author":"jiang","year":"2007","journal-title":"Proceedings of ACL"}],"event":{"name":"2013 35th International Conference on Software Engineering (ICSE)","location":"San Francisco, CA, USA","start":{"date-parts":[[2013,5,18]]},"end":{"date-parts":[[2013,5,26]]}},"container-title":["2013 35th International Conference on Software Engineering (ICSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6596173\/6606539\/06606584.pdf?arnumber=6606584","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,27]],"date-time":"2019-07-27T21:49:31Z","timestamp":1564264171000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6606584\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5]]},"references-count":60,"URL":"https:\/\/doi.org\/10.1109\/icse.2013.6606584","relation":{},"subject":[],"published":{"date-parts":[[2013,5]]}}}