{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T07:55:31Z","timestamp":1770537331119,"version":"3.49.0"},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1109\/tr.2022.3193645","type":"journal-article","created":{"date-parts":[[2022,8,9]],"date-time":"2022-08-09T20:34:10Z","timestamp":1660077250000},"page":"846-858","source":"Crossref","is-referenced-by-count":20,"title":["Duplicate Bug Report Detection Using an Attention-Based Neural Language Model"],"prefix":"10.1109","volume":"72","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4056-5359","authenticated-orcid":false,"given":"Montassar Ben","family":"Messaoud","sequence":"first","affiliation":[{"name":"LARODEC, Institut Sup&#x00E9;rieur de Gestion de Tunis, Universit&#x00E9; de Tunis, Tunis, Tunisia"}]},{"given":"Asma","family":"Miladi","sequence":"additional","affiliation":[{"name":"Institut Sup&#x00E9;rieur de Gestion de Sousse, Universit&#x00E9; de Sousse, Sousse, Tunisia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5758-7664","authenticated-orcid":false,"given":"Ilyes","family":"Jenhani","sequence":"additional","affiliation":[{"name":"College of Computer Engineering, Science, Prince Mohammad Bin Fahd University, Dhahran, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6010-7561","authenticated-orcid":false,"given":"Mohamed Wiem","family":"Mkaouer","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology, Rochester, NY, USA"}]},{"given":"Lobna","family":"Ghadhab","sequence":"additional","affiliation":[{"name":"LARODEC, Institut Sup&#x00E9;rieur de Gestion de Tunis, Universit&#x00E9; de Tunis, Tunis, Tunisia"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.191"},{"key":"ref35","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"0","journal-title":"Proc 3rd Int Conf Learn Representations"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.63"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177729586"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D18-1131"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1410"},{"key":"ref14","article-title":"Transformer-based models for question answering on COVID19","author":"ngai","year":"2021","journal-title":"arXiv 2101 11432"},{"key":"ref36","first-page":"2825","article-title":"Scikit-learn: Machine learning in python","volume":"12","author":"pedregosa","year":"2011","journal-title":"J Mach Learn Res"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE5003.2020.00027"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3183440.3195092"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806811"},{"key":"ref33","article-title":"Google's neural machine translation system: Bridging the gap between human and machine translation","author":"wu","year":"2016","journal-title":"CoRR"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3066283"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-011-9164-5"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N19-2020"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-018-9643-4"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICMEW46912.2020.9106044"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2020.101164"},{"key":"ref38","article-title":"RoBERTa: A robustly optimized BERT pretraining approach","author":"liu","year":"2019","journal-title":"CoRR"},{"key":"ref19","first-page":"5998","article-title":"Attention is all you need","author":"vaswani","year":"0","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N18-1202"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.87"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597090"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236065"},{"key":"ref25","article-title":"Automatic bug triage using semi-supervised text classification","author":"xuan","year":"2017"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.11"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100061"},{"key":"ref21","article-title":"Improving language understanding by generative pre-training","author":"radford","year":"2018"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2019.05.007"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-021-10022-4"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2018.00056"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3033045"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3387904.3389263"},{"key":"ref9","first-page":"4171","article-title":"BERT: Pre-training of deep bidirectional transformers for language understanding","author":"devlin","year":"0","journal-title":"Proc Conf North Amer Chapter Assoc Comput Linguistics Hum Lang Technol"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2021.106566"},{"key":"ref3","article-title":"Advaita: Bug duplicity detection system","author":"kumar","year":"2020"},{"key":"ref6","first-page":"165","article-title":"Poster: LWE: LDA refined word embeddings for duplicate bug report detection","author":"budhiraja","year":"0","journal-title":"Proc IEEE\/ACM 40th Int Conf Softw Eng Companion"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2017.69"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/24\/10142050\/09852720.pdf?arnumber=9852720","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T17:57:53Z","timestamp":1687197473000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9852720\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6]]},"references-count":38,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tr.2022.3193645","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"value":"0018-9529","type":"print"},{"value":"1558-1721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6]]}}}