{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:59:57Z","timestamp":1772042397862,"version":"3.50.1"},"reference-count":68,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902228"],"award-info":[{"award-number":["61902228"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62176069"],"award-info":[{"award-number":["62176069"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U23A20302"],"award-info":[{"award-number":["U23A20302"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100017596","name":"Natural Science Basic Research Program of Shaanxi Province","doi-asserted-by":"publisher","award":["2024JC-YBMS-497"],"award-info":[{"award-number":["2024JC-YBMS-497"]}],"id":[{"id":"10.13039\/501100017596","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1109\/tr.2024.3503688","type":"journal-article","created":{"date-parts":[[2024,12,5]],"date-time":"2024-12-05T14:04:26Z","timestamp":1733407466000},"page":"3412-3426","source":"Crossref","is-referenced-by-count":3,"title":["CFG2AT: Control Flow Graph and Graph Attention Network-Based Software Defect Prediction"],"prefix":"10.1109","volume":"74","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-2671-008X","authenticated-orcid":false,"given":"Haiyang","family":"Liu","sequence":"first","affiliation":[{"name":"School of Computer Science, Shaanxi Normal University, Xi&#x0027;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5999-3658","authenticated-orcid":false,"given":"Zhiqiang","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science, Shaanxi Normal University, Xi&#x0027;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3063-9425","authenticated-orcid":false,"given":"Hongyu","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Big Data and Software Engineering, Chongqing University, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0392-8475","authenticated-orcid":false,"given":"Xiao-Yuan","family":"Jing","sequence":"additional","affiliation":[{"name":"School of Computer Science, Wuhan University, Wuhan, China"}]},{"given":"Jinhui","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Cybersecurity, Northwest Polytechnical University, Xi&#x0027;an, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2877678"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2017.0148"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-024-00424-1"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2322358"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2022.111537"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2009.5306304"},{"key":"ref7","volume-title":"Elements of Software Science","author":"Halstead","year":"1977"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233837"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/32.295895"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(94)90099-X"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/METRIC.1998.731246"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2877612"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2017.42"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00017"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM52516.2021.00009"},{"key":"ref16","first-page":"1037","article-title":"BCFA: Bespoke control flow analysis for CFA at scale","volume-title":"Proc. IEEE\/ACM 42nd Int. Conf. Softw. Eng.","author":"Ramu","year":"2020"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SANER56733.2023.00022"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2017.00019"},{"key":"ref19","first-page":"518","article-title":"CC2Vec: Distributed representations of code changes","volume-title":"Proc. IEEE\/ACM 42nd Int. Conf. Softw. Eng.","author":"Hoang","year":"2020"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2022.3204589"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2021.3074660"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME55016.2022.00042"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3505243"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1049\/sfw2.12064"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00016"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3549165"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3524610.3527910"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/6230953"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.cola.2020.100979"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1002\/smr.2330"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC48747.2019.00041"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2020.3047396"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2020.3040191"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3240469"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2022.107057"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1981.tb00236.x"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICNN.1988.23871"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1989.1.4.541"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1207\/s15516709cog1402_1"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2978386"},{"key":"ref42","article-title":"Semi-supervised classification with graph convolutional networks","author":"Kipf","year":"2016"},{"key":"ref43","first-page":"1","article-title":"Graph attention networks","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Velickovic","year":"2018"},{"key":"ref44","first-page":"1","article-title":"How attentive are graph attention networks?","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Brody"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2021.111108"},{"key":"ref46","volume-title":"Compilers-Principles, Techniques, and Tools","author":"Alfred","year":"2007"},{"key":"ref47","first-page":"1","article-title":"A survivor\u2019s guide to java program analysis with soot","volume":"17","author":"Einarsson","year":"2008","journal-title":"BRICS, Dept. Comput. Sci., Univ. Aarhus, Denmark"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-020-00305-w"},{"key":"ref49","first-page":"1","article-title":"How powerful are graph neural networks?","volume-title":"Proc. 7th Int. Conf. Learn. Representations","author":"Xu","year":"2019"},{"key":"ref50","first-page":"1","article-title":"Gated graph sequence neural networks","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Li","year":"2016"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2836442"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2876537"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-017-0220-7"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1658"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-019-00259-1"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00075"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606584"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2597849"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2780222"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534405"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2018.2847353"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.2307\/3001968"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1995.tb02031.x"},{"key":"ref64","first-page":"1","article-title":"Appropriate statistics for ordinal level data: Should we really be using t-test and cohen\u2019s d for evaluating group differences on the NSSE and other surveys","volume-title":"Proc. Annu. Meeting Florida Assoc. Institutional Res.","author":"Romano","year":"2006"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2023.3295012"},{"key":"ref66","first-page":"9244","article-title":"Gnnexplainer: Generating explanations for graph neural networks","volume-title":"Proc. 33 rd Int. Conf. Neural Inf. Process. Syst.","author":"Ying","year":"2019"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.3023177"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2022.3144348"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/24\/11152618\/10779185.pdf?arnumber=10779185","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T18:32:53Z","timestamp":1766082773000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10779185\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9]]},"references-count":68,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tr.2024.3503688","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"value":"0018-9529","type":"print"},{"value":"1558-1721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9]]}}}