{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T00:49:19Z","timestamp":1772930959301,"version":"3.50.1"},"reference-count":112,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Hong Kong RGC Projects","award":["PolyU15223918"],"award-info":[{"award-number":["PolyU15223918"]}]},{"name":"Hong Kong RGC Projects","award":["PolyU15224121"],"award-info":[{"award-number":["PolyU15224121"]}]},{"name":"HKPolyU Start-up Fund"},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972359"],"award-info":[{"award-number":["61972359"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61831022"],"award-info":[{"award-number":["61831022"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Zhejiang Provincial Natural Science Foundation of China","award":["LY19F020052"],"award-info":[{"award-number":["LY19F020052"]}]},{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-2046953"],"award-info":[{"award-number":["CCF-2046953"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2023,4,1]]},"DOI":"10.1109\/tse.2022.3178096","type":"journal-article","created":{"date-parts":[[2022,5,26]],"date-time":"2022-05-26T19:37:31Z","timestamp":1653593851000},"page":"1464-1486","source":"Crossref","is-referenced-by-count":6,"title":["Towards Automatically Localizing Function Errors in Mobile Apps With User Reviews"],"prefix":"10.1109","volume":"49","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1457-6329","authenticated-orcid":false,"given":"Le","family":"Yu","sequence":"first","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong"}]},{"given":"Haoyu","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9082-3208","authenticated-orcid":false,"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6272-4069","authenticated-orcid":false,"given":"Tao","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Macau University of Science and Technology, Macao, China"}]},{"given":"Kang","family":"Liu","sequence":"additional","affiliation":[{"name":"Institute of Automation, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Jiachi","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Software Engineering, Sun Yat-Sen University, Guangzhou, China"}]},{"given":"Hao","family":"Zhou","sequence":"additional","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5677-4564","authenticated-orcid":false,"given":"Yutian","family":"Tang","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, ShanghaiTech University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4797-4294","authenticated-orcid":false,"given":"Xusheng","family":"Xiao","sequence":"additional","affiliation":[{"name":"Department of Computer and Data Sciences, Case Western Reserve University, Cleveland, OH, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2630689"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2016.11.027"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2013.6636712"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332475"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2488202"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.57"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2013.6624001"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606604"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2014.6912257"},{"key":"ref10","first-page":"749","article-title":"Mining user opinions in mobile app reviews: A keyword-based approach (t)","volume-title":"Proc. 30th IEEE\/ACM Int. Conf. Autom. Softw. Eng.","author":"Vu"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2766462.2767759"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568263"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.18"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2956941"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.2967383"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330198"},{"key":"ref17","article-title":"Android statistics (2021)","year":"2021"},{"key":"ref18","article-title":"Number of Android apps on Google Play","year":"2021"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2018.00051"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-016-0251-9"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2015.7320414"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2014.50"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2017.7884612"},{"key":"ref26","article-title":"Link inside webpage always return \u201d404 not found\u201d error if opened from webview Android Java","author":"Sarif","year":"2020"},{"key":"ref27","article-title":"How can I check from Android webview if a page is a \u201d404 page not found\u201d?","year":"2020"},{"key":"ref28","article-title":"Socket","year":"2020"},{"key":"ref29","article-title":"Natural language toolkit","author":"Bird","year":"2017"},{"key":"ref30","article-title":"Levenshtein distance","author":"Gilleland","year":"2017"},{"key":"ref31","first-page":"449","article-title":"Generating typed dependency parses from phrase structure parses","volume-title":"Proc. 5th Int. Conf. Lang. Resour. Eval.","author":"De Marneffe"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3115\/1608858.1608859"},{"key":"ref33","article-title":"N-gram-based text categorization","author":"Cavnar","year":"1994"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1080\/18756891.2009.9727668"},{"key":"ref35","article-title":"TF-IDF weighting","author":"Group","year":"2009"},{"key":"ref36","article-title":"What are n-grams?","author":"Text Mining","year":"2017"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2656.2008.01390.x"},{"key":"ref38","article-title":"What are the advantages\/disadvantages of using gradient boosting over random forests?","author":"Sharma","year":"2015"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-02145-9"},{"key":"ref40","first-page":"452","article-title":"Opinion mining and sentiment analysis","volume-title":"Proc. 3rd Int. Conf. Comput. Sustain. Global Develop.","author":"Bakshi"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332508"},{"key":"ref42","article-title":"Python 3 wrapper for sentistrength","author":"Hung","year":"2021"},{"key":"ref44","article-title":"Retirement of AlchemyAPI service","author":"Devarajan","year":"2017"},{"key":"ref45","article-title":"Stanford CoreNLP","year":"2020"},{"key":"ref47","article-title":"Adversative coordinating conjunctions","author":"Dnyanoba","year":"2019"},{"key":"ref48","article-title":"Conjunction","author":"Singh","year":"2018"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332474"},{"key":"ref50","article-title":"F-droid","year":"2020"},{"key":"ref51","article-title":"Github","year":"2020"},{"key":"ref52","article-title":"APKMonk: One stop for all Android apps","year":"2020"},{"key":"ref53","article-title":"Apkpure","year":"2020"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2015.25"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.48"},{"key":"ref56","article-title":"ProGuard: Open source optimizer for Java and kotlin","year":"2020"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3290353"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594299"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"ref60","article-title":"Best practice for displaying error messages","year":"2013"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2465386"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23465"},{"key":"ref63","article-title":"Java 14 m model","author":"Alon","year":"2020"},{"key":"ref64","article-title":"GATOR: Program analysis toolkit for Android","author":"Yan","year":"2020"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/2581122.2544159"},{"key":"ref66","article-title":"Project guidelines","year":"2020"},{"key":"ref67","article-title":"Android naming convention","author":"Ahmed","year":"2020"},{"key":"ref68","article-title":"word2vec explained: Deriving mikolov et al.s negative-sampling word-embedding method","author":"Goldberg","year":"2014"},{"key":"ref69","article-title":"Efficient estimation of word representations in vector space","author":"Mikolov","year":"2013"},{"key":"ref70","first-page":"746","article-title":"Linguistic regularities in continuous space word representations","volume-title":"Proc. Conf. North Amer. Chapter Assoc. Comput. Linguistics, Hum. Lang. Technol.","author":"Mikolov"},{"key":"ref71","article-title":"word2vec","year":"2017"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660287"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME52107.2021.00058"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.67"},{"key":"ref77","article-title":"Top 10 sites to ask all your programming questions","author":"Ashutosh","year":"2017"},{"key":"ref78","article-title":"stackexchange","year":"2020"},{"key":"ref79","article-title":"Javalang 0.13.0","author":"Thunes","year":"2020"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2008.35"},{"key":"ref83","article-title":"The strange art of writing app release notes","year":"2017"},{"key":"ref84","article-title":"Soot-A Java bytecode optimization framework","volume-title":"Proc. Conf. Centre Adv. Stud. Collaborative Res.","author":"Vall\u00e9e-Rai"},{"key":"ref85","article-title":"A tool for reverse engineering Android apk files","year":"2022"},{"key":"ref86","article-title":"Basic IOS mobile app reverse engineering","author":"Damian","year":"2021"},{"key":"ref87","article-title":"IOS tampering and reverse engineering","year":"2022"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24100"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2017.0-134"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1145\/3439726"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.3038681"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1145\/1940761.1940859"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/MobileSoft.2015.8"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813689"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950299"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/RE48521.2020.00057"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1198\/016214506000000302"},{"key":"ref101","volume-title":"Modern Information Retrieval","author":"Baeza-Yates","year":"1999"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2983938"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330252"},{"key":"ref104","article-title":"UI\/application exerciser monkey","year":"2020"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931054"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2615307"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23140"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978422"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24177-7_15"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.40"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2687880"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2806891"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057166"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1145\/2808117.2808125"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2639339"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568301"},{"key":"ref117","first-page":"993","article-title":"UIPicker: User-input privacy identification in mobile applications","volume-title":"Proc. 24th USENIX Conf. Secur. Symp.","author":"Nan"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693093"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806817"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2730198"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1145\/1131421.1131424"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.55"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2017.28"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/32\/10103953\/9782551-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/10103953\/09782551.pdf?arnumber=9782551","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T03:13:41Z","timestamp":1706757221000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9782551\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,1]]},"references-count":112,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tse.2022.3178096","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,1]]}}}