{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T15:34:48Z","timestamp":1775057688946,"version":"3.50.1"},"reference-count":81,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100010261","name":"Ministry of Science and Technology, Taiwan","doi-asserted-by":"publisher","award":["MOST 108-2221-E-007-033-MY3"],"award-info":[{"award-number":["MOST 108-2221-E-007-033-MY3"]}],"id":[{"id":"10.13039\/501100010261","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010261","name":"Ministry of Science and Technology, Taiwan","doi-asserted-by":"publisher","award":["MOST 110-2221-E-007-035-MY3"],"award-info":[{"award-number":["MOST 110-2221-E-007-035-MY3"]}],"id":[{"id":"10.13039\/501100010261","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1109\/tr.2021.3105531","type":"journal-article","created":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T19:57:39Z","timestamp":1631217459000},"page":"1621-1640","source":"Crossref","is-referenced-by-count":30,"title":["A Study of Incorporation of Deep Learning Into Software Reliability Modeling and Assessment"],"prefix":"10.1109","volume":"70","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1325-4961","authenticated-orcid":false,"given":"Cheng-Yang","family":"Wu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4931-4572","authenticated-orcid":false,"given":"Chin-Yu","family":"Huang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.3354\/cr030079"},{"key":"ref72","author":"conte","year":"1986","journal-title":"Software Engineering Metrics and Models"},{"key":"ref71","article-title":"Software Engineering - Product Quality - Part 1: Quality Model","year":"2001"},{"key":"ref70","author":"lyu","year":"1996","journal-title":"Handbook of Software Reliability Engineering"},{"key":"ref76","author":"fenton","year":"1998","journal-title":"Software Metrics A Rigorous and Practical Approach"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/32.852743"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.232177"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/0169-2070(93)90079-3"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1080\/00207729208949452"},{"key":"ref75","author":"keller","year":"1999","journal-title":"Statistics for Management and Economics"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/METRIC.2001.915512"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9102-8"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/0026-2714(83)91372-0"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TR.1979.5220566"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.232177"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2003.1261119"},{"key":"ref37","first-page":"230","article-title":"A logarithmic poisson execution time model for software reliability measurement","author":"musa","year":"0","journal-title":"Proc 7th Int Conf Softw Eng"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.232179"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TR.1983.5221735"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45587-2_10"},{"key":"ref60","author":"goodfellow","year":"2016","journal-title":"Deep Learning"},{"key":"ref62","first-page":"1","article-title":"Rectifier nonlinearities improve neural network acoustic models","author":"maas","year":"0","journal-title":"Proc 30th Int Conf Mach Learn"},{"key":"ref61","first-page":"807","article-title":"Rectified linear units improve restricted Boltzmann machines","author":"nair","year":"0","journal-title":"Proc 27th Int Conf Mach Learn"},{"key":"ref28","first-page":"197","author":"platen","year":"1999","journal-title":"An Introduction to Numerical Methods for Differential Equations"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2014.2315966"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1080\/00207728008967053"},{"key":"ref64","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1038\/323533a0","article-title":"Learning representations by back-propagating errors","volume":"323","author":"rumelhart","year":"1986","journal-title":"Nature"},{"key":"ref65","first-page":"21","article-title":"A theoretical framework for back-propagation","author":"lecun","year":"1988","journal-title":"Proc Connectionist Models Summer Sch"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1198\/01621450338861947"},{"key":"ref66","article-title":"Eclipse bugzilla","year":"2016"},{"key":"ref67","article-title":"Linux kernel bugzilla","year":"2016"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/32.90433"},{"key":"ref2","author":"musa","year":"1998","journal-title":"Software Reliability Engineering More Reliable Software Faster Development and Testing"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1002\/qre.2653"},{"key":"ref1","article-title":"AIAA software reliability engineering recommended practice","year":"1992"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2016.05.003"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/32.148475"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.1991.145366"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.1996.558886"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/24.273589"},{"key":"ref26","first-page":"823","article-title":"Time-Discretization solution of stochastic differential equations","author":"yannios","year":"1996","journal-title":"Computational Techniques and Applications CTAC95"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/24.46489"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2004.03.028"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2004.02.028"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1093\/mnras\/stt346"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1002\/acs.4480090207"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2006.06.017"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.01.043"},{"key":"ref55","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/j.ress.2013.05.021","article-title":"A dynamic particle filter-support vector regression method for reliability prediction","volume":"119","author":"zhao","year":"2013","journal-title":"Rel Eng and System Safety"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.87"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1002\/qre.1216"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2007.903269"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2014.09.003"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.21236\/ADA139240"},{"key":"ref11","article-title":"Deep belief networks","year":"2009"},{"key":"ref12","first-page":"8599","article-title":"New types of deep neural network learning for speech recognition and related applications: An overview","author":"li","year":"2013","journal-title":"Proc IEEE Int Conf Acoust Speech Signal Process"},{"key":"ref13","first-page":"115","article-title":"Learning precise timing with LSTM recurrent networks","volume":"3","author":"gers","year":"2002","journal-title":"J Mach Learn Res"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCT.2014.7001468"},{"key":"ref15","first-page":"589","article-title":"Time series analysis for bug number prediction","author":"wu","year":"2010","journal-title":"Proc 2nd Int Conf Softw Eng Data Mining"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2017.42"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2017.24"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29044-2"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68612-7_8"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1183936"},{"key":"ref80","author":"cook","year":"1979","journal-title":"Quasi-Experimentation Design and analysis issues for field settings"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1142\/SQRES"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1147\/rd.284.0428"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2013.50"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1561\/2200000006"},{"key":"ref8","article-title":"Explained: Neural networks","author":"hardesty","year":"2017"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2006.04.007"},{"key":"ref7","article-title":"Weighted combinations of deep-learning based models for software reliability analysis","author":"wu","year":"2019"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-42054-2_58"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.9"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1145\/2970276.2970326","article-title":"Deep Learning Code Fragments for Code Clone Detection","author":"martin white","year":"2016","journal-title":"IEEE\/ACM Int Conference on Automated Software Engineering (ASE)"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884804"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2016.2633264"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.1991.155316"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.21236\/ADA123421"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2815021.2815030"},{"key":"ref43","first-page":"1","article-title":"A study on software reliability prediction based on triple exponential smoothing method","author":"wang","year":"0","journal-title":"Proc Summer Simul Multiconf"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/24\/9629389\/09534718.pdf?arnumber=9534718","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,31]],"date-time":"2022-01-31T22:10:23Z","timestamp":1643667023000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9534718\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":81,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tr.2021.3105531","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"value":"0018-9529","type":"print"},{"value":"1558-1721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]}}}