{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T20:02:24Z","timestamp":1778702544943,"version":"3.51.4"},"reference-count":65,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1109\/tr.2022.3158949","type":"journal-article","created":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T19:27:57Z","timestamp":1649186877000},"page":"747-762","source":"Crossref","is-referenced-by-count":47,"title":["Generative Oversampling Methods for Handling Imbalanced Data in Software Fault Prediction"],"prefix":"10.1109","volume":"71","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2087-1666","authenticated-orcid":false,"given":"Santosh Singh","family":"Rathore","sequence":"first","affiliation":[{"name":"Department of Information Technology, ABV-IIITM, Gwalior, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0280-7364","authenticated-orcid":false,"given":"Satyendra Singh","family":"Chouhan","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineeering, Malaviya National Institute of Technology, Jaipur, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dixit Kumar","family":"Jain","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineeering, Malaviya National Institute of Technology, Jaipur, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2681-3387","authenticated-orcid":false,"given":"Aakash Gopal","family":"Vachhani","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineeering, Malaviya National Institute of Technology, Jaipur, India"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2877678"},{"key":"ref2","first-page":"182","article-title":"Assessing practitioner beliefs about software defect prediction","volume-title":"Proc. IEEE\/ACM 42nd Int. Conf. Softw. Eng., Softw. Eng. Pract.","author":"Shrikanth","year":"2020"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2017.0148"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-017-9563-5"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3079841"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.11"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s13748-016-0094-0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2836442"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2876537"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-018-9633-6"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3233\/IDA-2002-6504"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.29099\/ijair.v4i2.152"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/11538059_91"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2008.4633969"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2020.106432"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2017.50"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2731766"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2002.1000348"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2817572"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2011.2161285"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2974527"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2014.11.023"},{"issue":"1","key":"ref24","first-page":"1","article-title":"A systematic literature review of software defect prediction","volume":"1","author":"Wahono","year":"2015","journal-title":"J. Softw. Eng."},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2020.106287"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2015.02.006"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2017.05.043"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.08.004"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-020-04960-1"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.5815\/ijmecs.2020.01.03"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2019.07.003"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.11.008"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-016-9353-3"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2007.28"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.139"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.04.090"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2779849"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.3010013"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2009.2029559"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2012.2226152"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1142\/S0218213018500240"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.03.007"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39787-5_10"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.05.021"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2015.04.045"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.05.035"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2014.2316951"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2945858"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3422622"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.23919\/ChiCC.2018.8483334"},{"key":"ref51","first-page":"594","article-title":"Data augmentation generative adversarial networks","volume-title":"Proc. Intl. Conf. Artif. Neural Netw.","author":"Antoniou","year":"2018"},{"key":"ref52","first-page":"214","article-title":"Wasserstein generative adversarial networks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Arjovsky","year":"2017"},{"key":"ref53","first-page":"5769","article-title":"Improved training of wasserstein GANs","volume-title":"Proc. 31st Int. Conf. Neural Inf. Process. Syst.","author":"Gulrajani","year":"2017"},{"issue":"4","key":"ref54","article-title":"Pattern recognition and machine learning","volume":"4","author":"Bishop","year":"2006"},{"key":"ref55","first-page":"7335","article-title":"Modeling tabular data using conditional GAN","volume":"32","author":"Xu","year":"2019","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref56","article-title":"AEEEM-JIRA-PROMISE","author":"Tong","year":"2019"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1002\/9780471462422.eoct979"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1080\/00220973.1993.9943832"},{"key":"ref59","first-page":"1","article-title":"What does effect size tell you","volume-title":"Simply Psychol.","volume":"1","author":"McLeod","year":"2019"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9079-3"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2016.04.058"},{"key":"ref62","volume-title":"Deep Learning","volume":"1","author":"Goodfellow","year":"2016"},{"issue":"1","key":"ref63","first-page":"281","article-title":"Random search for hyper-parameter optimization","volume":"13","author":"Bergstra","year":"2012","journal-title":"J. Mach. Learn. Res."},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1002\/9781118646106"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/s1874-1029(13)60052-x"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/24\/9787285\/09749774.pdf?arnumber=9749774","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,18]],"date-time":"2024-01-18T00:21:38Z","timestamp":1705537298000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9749774\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6]]},"references-count":65,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tr.2022.3158949","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"value":"0018-9529","type":"print"},{"value":"1558-1721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6]]}}}