{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T13:17:44Z","timestamp":1773839864315,"version":"3.50.1"},"reference-count":73,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key R&amp;D Program of China","doi-asserted-by":"publisher","award":["2022YFB2703500"],"award-info":[{"award-number":["2022YFB2703500"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62232014"],"award-info":[{"award-number":["62232014"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272377"],"award-info":[{"award-number":["62272377"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62293501"],"award-info":[{"award-number":["62293501"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62293502"],"award-info":[{"award-number":["62293502"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62032010"],"award-info":[{"award-number":["62032010"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372368"],"award-info":[{"award-number":["62372368"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372367"],"award-info":[{"award-number":["62372367"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Young Talent Fund of Association for Science and Technology in Shaanxi, China"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2024,10]]},"DOI":"10.1109\/tse.2024.3449564","type":"journal-article","created":{"date-parts":[[2024,8,28]],"date-time":"2024-08-28T18:55:06Z","timestamp":1724871306000},"page":"2633-2655","source":"Crossref","is-referenced-by-count":2,"title":["3Erefactor: Effective, Efficient and Executable Refactoring Recommendation for Software Architectural Consistency"],"prefix":"10.1109","volume":"50","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8790-8251","authenticated-orcid":false,"given":"Jingwen","family":"Liu","sequence":"first","affiliation":[{"name":"Ministry of Education Key Laboratory for Intelligent Networks and Network Security, School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9137-4635","authenticated-orcid":false,"given":"Wuxia","family":"Jin","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-5044-6970","authenticated-orcid":false,"given":"Junhui","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1667-8062","authenticated-orcid":false,"given":"Qiong","family":"Feng","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9327-0987","authenticated-orcid":false,"given":"Ming","family":"Fan","sequence":"additional","affiliation":[{"name":"Ministry of Education Key Laboratory for Intelligent Networks and Network Security, School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-3509-3919","authenticated-orcid":false,"given":"Haijun","family":"Wang","sequence":"additional","affiliation":[{"name":"Ministry of Education Key Laboratory for Intelligent Networks and Network Security, School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7600-0934","authenticated-orcid":false,"given":"Ting","family":"Liu","sequence":"additional","affiliation":[{"name":"Ministry of Education Key Laboratory for Intelligent Networks and Network Security, School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Refactoring Object-Oriented Frameworks","author":"Opdyke","year":"1992"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.1265817"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3473924"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3558954"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TechDebt.2019.00027"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/32.895984"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2009.5090042"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1414004.1414019"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2015.105"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2318734"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1143997.1144315"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950317"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2872711"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2020.106332"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678519"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3105037"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/4235.996017"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/32.979986"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/WICSA.2015.15"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9515-3"},{"key":"ref21","volume-title":"Sustainable Structures in Software Implementations by Live Compliance Checking","author":"Knodel","year":"2011"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3616285"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.136"},{"key":"ref24","first-page":"236","article-title":"The impact of design and UML modeling on codebase quality and sustainability","volume-title":"Proc. 28th Annu. Int. Conf. Comput. Sci. Softw. Eng.","author":"Baddreddin","year":"2018"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2019.00037"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3510454.3516861"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.1"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.04.013"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/222124.222136"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606700"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/32.917525"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICSA51549.2021.00024"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2975945.2975946"},{"key":"ref35","volume-title":"Object-Oriented Design Heuristics","author":"Riel","year":"1996"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2016.01.029"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.08.007"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.41"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2932631"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion.2019.00040"},{"key":"ref41","first-page":"758","article-title":"Exploring the architectural impact of possible dependencies in Python software","volume-title":"Proc. 35th IEEE\/ACM Int. Conf. Automated Softw. Eng. (ASE)","author":"Jin","year":"2020"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2022.3171288"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICSA56044.2023.00023"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2465478.2465480"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2577080.2577086"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2928268"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.3024814"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693106"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2007.4362679"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2015.07.005"},{"key":"ref51","volume-title":"Software Architecture in Practice","author":"Bass","year":"2003"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2000.891477"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1999.792498"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2012.167"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC52881.2021.00037"},{"key":"ref56","article-title":"Can ChatGPT understand too? A comparative study on ChatGPT and fine-tuned BERT","author":"Zhong","year":"2023"},{"key":"ref57","article-title":"How robust is GPT-3.5 to predecessors? A comprehensive study on language understanding tasks","author":"Chen","year":"2023"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00023"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00028"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00131"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00021"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.3021736"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985989"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/1276958.1277176"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2011.22"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23716-4_26"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00081"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.1998.693283"},{"key":"ref69","first-page":"1351","article-title":"A new representation and crossover operator for search-based optimization of software modularization","volume-title":"Proc. 4th Annu. Conf. Genetic Evol. Comput. (GECCO)","volume":"2","author":"Harman","year":"2002"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/1068009.1068186"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.01.017"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2009.13"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2004.1281402"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24741-8_9"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/32\/10721226\/10654326.pdf?arnumber=10654326","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T17:29:56Z","timestamp":1729272596000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10654326\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10]]},"references-count":73,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/tse.2024.3449564","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10]]}}}