{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:08:02Z","timestamp":1750223282776,"version":"3.37.3"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,6,18]],"date-time":"2023-06-18T00:00:00Z","timestamp":1687046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,18]],"date-time":"2023-06-18T00:00:00Z","timestamp":1687046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772284"],"award-info":[{"award-number":["61772284"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,6,18]]},"DOI":"10.1109\/ijcnn54540.2023.10191494","type":"proceedings-article","created":{"date-parts":[[2023,8,2]],"date-time":"2023-08-02T17:30:03Z","timestamp":1690997403000},"page":"1-8","source":"Crossref","is-referenced-by-count":4,"title":["Decomposing Source Codes by Program Slicing for Bug Localization"],"prefix":"10.1109","author":[{"given":"Jian","family":"Yong","sequence":"first","affiliation":[{"name":"School of Computer Science, Nanjing University of Posts and Telecommunications,Jiangsu Key Laboratory of Big Data Security and Intelligent Processing"}]},{"given":"Ziye","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Computer Science, Nanjing University of Posts and Telecommunications,Jiangsu Key Laboratory of Big Data Security and Intelligent Processing"}]},{"given":"Yun","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science, Nanjing University of Posts and Telecommunications,Jiangsu Key Laboratory of Big Data Security and Intelligent Processing"}]}],"member":"263","reference":[{"key":"ref13","first-page":"143","article-title":"Using program slicing to sim-plify testing","author":"mark","year":"1995","journal-title":"Software Testing Verification and Reliability"},{"key":"ref12","article-title":"Control flow graph embedding based on multi-instance decomposition for bug localization","volume":"34","author":"xuan","year":"2020","journal-title":"Proceedings of the AAAI Conference on Artificial Intelligence"},{"key":"ref15","first-page":"1649","article-title":"Multi-dimension convolutional neural network for bug localization","author":"bei","year":"2020","journal-title":"IEEE Transactions on Services Computing 15 3"},{"key":"ref14","first-page":"352","article-title":"Program slicing","author":"mark","year":"1984","journal-title":"IEEE Trans Software Engi-neering"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1145\/3236024.3236065"},{"key":"ref11","article-title":"Combining deep learning with information re-trieval to localize buggy files for bug reports (n)","author":"an ngoc","year":"2015","journal-title":"2015 30th IEEE\/ACM International Conference on Automated Software Engineering (ASE)"},{"key":"ref10","article-title":"From word embeddings to document similarities for improved information retrieval in software engineering","author":"xin","year":"2016","journal-title":"Proceedings of the 38th International Conference on Software Engineering"},{"key":"ref2","article-title":"Where should the bugs be fixed? more accurate information retrieval-based bug localization based on bug reports","author":"jian","year":"2012","journal-title":"Software Engineering (ICSE) 2012 34th International Conference on"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/TSE.2016.2521368"},{"key":"ref17","article-title":"Exploiting code knowledge graph for bug localization via bi -directional attention","author":"jinglei","year":"2020","journal-title":"Proc International Conference on Program Comprehension"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/ACCESS.2019.2936948"},{"key":"ref19","first-page":"26","article-title":"Interprocedural slicing using dependence graphs","author":"susan","year":"1990","journal-title":"ACM Trans Programming Languages and Systems (TOPLAS)"},{"key":"ref18","article-title":"Bug localization with combination of deep learning and information retrieval","author":"an ngoc","year":"2017","journal-title":"2017 IEEE\/ACM 25th International Conference on Program Comprehension (ICPC)"},{"key":"ref24","article-title":"Efficient estimation of word representations in vector space","author":"tomas","year":"2013","journal-title":"ArXiv Preprint"},{"key":"ref23","article-title":"Neural machine translation by jointly learning to align and translate","author":"dzmitry","year":"2014","journal-title":"ArXiv Preprint"},{"key":"ref26","article-title":"Cooba: Cross-project bug localization via adversarial transfer learning","author":"ziye","year":"2020","journal-title":"IJCAI"},{"key":"ref25","first-page":"235","article-title":"DreamLoc: A deep relevance matching-based framework for bug localization","author":"binhang","year":"2021","journal-title":"IEEE Transactions on Reliability 71 1"},{"key":"ref20","first-page":"420","article-title":"Feature location using probabilistic ranking of methods based on execution scenarios and information retrieval","author":"denys","year":"2007","journal-title":"IEEE Trans Softw Eng 33"},{"key":"ref22","article-title":"Attention-based bidirectional long short-term mem-ory networks for relation classification","author":"peng","year":"0","journal-title":"Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics (Volume 2 Short Papers)"},{"year":"2015","author":"yahui","journal-title":"Convolutional neural networks for sentence classification","key":"ref21"},{"key":"ref28","first-page":"2476","article-title":"Adversariallearning for multi-task sequence labeling with attention mechanism","volume":"28","author":"yu","year":"2020","journal-title":"IEEE\/ ACM Transactions on Audio Speech and Language processing"},{"key":"ref27","article-title":"BL-GAN: Semi-Supervised Bug Localization Via Generative Adversarial Network","author":"ziye","year":"2022","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"ref29","first-page":"130","volume":"3","author":"martin","year":"1980","journal-title":"An algorithm for suffix stripping"},{"key":"ref8","article-title":"Enhancing the Unified Features to Locate Buggy Files by Exploiting the Sequential Nature of Source Code","author":"xuan","year":"2017","journal-title":"IJCAI"},{"key":"ref7","article-title":"Learning unified features from natural and programming languages for locating buggy source code","volume":"16","author":"xuan","year":"2016","journal-title":"IJCAI"},{"key":"ref9","article-title":"Learning to rank relevant files for bug reports using domain knowledge","author":"xin","year":"2014","journal-title":"Proceedings of the 2nd ACM SIGSOFT Symposium on Foundations of Software Engineering"},{"key":"ref4","article-title":"Version history, similar report, and structure: Putting them together for improved bug localization","author":"shaowei","year":"2014","journal-title":"Proc International Conference on Program Comprehension"},{"key":"ref3","article-title":"On the use of relevance feedback in IR-based concept location","author":"gregory","year":"2009","journal-title":"2009 IEEE International Conference on Software Maintenance"},{"key":"ref6","article-title":"Dependloc: A dependency-based framework for bug localization","author":"wei","year":"2020","journal-title":"2020 27th Asia-Pacific Software Engineering Conference (APSEC)"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1016\/j.infsof.2010.04.002"}],"event":{"name":"2023 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2023,6,18]]},"location":"Gold Coast, Australia","end":{"date-parts":[[2023,6,23]]}},"container-title":["2023 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10190990\/10190992\/10191494.pdf?arnumber=10191494","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T17:42:15Z","timestamp":1692639735000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10191494\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,18]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/ijcnn54540.2023.10191494","relation":{},"subject":[],"published":{"date-parts":[[2023,6,18]]}}}