{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T00:08:37Z","timestamp":1762560517361,"version":"3.37.3"},"reference-count":73,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62141215","62272220"],"award-info":[{"award-number":["62141215","62272220"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science, Technology and Innovation Commission of Shenzhen Municipality","award":["CJGJZD20200617103001003"],"award-info":[{"award-number":["CJGJZD20200617103001003"]}]},{"name":"Innovative Research Foundation of Ship General Performance","award":["25422207"],"award-info":[{"award-number":["25422207"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1109\/tr.2023.3234982","type":"journal-article","created":{"date-parts":[[2023,1,24]],"date-time":"2023-01-24T18:49:05Z","timestamp":1674586145000},"page":"1648-1662","source":"Crossref","is-referenced-by-count":7,"title":["An Empirical Study of Class Rebalancing Methods for Actionable Warning Identification"],"prefix":"10.1109","volume":"72","author":[{"given":"Xiuting","family":"Ge","sequence":"first","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9930-7111","authenticated-orcid":false,"given":"Chunrong","family":"Fang","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"given":"Tongtong","family":"Bai","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8368-4898","authenticated-orcid":false,"given":"Jia","family":"Liu","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"given":"Zhihong","family":"Zhao","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2884955"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786843"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2810116"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.105"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/502059.502041"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606613"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-014-0169-8"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3239235.3239523"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2016.25"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2010.12.007"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3494521"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597100"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2019.00036"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660339"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2009.45"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2014.81"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1858996.1859013"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368135"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.114134"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.89"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-021-09948-6"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP52600.2021.00020"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510166"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3477220"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2019.02.023"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2836442"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2876537"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2021.3118026"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2022.106899"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/QRS54544.2021.00019"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C.2019.00027"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3002842"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/DSA52907.2021.00012"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1370788.1370801"},{"year":"2022","key":"ref36","article-title":"Findbugs"},{"key":"ref37","first-page":"1","article-title":"Detecting false alarms from automatic static analysis tools: How far are we","volume-title":"Proc. 44th Int. Conf. Softw. Eng.","author":"Hong","year":"2022"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2907070"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1968.1054155"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1972.4309137"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1976.4309523"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-013-5422-z"},{"key":"ref43","first-page":"1","article-title":"KNN approach to unbalanced data distributions: A case study involving information extraction","volume-title":"Proc. Workshop Learn. Imbalanced Datasets","volume":"126","author":"Mani","year":"2003"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48229-6_9"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1976.4309452"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2008.4633969"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/11538059_91"},{"key":"ref49","first-page":"1","article-title":"Oversampling for imbalanced learning based on k-means and smote","volume-title":"Inf. Sci.","volume":"465","author":"Last","year":"2018"},{"key":"ref50","first-page":"10","article-title":"Balancing training data for automated annotation of keywords: A case study","volume-title":"Proc. Conf. Braz. Workshop Bioinf.","author":"Batista","year":"2003"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/1007730.1007735"},{"issue":"2","key":"ref52","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/BF00058655","article-title":"Bagging predictor","volume":"24","author":"Leo","year":"1996","journal-title":"Mach. Learn."},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1997.1504"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2008.2007853"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2009.2029559"},{"issue":"10","key":"ref56","first-page":"1","volume-title":"Using Random Forest to Learn Imbalanced Data","volume":"24","author":"Chao","year":"2004"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2011.2161285"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref59","first-page":"123","article-title":"Naive Bayesian classifier","author":"Leung","year":"2007"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38652-7_2"},{"volume-title":"C4. 5: Programs for Machine Learning","year":"2014","author":"Quinlan","key":"ref61"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1001\/jama.2016.7653"},{"issue":"1","key":"ref63","first-page":"1558","article-title":"Explaining the success of adaboost and random forests as interpolating classifiers","volume":"18","author":"Wyner","year":"2017","journal-title":"J. Mach. Learn. Res."},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.1995.598994"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3383219.3383232"},{"key":"ref66","article-title":"Appropriate statistics for ordinal level data: Should we really be using t-test and Cohens D for evaluating group differences on the NSSE and other surveys?","volume-title":"Proc. Annu. Meeting Florida Assoc. Institutional Res.","volume":"177","author":"Romano","year":"2006"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.114.3.494"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00296-0_5"},{"year":"2022","key":"ref69","article-title":"Scikit-learn"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001409007326"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/1007730.1007733"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115297"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.07.007"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.12.004"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/24\/10339143\/10025506.pdf?arnumber=10025506","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T15:46:45Z","timestamp":1709394405000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10025506\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12]]},"references-count":73,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tr.2023.3234982","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"type":"print","value":"0018-9529"},{"type":"electronic","value":"1558-1721"}],"subject":[],"published":{"date-parts":[[2023,12]]}}}