{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T06:01:28Z","timestamp":1761976888586,"version":"build-2065373602"},"reference-count":62,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T00:00:00Z","timestamp":1752624000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T00:00:00Z","timestamp":1752624000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,7,16]]},"DOI":"10.1109\/qrs-c65679.2025.00029","type":"proceedings-article","created":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T17:10:04Z","timestamp":1761930604000},"page":"157-167","source":"Crossref","is-referenced-by-count":0,"title":["Software Defects Prediction: Source Code Is All You Need"],"prefix":"10.1109","author":[{"given":"Thierno","family":"Aliou Ba","sequence":"first","affiliation":[{"name":"University of Quebec at Trois-Rivi&#x00E8;res,Department of Computer Science,Quebec,Canada"}]},{"given":"Fadel","family":"Toure","sequence":"additional","affiliation":[{"name":"University of Quebec at Trois-Rivi&#x00E8;res,Department of Computer Science,Quebec,Canada"}]},{"given":"Usef","family":"Faghihi","sequence":"additional","affiliation":[{"name":"University of Quebec at Trois-Rivi&#x00E8;res,Department of Computer Science,Quebec,Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2836442"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1186\/s12916-015-0314-7"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1111\/ajt.16982"},{"key":"ref4","first-page":"1","article-title":"Financial risk the fall of knight capital group","author":"Saltapidas","year":"2018","journal-title":"University of Gothenburg"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.2172\/834270"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3055301.3068754"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC54236.2022.00085"},{"key":"ref8","article-title":"Domain generalization via model-agnostic learning of semantic features","volume":"32","author":"Dou","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/967900.968207"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2017.42"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2017.0148"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03200-9_2"},{"article-title":"DeepSeek-Coder: When the Large Language Model Meets Programming--The Rise of Code Intelligence","year":"2024","author":"Guo","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3695993"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/32.295895"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/32.979986"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(99)00035-7"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1979.234165"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CYBERNETICSCOM.2017.8311708"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.4236\/jsea.2019.125007"},{"author":"Aydin","key":"ref22","article-title":"Leveraging Deep Learning for Enhanced Software Fault Prediction Using Error-type Metrics"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-023-01528-9"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-020-00277-4"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1049\/sfw2.12066"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2925313"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3390\/app9102138"},{"key":"ref28","first-page":"578","article-title":"Software visualization and deep transfer learning for effective software defect prediction","volume-title":"Proceedings of the ACM\/IEEE 42nd international conference on software engineering","author":"Chen"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2017.00019"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3390\/app11114793"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-022-06830-5"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23528-8_13"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.21528\/CBIC2013-020"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.5555\/1642194.1642224"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-012-9218-8"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-94855-8_3"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.naacl-main.211"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.emnlp-main.685"},{"volume-title":"PROMISE Repository of Empirical Software Engineering Data","year":"2007","author":"Boetticher","key":"ref40"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/DSA56465.2022.00049"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606584"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368114"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2007.07.040"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2007.13"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568320"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-11683-5_24"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884857"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3387904.3389268"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.239"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/2907070"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09823-4_45"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2023.127063"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.emnlp-main.298"},{"article-title":"Llama: Open and efficient foundation language models","year":"2023","author":"Touvron","key":"ref55"},{"issue":"8","key":"ref56","first-page":"9","article-title":"Language models are unsupervised multitask learners","volume":"1","author":"Radford","year":"2019","journal-title":"OpenAI blog"},{"article-title":"Decoupled weight decay regularization","year":"2017","author":"Loshchilov","key":"ref57"},{"issue":"1","key":"ref58","first-page":"1929","article-title":"Dropout: a simple way to prevent neural networks from overfitting","volume":"15","author":"Srivastava","year":"2014","journal-title":"The journal of machine learning research"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1371"},{"article-title":"Sgdr: Stochastic gradient descent with warm restarts","year":"2016","author":"Loshchilov","key":"ref60"},{"article-title":"Mixed precision training","year":"2017","author":"Micikevicius","key":"ref61"},{"article-title":"An overview of gradient descent optimization algorithms","year":"2016","author":"Ruder","key":"ref62"}],"event":{"name":"2025 25th International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","start":{"date-parts":[[2025,7,16]]},"location":"Hangzhou, China","end":{"date-parts":[[2025,7,20]]}},"container-title":["2025 25th International Conference on Software Quality, Reliability, and Security Companion (QRS-C)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11216429\/11216154\/11216508.pdf?arnumber=11216508","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T05:56:39Z","timestamp":1761976599000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11216508\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,16]]},"references-count":62,"URL":"https:\/\/doi.org\/10.1109\/qrs-c65679.2025.00029","relation":{},"subject":[],"published":{"date-parts":[[2025,7,16]]}}}