{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T04:08:08Z","timestamp":1747886888016,"version":"3.41.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:00:00Z","timestamp":1743379200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:00:00Z","timestamp":1743379200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,3,31]]},"DOI":"10.1109\/icst62969.2025.10989004","type":"proceedings-article","created":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T17:05:21Z","timestamp":1747760721000},"page":"127-137","source":"Crossref","is-referenced-by-count":0,"title":["Multi-Project Just-in-Time Software Defect Prediction Based on Multi-Task Learning for Mobile Applications"],"prefix":"10.1109","author":[{"given":"Feng","family":"Chen","sequence":"first","affiliation":[{"name":"School of Software Engineering, Chongqing University of Posts and Telecommunications,Chongqing,China"}]},{"given":"Yuxin","family":"Ke","sequence":"additional","affiliation":[{"name":"School of Software Engineering, Chongqing University of Posts and Telecommunications,Chongqing,China"}]},{"given":"Xin","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Software Engineering, Chongqing University of Posts and Telecommunications,Chongqing,China"}]},{"given":"Qingjie","family":"Wei","sequence":"additional","affiliation":[{"name":"School of Software Engineering, Chongqing University of Posts and Telecommunications,Chongqing,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.70"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MOBILESoft.2017.58"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MOBILESoft.2019.00023"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2021.3060937"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3412841.3442019"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-021-1013-5"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1049\/sfw2.12040"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2021.3066170"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.7664"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-023-09629-1"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3070203"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/0098-3004(84)90020-7"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3383313.3412236"},{"issue":"12","key":"ref15","first-page":"e2203","article-title":"Multitaskdefectprediction","volume":"31","author":"Ni","year":"2019","journal-title":"Journal of Software: Evolution and Process"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-30164-8_401"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-55860-307-3.50012-5"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3209978.3210104"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220007"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s13198-023-01897-1"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICICS49469.2020.239556"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597075"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2693980"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.03.007"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2836442"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3383219.3383232"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00016"},{"key":"ref28","first-page":"518","article-title":"CC2Vec: Distributed Representations of Code Changes","volume-title":"presented at the Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering","author":"Hoang","year":"2020"},{"key":"ref29","article-title":"Adam: A Method for Stochastic Optimization","author":"Kingma","year":"2014","journal-title":"Ithaca, NYarXiv.org"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79588-9_12"}],"event":{"name":"2025 IEEE Conference on Software Testing, Verification and Validation (ICST)","start":{"date-parts":[[2025,3,31]]},"location":"Napoli, Italy","end":{"date-parts":[[2025,4,4]]}},"container-title":["2025 IEEE Conference on Software Testing, Verification and Validation (ICST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10988917\/10988918\/10989004.pdf?arnumber=10989004","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T05:53:23Z","timestamp":1747806803000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10989004\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,31]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/icst62969.2025.10989004","relation":{},"subject":[],"published":{"date-parts":[[2025,3,31]]}}}