{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T03:04:35Z","timestamp":1769742275195,"version":"3.49.0"},"reference-count":81,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1909085"],"award-info":[{"award-number":["CCF-1909085"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1909763"],"award-info":[{"award-number":["CCF-1909763"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2023,5,1]]},"DOI":"10.1109\/tse.2023.3252442","type":"journal-article","created":{"date-parts":[[2023,3,3]],"date-time":"2023-03-03T18:21:26Z","timestamp":1677867686000},"page":"3305-3324","source":"Crossref","is-referenced-by-count":3,"title":["Automatically Tagging the \u201cAAA\u201d Pattern in Unit Test Cases Using Machine Learning Models"],"prefix":"10.1109","volume":"49","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2707-120X","authenticated-orcid":false,"given":"Chenhao","family":"Wei","sequence":"first","affiliation":[{"name":"School of Systems and Enterprises, Stevens Institute of Technology, Hoboken, NJ, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3202-3077","authenticated-orcid":false,"given":"Lu","family":"Xiao","sequence":"additional","affiliation":[{"name":"School of Systems and Enterprises, Stevens Institute of Technology, Hoboken, NJ, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9461-4251","authenticated-orcid":false,"given":"Tingting","family":"Yu","sequence":"additional","affiliation":[{"name":"Department of EECS, University of Cincinnati, Cincinnati, OH, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-6229-3602","authenticated-orcid":false,"given":"Xinyu","family":"Chen","sequence":"additional","affiliation":[{"name":"HSBC Software Development (Guangdong) Limited, Guangzhou, Guangdong Province, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7766-441X","authenticated-orcid":false,"given":"Xiao","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Systems and Enterprises, Stevens Institute of Technology, Hoboken, NJ, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1508-7095","authenticated-orcid":false,"given":"Sunny","family":"Wong","sequence":"additional","affiliation":[{"name":"Envestnet, Inc., Berwyn, PA, USA"}]},{"given":"Abigail","family":"Clune","sequence":"additional","affiliation":[{"name":"AGI, Ansys Company, Exton, PA, USA"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/S0065-2458(03)62001-2"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2018.00010"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2011.47"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970340"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-014-9313-0"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2943488"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2006.14"},{"key":"ref52","first-page":"92","article-title":"Refactoring test code","author":"van deursen","year":"2001","journal-title":"Proc 2nd Int Conf Extreme Program Flexible Processes Softw Eng"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3350768.3350775"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3129889"},{"key":"ref10","first-page":"193","article-title":"On the distribution of test smells in open source Android applications: An exploratory study","author":"peruma","year":"2019","journal-title":"Proc 29th Annu Int Conf Comput Sci Softw Eng"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2776152"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/52.951502"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3196398.3196448"},{"key":"ref19","first-page":"98","article-title":"Machine learning basics","volume":"1","author":"goodfellow","year":"2016","journal-title":"Deep Learning"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2005.25"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2342227"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38679-4_37"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s11334-005-0011-3"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICROIT.2014.6798341"},{"key":"ref48","author":"meszaros","year":"2007","journal-title":"xUnit Test Patterns Refactoring Test Code"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.11613\/BM.2012.031"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s11859-007-0038-4"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/NCM.2008.199"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3328833.3328837"},{"key":"ref43","article-title":"Software requirements classification using machine learning algorithms","volume":"22","author":"canedo","year":"2020","journal-title":"Entropy"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2014.19"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2012.167"},{"key":"ref7","volume":"3","author":"masel","year":"1996","journal-title":"Principles of Adsorption and Reaction on Solid Surfaces"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2018.2875843"},{"key":"ref4","article-title":"The arrange, act, and assert (AAA) pattern: A functional approach","author":"eason","year":"2020","journal-title":"Mews"},{"key":"ref3","article-title":"Unit testing and the arrange, act and assert (AAA) pattern","volume":"9","author":"gomes","year":"2017","journal-title":"Speedtest Retrieved"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-3015-2_1"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-7328-9_8"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2015.7320414"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1108\/eb026526"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEM48762.2020.9160225"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3340482.3342744"},{"key":"ref79","first-page":"499","article-title":"Detection of duplicate defect reports using natural language processing","author":"runeson","year":"2007","journal-title":"Proc IEEE 29th Int Conf Softw Eng"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194018500237"},{"key":"ref78","first-page":"42","article-title":"Toward requirements and design traceability using natural language processing","volume":"3","author":"dawood","year":"2018","journal-title":"European Journal of Engineering and Technology Research"},{"key":"ref37","first-page":"3111","article-title":"Distributed representations of words and phrases and their compositionality","author":"mikolov","year":"2013","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref36","article-title":"Efficient estimation of word representations in vector space","author":"mikolov","year":"2013"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194019500074"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2018.3571242"},{"key":"ref30","first-page":"332","article-title":"A review of class imbalance problem","volume":"1","author":"elrahman","year":"2013","journal-title":"Journal of Network and Innovative Computing"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/11428817_45"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3220267.3220286"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3083923"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57141-6_39"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/2381716.2381786"},{"key":"ref2","author":"khorikov","year":"2020","journal-title":"Unit Testing & principles Practices and Patterns"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/267580.267590"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139058452"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D15-1196"},{"key":"ref71","first-page":"4:1","article-title":"Natural language is a programming language: Applying natural language processing to software development","volume":"71","author":"ernst","year":"2017","journal-title":"Proc Int Inform 2nd Summit Adv Program Lang Leibniz"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2019.2892517"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/QiR.2013.6632546"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.301"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1038\/nbt1206-1565"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453105"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.4135\/9781412983433"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070510"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-25465-X_9"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1080\/01431160412331269698"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2009.19"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.114176"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233837"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2017.0148"},{"key":"ref22","article-title":"Benchmarking machine learning technologies for software defect detection","author":"aleem","year":"2015"},{"key":"ref66","first-page":"284","article-title":"Use of relative code churn measures to predict system defect density","author":"nagappan","year":"2005","journal-title":"Proc 27th Int l Conf Software Eng"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.11.006"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/32.295895"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-741252-8.50010-8"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/BF00116251"},{"key":"ref29","article-title":"Class imbalance problem in data mining review","author":"longadge","year":"2013"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2012.6405253"},{"key":"ref62","author":"zhang","year":"2006","journal-title":"Advances in Machine Learning Applications in Software Engineering"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1023\/A:1023760326768"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/32\/10124809\/10058578-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/10124809\/10058578.pdf?arnumber=10058578","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,3]],"date-time":"2024-07-03T17:29:42Z","timestamp":1720027782000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10058578\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,1]]},"references-count":81,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tse.2023.3252442","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,1]]}}}