{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T23:31:10Z","timestamp":1775950270796,"version":"3.50.1"},"reference-count":75,"publisher":"IEEE","license":[{"start":{"date-parts":[[2018,3,1]],"date-time":"2018-03-01T00:00:00Z","timestamp":1519862400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2018,3,1]],"date-time":"2018-03-01T00:00:00Z","timestamp":1519862400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1109\/saner.2018.8330210","type":"proceedings-article","created":{"date-parts":[[2018,4,6]],"date-time":"2018-04-06T00:41:53Z","timestamp":1522975313000},"page":"209-220","source":"Crossref","is-referenced-by-count":41,"title":["Cross-version defect prediction via hybrid active learning with kernel principal component analysis"],"prefix":"10.1109","author":[{"given":"Zhou","family":"Xu","sequence":"first","affiliation":[{"name":"State Key Laboratory of Software Engineering, School of Computer, Wuhan University, China"}]},{"given":"Jin","family":"Liu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Software Engineering, School of Computer, Wuhan University, China"}]},{"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, China"}]},{"given":"Tao","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Harbin Engineering University, China"}]}],"member":"263","reference":[{"key":"ref73","year":"0","journal-title":"Supplementary Material"},{"key":"ref72","doi-asserted-by":"crossref","DOI":"10.4324\/9781315806730","author":"cliff","year":"2014","journal-title":"Ordinal Methods for Behavioral Data Analysis"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.11144\/Javeriana.upsy10-2.cdcp"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985795"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1002\/spe.1043"},{"key":"ref39","first-page":"441","author":"roy","year":"2001","journal-title":"Toward optimal active learning through sampling estimation of error reduction"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.43"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007330508534"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393669"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595713"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9103-7"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019484"},{"key":"ref37","first-page":"45","article-title":"Support vector machine active learning with applications to text classification","volume":"2","author":"tong","year":"2001","journal-title":"Journal of Machine Learning Research"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2016.33"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/FLOSS.2009.5071357"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1507195.1507206"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/SEAA.2015.25"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/1868328.1868342"},{"key":"ref61","first-page":"1","article-title":"Statistical comparisons of classifiers over multiple data sets","volume":"7","author":"dem\u0161ar","year":"2006","journal-title":"Journal of Machine Learning Research"},{"key":"ref63","first-page":"69","article-title":"Using object-oriented design metrics to predict software defects","author":"jureczko","year":"2010","journal-title":"Models and Methods of System Dependability Oficyna Wydawnicza Politechniki Wroc?awskiej"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786813"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.34"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2543218"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.256941"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-011-0090-3"},{"key":"ref29","article-title":"Heterogeneous defect prediction","author":"nam","year":"2017","journal-title":"IEEE Transactions on Software Engineering"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568320"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.90"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2013.2259203"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"547","DOI":"10.1109\/ICSE.2002.1007998","article-title":"Safety Critical Systems: Challenges and Directions","author":"john c knight","year":"2002","journal-title":"Proceedings of the 24th International Conference on Software Engineering ICSE 2002"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/32.879815"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.chemolab.2004.05.001"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.91"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.35"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2584050"},{"key":"ref23","article-title":"Mahakil: Diversity based oversampling approach to alleviate the class imbalance issue in software defect prediction","author":"bennin","year":"2017","journal-title":"IEEE Transactions on Software Engineering"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606584"},{"key":"ref25","article-title":"A comparative study to benchmark cross-project defect prediction approaches","author":"herbold","year":"2017","journal-title":"IEEE Transactions on Software Engineering"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2370048"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970353"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2499393.2499395"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2015.01.014"},{"key":"ref57","year":"0","journal-title":"Morph dataset"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-007-5019-5"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135870"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.51"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2005.1553565"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR-WCRE.2014.6747166"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-015-0179-1"},{"key":"ref11","article-title":"Software defect prediction model based on pca-isvm","author":"liu","year":"2014","journal-title":"Computer Simulation"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1390156.1390183"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1166\/asl.2012.2556"},{"key":"ref13","article-title":"Software quality prediction method with hybrid applying principal components analysis and wavelet neural network and genetic algorithm","volume":"5","author":"zhong","year":"2011","journal-title":"International Journal of Digital Content Technology and its Applications"},{"key":"ref14","article-title":"Statistical shape analysis using kernel pea","author":"rathi","year":"2006","journal-title":"Georgia Institute of Technology"},{"key":"ref15","first-page":"309","article-title":"The impact of feature selection on defect prediction performance: An empirical comparison","author":"xu","year":"2016","journal-title":"Proc of Intl Symposium on Software Reliability Engineering"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9516-2"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/11589990_104"},{"key":"ref18","first-page":"583","article-title":"Kernel principal component analysis","author":"scholkopf","year":"1997","journal-title":"Proceedings of the International Conference on Artificial Neural Networks"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2004.1273927"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1159733.1159738"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.191"},{"key":"ref6","author":"dam","year":"2017","journal-title":"Automatic feature learning for vulnerability prediction"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.11.006"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2014.2307881"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2014.35"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2015.14"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2013.116"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2003.1247066"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1002\/wics.101"},{"key":"ref48","author":"smola","year":"2002","journal-title":"Learning with kernels"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/978-1-4614-0161-2_4","article-title":"Kernel principal component analysis (kpca)-based face recognition","author":"li","year":"2014","journal-title":"Kernel Learning Algorithms for Face Recognition"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.E95.D.1680"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1015330.1015349"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2365324.2365335"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-011-0092-1"}],"event":{"name":"2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER)","location":"Campobasso, Italy","start":{"date-parts":[[2018,3,20]]},"end":{"date-parts":[[2018,3,23]]}},"container-title":["2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8326467\/8330182\/08330210.pdf?arnumber=8330210","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T05:21:27Z","timestamp":1769491287000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8330210\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":75,"URL":"https:\/\/doi.org\/10.1109\/saner.2018.8330210","relation":{},"subject":[],"published":{"date-parts":[[2018,3]]}}}