{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T13:52:50Z","timestamp":1772891570447,"version":"3.50.1"},"reference-count":83,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2014,6,1]],"date-time":"2014-06-01T00:00:00Z","timestamp":1401580800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100013286","name":"Specialized Research Fund for the Doctoral Program of Higher Education","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100013286","id-type":"DOI","asserted-by":"crossref"}]},{"name":"NUAA Fundamental Research Funds"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/tr.2014.2316951","type":"journal-article","created":{"date-parts":[[2014,4,21]],"date-time":"2014-04-21T18:01:54Z","timestamp":1398103314000},"page":"676-686","source":"Crossref","is-referenced-by-count":112,"title":["Two-Stage Cost-Sensitive Learning for Software Defect Prediction"],"prefix":"10.1109","volume":"63","author":[{"given":"Mingxia","family":"Liu","sequence":"first","affiliation":[]},{"given":"Linsong","family":"Miao","sequence":"additional","affiliation":[]},{"given":"Daoqiang","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2008.119"},{"key":"ref72","first-page":"97","article-title":"AdaCost: Misclassification cost-sensitive boosting","author":"fan","year":"1999","journal-title":"Proc 16th Int Conf Machine Learning"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2004.03.031"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2003.1250950"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(97)00043-X"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.159"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1002\/0470854774"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1294948.1294953"},{"key":"ref75","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-35488-8","author":"guyon","year":"2006","journal-title":"Feature Extraction Foundations and Applications"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368114"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2007.10.009"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.12.011"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"717","DOI":"10.1109\/ICDM.2005.120","article-title":"Predicting software escalations with maximum ROI","author":"ling","year":"2005","journal-title":"Proc IEEE Int Conf Data Mining"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"1283","DOI":"10.1109\/TSMCA.2009.2027131","article-title":"Improving software-quality predictions with data sampling and boosting","volume":"39","author":"khoshgoftaar","year":"2009","journal-title":"IEEE Trans Syst Man Cybern A Syst Humans"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/NAFIPS.2007.383813"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1142\/9789812794758_0006"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(00)00079-0"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/32.544352"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062558"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2002.1173102"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2009.195"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/1007730.1007733"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009700419189"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2006.17"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-013-9430-0"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/312129.312220"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2007.4296696"},{"key":"ref65","first-page":"973","article-title":"The foundations of cost-sensitive learning","author":"elkan","year":"2001","journal-title":"Proc 17th Int Joint Conf Artif Intell"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8640.2010.00358.x"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/32.6191"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014056"},{"key":"ref68","doi-asserted-by":"crossref","first-page":"5","DOI":"10.3233\/JCS-2002-101-202","article-title":"Toward cost-sensitive modeling for intrusion detection and response","volume":"10","author":"lee","year":"2002","journal-title":"J Computer Security"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2007.04.009"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(90)90040-S"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.90"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/32.295895"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2012.2183912"},{"key":"ref21","author":"lorenz","year":"1994","journal-title":"Object-Oriented Software Metrics A Practical Guide"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194012400013"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1002\/spe.1043"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(97)00063-5"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1162\/153244303322753616"},{"key":"ref50","first-page":"176","article-title":"An application of genetic programming to software quality prediction","author":"khoshgoftaar","year":"1998","journal-title":"Comput Intell Software Eng"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2007.896763"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2243146"},{"key":"ref58","doi-asserted-by":"crossref","first-page":"429","DOI":"10.3233\/IDA-2002-6504","article-title":"The class imbalance problem: A systematic study","volume":"6","author":"japkowicz","year":"2002","journal-title":"Intell Data Anal"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-011-9182-8"},{"key":"ref56","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/978-3-642-03969-0_21","volume":"43","author":"gray","year":"2009","journal-title":"Engineering Applications of Neural Networks"},{"key":"ref55","first-page":"1176","article-title":"A study on software reliability prediction based on support vector machines","author":"bo","year":"2007","journal-title":"Proc IEEE Int Conf Ind Eng Eng Manag"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2007.07.040"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2006.889473"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2006.1716663"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/32.852741"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.1599417"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2005.1553571"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.04.008"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2012.2226152"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/24.855532"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/BF02249049"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.256941"},{"key":"ref16","first-page":"902","article-title":"Application of neural networks to software quality modeling of software quality","volume":"6","author":"khoshgoftaar","year":"1997","journal-title":"Int J Rel Qual Safety Eng"},{"key":"ref81","article-title":"Laplacian score for feature selection","author":"he","year":"2005","journal-title":"Advances in Neural Information Processing Systems (NIPS)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.12.056"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025316301168"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1049\/ic.2011.0012"},{"key":"ref19","author":"chapman","year":"2004","journal-title":"Metrics data program"},{"key":"ref80","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198538493.001.0001","author":"bishop","year":"1995","journal-title":"Neural Networks for Pattern Recognition"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194099000309"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/0950-5849(90)90109-5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1998.671393"},{"key":"ref5","article-title":"Assessing predictors of software defects","author":"menzies","year":"2004","journal-title":"Proc Workshop Predictive Software Models"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009728205264"},{"key":"ref49","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1613\/jair.120","article-title":"Cost-sensitive classification: Empirical evaluation of a hybrid genetic decision tree induction algorithm","volume":"2","author":"turney","year":"1995","journal-title":"J Artif Intell Res"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/32.256852"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.1998.730766"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/32.177367"},{"key":"ref45","first-page":"31","article-title":"Regression tree modeling for the prediction of software quality","author":"gokhale","year":"1997","journal-title":"Proc 3rd Int Conf Reliab and Quality in Design"},{"key":"ref48","article-title":"Robust prediction of defect-proneness by random forests","author":"guo","year":"2004","journal-title":"Proc 17th Int Symp Softw Rel Eng"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/49.272878"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1109\/ICSE.2007.66","article-title":"Predicting faults from cached history","author":"kim","year":"2007","journal-title":"Proc 29th Int Conf Software Eng"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2005.91"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194000000092"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2007.896761"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/24\/6823191\/06803085.pdf?arnumber=6803085","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,26]],"date-time":"2024-05-26T02:54:20Z","timestamp":1716692060000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6803085\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":83,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tr.2014.2316951","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"value":"0018-9529","type":"print"},{"value":"1558-1721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,6]]}}}