{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T23:16:04Z","timestamp":1776122164107,"version":"3.50.1"},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Hanyang University, South Korea","award":["HY-202200000003162"],"award-info":[{"award-number":["HY-202200000003162"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1109\/tr.2024.3354965","type":"journal-article","created":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T18:37:11Z","timestamp":1706812631000},"page":"820-834","source":"Crossref","is-referenced-by-count":47,"title":["Software Defect Prediction Based on Deep Representation Learning of Source Code From Contextual Syntax and Semantic Graph"],"prefix":"10.1109","volume":"73","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2179-3869","authenticated-orcid":false,"given":"Ahmed","family":"Abdu","sequence":"first","affiliation":[{"name":"School of Software, Northwestern Polytechnical University, Xi&#x0027;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9931-8849","authenticated-orcid":false,"given":"Zhengjun","family":"Zhai","sequence":"additional","affiliation":[{"name":"School of Software, Northwestern Polytechnical University, Xi&#x0027;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2829-0623","authenticated-orcid":false,"given":"Hakim A.","family":"Abdo","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Hodeidah University, Al-Hudaydah, Yemen"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6151-5935","authenticated-orcid":false,"given":"Redhwan","family":"Algabri","sequence":"additional","affiliation":[{"name":"Research Institute of Engineering and Technology, Hanyang University, Ansan, South Korea"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2018.2804922"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2877612"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2019.2895462"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/math10173120"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2022.3155183"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233837"},{"key":"ref7","volume-title":"Elements of Software Science (Operating and Programming Systems Series)","author":"Halstead","year":"1977"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/32.295895"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693087"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606589"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/32.979986"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/32.689404"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884804"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2017.42"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2019.0149"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2017.00019"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2022.3161581"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3213844"},{"key":"ref19","volume-title":"Compilers: Principles, Techniques, and Tools","volume":"2","author":"Aho","year":"2007"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/24039.24041"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2021.111108"},{"key":"ref22","first-page":"3111","article-title":"Distributed representations of words and phrases and their compositionality","volume-title":"Proc. Int. Conf. Adv. Neural Inf. Process. Syst.","volume":"26","author":"Mikolov","year":"2013"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939754"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-012-9218-8"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2925313"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3360588"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"578","DOI":"10.1145\/3377811.3380389","article-title":"Software visualization and deep transfer learning for effective software defect prediction","volume-title":"Proc. ACM\/IEEE 42nd Int. Conf. Softw. Eng.","author":"Chen","year":"2020"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.35"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2022.3165115"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534371"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.108852"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2021.3060937"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2020.3020238"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070510"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2007.13"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368114"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2003.1251044"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2007.07.040"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9103-7"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CISE.2010.5677057"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606584"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2019.2931559"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2543218"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.3390\/app9102138"},{"key":"ref45","article-title":"A deep tree-based model for software defect prediction","author":"Dam","year":"2018"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.113156"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3436877"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.cola.2020.100979"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/24\/10547161\/10418777.pdf?arnumber=10418777","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T01:02:34Z","timestamp":1733878954000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10418777\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6]]},"references-count":48,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tr.2024.3354965","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"value":"0018-9529","type":"print"},{"value":"1558-1721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6]]}}}