{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T16:43:23Z","timestamp":1778085803961,"version":"3.51.4"},"reference-count":62,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Science Foundation Project of China","award":["61971032"],"award-info":[{"award-number":["61971032"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62002034"],"award-info":[{"award-number":["62002034"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2020CDCGRJ072"],"award-info":[{"award-number":["2020CDCGRJ072"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2020CDJQY-A021"],"award-info":[{"award-number":["2020CDJQY-A021"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1109\/tr.2021.3061618","type":"journal-article","created":{"date-parts":[[2021,3,17]],"date-time":"2021-03-17T19:41:00Z","timestamp":1616010060000},"page":"1294-1308","source":"Crossref","is-referenced-by-count":10,"title":["The Impact of Duplicate Changes on Just-in-Time Defect Prediction"],"prefix":"10.1109","volume":"71","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0192-5852","authenticated-orcid":false,"given":"Ruifeng","family":"Duan","sequence":"first","affiliation":[{"name":"School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3664-3097","authenticated-orcid":false,"given":"Haitao","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5234-0152","authenticated-orcid":false,"given":"Yuanrui","family":"Fan","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Meng","family":"Yan","sequence":"additional","affiliation":[{"name":"School of Big Data and Software Engineering, Chongqing University, Chongqing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.103"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.93"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.56"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70773"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1002\/bltj.2229"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.70"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9400-x"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.2978819"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070510"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.35"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.83"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2543218"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2009.5069475"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238169"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2012.6405273"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.03.007"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2929761"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330225"},{"key":"ref19","volume-title":"Applied Logistic Regression","author":"Hosmer"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1023\/A:I0I0933404324"},{"issue":"2","key":"ref21","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1023\/A:1007413511361","article-title":"On the optimality of the simple Bayesian classifier under zero-one loss","volume":"29","author":"Domingos","year":"1997","journal-title":"Mach. Learn."},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.50"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/16.5.412"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2836442"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2017.51"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106257"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3003898"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1082983.1083147"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2015.14"},{"key":"ref30","first-page":"560","volume-title":"Proc. IEEE\/ACM 40th Int. Conf. Softw. Eng.","author":"McIntosh","year":"2018"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950353"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882308"},{"key":"ref33","first-page":"121","volume-title":"Proc. 7th Joint Meeting Eur. Softw. Eng. Conf.","author":"Bird","year":"2009"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985859"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606585"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2616306"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1868328.1868336"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2009.5069475"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806855"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/MAINT.2018.8323089"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3417927"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3417048"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3183519.3183547"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1002\/0470011815.b2a15150"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.2307\/1402731"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1198\/tech.2003.s158"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.4"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2891758"},{"issue":"arXiv:1801.10269","key":"ref49","article-title":"The impact of class rebalancing techniques on the performance and interpretation of defect prediction models","author":"Tantithamthavorn","year":"2018"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238169"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.2307\/3001968"},{"key":"ref52","first-page":"103","article-title":"The Bonferonni and Sidak corrections for multiple comparisons","volume":"3","author":"Abdi","year":"2007","journal-title":"Encyclopedia Meas. Statist."},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00016"},{"key":"ref54","doi-asserted-by":"crossref","DOI":"10.4324\/9781315806730","volume-title":"Ordinal Methods for Behavioral Data Analysis","author":"Cliff","year":"2014"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2584050"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2794977"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.4"},{"key":"ref58","article-title":"On software release engineering","volume-title":"ICSE Technical Briefing","author":"Adams","year":"2012"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2011.2161285"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1002\/eap.2043"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-019-09772-z"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.19"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/24\/9872066\/09380201.pdf?arnumber=9380201","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T23:27:53Z","timestamp":1704842873000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9380201\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9]]},"references-count":62,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tr.2021.3061618","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"value":"0018-9529","type":"print"},{"value":"1558-1721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9]]}}}