{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:31:29Z","timestamp":1759332689901,"version":"3.41.2"},"reference-count":65,"publisher":"World Scientific Pub Co Pte Ltd","issue":"11","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62002107","62172429"],"award-info":[{"award-number":["62002107","62172429"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J CIRCUIT SYST COMP"],"published-print":{"date-parts":[[2023,7,30]]},"abstract":"<jats:p> Engineers use software defect prediction (SDP) to locate vulnerable areas of software. Recently, statement-level SDP has attracted the attention of researchers due to its ability to localize faulty code areas. This paper proposes DP-Tramo, a new model dedicated to improving the state-of-the-art statement-level SDP. We use Clang to extract abstract syntax trees from source code and extract 32 statement-level metrics as static features for each sentence. Then we feed static features and token sequences as inputs to our improved R-Transformer to learn the syntactic and semantic features of the code. Furthermore, we use label smoothing and weighted loss to improve the performance of DP-Tramo. To evaluate DP-Tramo, we perform a 10-fold cross-validation on 119,989 C\/C++ programs selected from Code4Bench. Experimental results show that DP-Tramo can classify the dataset with an average performance of 0.949, 0.602, 0.734 and 0.737 regarding the recall, precision, accuracy and F1-measure, respectively. DP-Tramo outperforms the baseline method on F1-measure by 1.2% while maintaining a high recall rate. <\/jats:p>","DOI":"10.1142\/s0218126623501839","type":"journal-article","created":{"date-parts":[[2022,12,7]],"date-time":"2022-12-07T13:58:38Z","timestamp":1670421518000},"source":"Crossref","is-referenced-by-count":1,"title":["Statement-Level Software Defect Prediction Based on Improved R-Transformer"],"prefix":"10.1142","volume":"32","author":[{"given":"Yulei","family":"Zhu","sequence":"first","affiliation":[{"name":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, P.\u00a0R.\u00a0China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6082-4501","authenticated-orcid":false,"given":"Yufeng","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, P.\u00a0R.\u00a0China"}]},{"given":"Zhenbang","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Computer, National University of Defense Technology, Changsha, P.\u00a0R.\u00a0China"}]}],"member":"219","published-online":{"date-parts":[[2023,1,11]]},"reference":[{"key":"S0218126623501839BIB001","doi-asserted-by":"crossref","first-page":"4626","DOI":"10.1016\/j.eswa.2010.10.024","volume":"38","author":"Catal C.","year":"2011","journal-title":"Expert Syst. Appl."},{"key":"S0218126623501839BIB002","doi-asserted-by":"crossref","first-page":"1825","DOI":"10.1109\/JPROC.2020.2993293","volume":"108","author":"Lin G.","year":"2020","journal-title":"Proc. IEEE"},{"key":"S0218126623501839BIB003","first-page":"363","volume-title":"Proc. 2017 ACM SIGSAC Conf. Computer and Communications Security","author":"Xu X.","year":"2017"},{"key":"S0218126623501839BIB004","first-page":"297","volume-title":"2016 IEEE\/ACM 38th Int. Conf. Software Engineering (ICSE)","author":"Wang S.","year":"2016"},{"key":"S0218126623501839BIB005","doi-asserted-by":"crossref","first-page":"1692","DOI":"10.3390\/app10051692","volume":"10","author":"Li X.","year":"2020","journal-title":"Appl. Sci."},{"key":"S0218126623501839BIB006","doi-asserted-by":"crossref","first-page":"2138","DOI":"10.3390\/app9102138","volume":"9","author":"Pan C.","year":"2019","journal-title":"Appl. Sci."},{"key":"S0218126623501839BIB007","doi-asserted-by":"crossref","first-page":"3289","DOI":"10.1109\/TII.2018.2821768","volume":"14","author":"Lin G.","year":"2018","journal-title":"IEEE Trans. Ind. Inf."},{"key":"S0218126623501839BIB008","first-page":"2539","volume-title":"Proc. 2017 ACM SIGSAC Conf. Computer and Communications Security","author":"Lin G.","year":"2017"},{"key":"S0218126623501839BIB009","doi-asserted-by":"crossref","first-page":"438","DOI":"10.1109\/TDSC.2020.2984505","volume":"19","author":"Liu S.","year":"2022","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"S0218126623501839BIB010","doi-asserted-by":"crossref","first-page":"85","DOI":"10.4236\/jsea.2019.125007","volume":"12","author":"Alsaeedi A.","year":"2019","journal-title":"J. Softw. Eng. Appl."},{"key":"S0218126623501839BIB011","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/j.compeleceng.2018.02.043","volume":"67","author":"Choudhary G. R.","year":"2018","journal-title":"Comput. Electr. Eng."},{"key":"S0218126623501839BIB012","first-page":"1329","volume":"28","author":"Liu S.","year":"2019","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"S0218126623501839BIB014","first-page":"310","volume-title":"2012 Proc. 27th IEEE\/ACM Int. Conf. Automated Software Engineering","author":"Shar L. K.","year":"2012"},{"key":"S0218126623501839BIB015","doi-asserted-by":"crossref","first-page":"590","DOI":"10.1109\/SP.2014.44","volume-title":"2014 IEEE Symp. Security and Privacy","author":"Yamaguchi F.","year":"2014"},{"key":"S0218126623501839BIB016","first-page":"85","volume-title":"Proc. Sixth ACM Conf. Data and Application Security and Privacy","author":"Grieco G.","year":"2016"},{"key":"S0218126623501839BIB017","first-page":"1298","volume-title":"2017 3rd IEEE Int. Conf. Computer and Communications (ICCC)","author":"Wu F.","year":"2017"},{"key":"S0218126623501839BIB018","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1109\/ICST.2010.32","volume-title":"2010 Third Int. Conf. Software Testing, Verification and Validation","author":"Zimmermann T.","year":"2010"},{"key":"S0218126623501839BIB019","doi-asserted-by":"crossref","first-page":"547","DOI":"10.1007\/978-3-319-25159-2_49","volume-title":"Int. Conf. Knowledge Science, Engineering and Management","author":"Peng H.","year":"2015"},{"first-page":"245","volume-title":"KSII the 9th Int. Conf. Internet (ICONI) 2017 Symp.","author":"Lee Y. J.","key":"S0218126623501839BIB020"},{"key":"S0218126623501839BIB021","first-page":"757","volume-title":"2018 17th IEEE Int. Conf. Machine Learning and Applications (ICMLA)","author":"Russell R.","year":"2018"},{"key":"S0218126623501839BIB022","doi-asserted-by":"crossref","first-page":"113156","DOI":"10.1016\/j.eswa.2019.113156","volume":"147","author":"Majd A.","year":"2020","journal-title":"Expert Syst. Appl."},{"key":"S0218126623501839BIB024","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1016\/j.cola.2019.03.006","volume":"53","author":"Majd A.","year":"2019","journal-title":"J. Comput. Lang."},{"key":"S0218126623501839BIB025","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1109\/TSE.2008.35","volume":"34","author":"Lessmann S.","year":"2008","journal-title":"IEEE Trans. Softw. Eng."},{"key":"S0218126623501839BIB026","first-page":"3135702","volume":"2021","author":"Zhong Y.","year":"2021","journal-title":"Math. Probl. Eng."},{"key":"S0218126623501839BIB027","first-page":"1","volume-title":"2010 Int. Conf. Computational Intelligence and Software Engineering","author":"Wang T.","year":"2010"},{"key":"S0218126623501839BIB028","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1109\/QSIC.2012.19","volume-title":"2012 12th Int. Conf. Quality Software","author":"Wang J.","year":"2012"},{"key":"S0218126623501839BIB029","first-page":"260","volume-title":"2013 Ninth Int. Conf. Computational Intelligence and Security","author":"Shuai B.","year":"2013"},{"key":"S0218126623501839BIB030","first-page":"1","volume-title":"2014 Communications Security Conference (CSC 2014)","author":"Shan C.","year":"2014"},{"key":"S0218126623501839BIB031","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1007\/s10664-012-9218-8","volume":"19","author":"Okutan A.","year":"2014","journal-title":"Empir. Softw. Eng."},{"key":"S0218126623501839BIB032","doi-asserted-by":"crossref","first-page":"1015","DOI":"10.1109\/TSE.2016.2550458","volume":"42","author":"Lee T.","year":"2016","journal-title":"IEEE Trans. Softw. Eng."},{"key":"S0218126623501839BIB033","doi-asserted-by":"crossref","first-page":"2763","DOI":"10.1016\/j.aej.2018.01.003","volume":"57","author":"Moustafa S.","year":"2018","journal-title":"Alex. Eng. J."},{"key":"S0218126623501839BIB034","first-page":"355","volume-title":"Computer Science On-line Conf.","author":"Alsawalqah H.","year":"2017"},{"key":"S0218126623501839BIB035","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1016\/j.eswa.2017.04.014","volume":"82","author":"Rathore S. S.","year":"2017","journal-title":"Expert Syst. Appl."},{"key":"S0218126623501839BIB036","first-page":"199","volume":"8","author":"Park M.","year":"2014","journal-title":"Int. J. Softw. Eng. Appl."},{"key":"S0218126623501839BIB037","doi-asserted-by":"crossref","first-page":"145725","DOI":"10.1109\/ACCESS.2019.2945858","volume":"7","author":"Gong L.","year":"2019","journal-title":"IEEE Access"},{"key":"S0218126623501839BIB040","first-page":"874","volume-title":"2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conf. (ITNEC)","volume":"1","author":"Zhang Q.","year":"2020"},{"key":"S0218126623501839BIB041","first-page":"1","volume-title":"2015 First Int. Conf. Reliability Systems Engineering","author":"Cao Q.","year":"2015"},{"key":"S0218126623501839BIB042","doi-asserted-by":"crossref","first-page":"9847","DOI":"10.1007\/s10586-018-1696-z","volume":"22","author":"Manjula C.","year":"2019","journal-title":"Cluster Comput."},{"key":"S0218126623501839BIB043","doi-asserted-by":"crossref","first-page":"626","DOI":"10.1109\/TR.2021.3052510","volume":"70","author":"Chouhan S. S.","year":"2021","journal-title":"IEEE Trans. Reliab."},{"key":"S0218126623501839BIB044","doi-asserted-by":"crossref","first-page":"107139","DOI":"10.1016\/j.measurement.2019.107139","volume":"152","author":"Niu W.","year":"2020","journal-title":"Measurement"},{"key":"S0218126623501839BIB045","first-page":"200","volume-title":"2012 34th Int. Conf. Software Engineering (ICSE)","author":"Hata H.","year":"2012"},{"key":"S0218126623501839BIB047","doi-asserted-by":"crossref","first-page":"e0247444","DOI":"10.1371\/journal.pone.0247444","volume":"16","author":"Munir H. S.","year":"2021","journal-title":"PLoS One"},{"key":"S0218126623501839BIB048","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1016\/j.infsof.2014.07.005","volume":"58","author":"Laradji I. H.","year":"2015","journal-title":"Inf. Softw. Technol."},{"key":"S0218126623501839BIB049","doi-asserted-by":"crossref","first-page":"1744","DOI":"10.1631\/FITEE.1601322","volume":"18","author":"Yu Q.","year":"2017","journal-title":"Front. Inf. Technol. Electron. Eng."},{"key":"S0218126623501839BIB050","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/s10515-016-0194-x","volume":"24","author":"Zhang Z.-W.","year":"2017","journal-title":"Autom. Softw. Eng."},{"key":"S0218126623501839BIB051","first-page":"471","volume":"64","author":"Zhang N.","year":"2020","journal-title":"Comput. Mater. Contin."},{"key":"S0218126623501839BIB052","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/s11219-016-9342-6","volume":"26","author":"Chen L.","year":"2018","journal-title":"Softw. Qual. J."},{"key":"S0218126623501839BIB053","doi-asserted-by":"crossref","first-page":"24184","DOI":"10.1109\/ACCESS.2018.2817572","volume":"6","author":"Huda S.","year":"2018","journal-title":"IEEE Access"},{"key":"S0218126623501839BIB054","doi-asserted-by":"crossref","DOI":"10.1201\/b17461","volume-title":"Software Metrics: A Rigorous and Practical Approach","author":"Fenton N.","year":"2014"},{"key":"S0218126623501839BIB055","first-page":"6000","volume-title":"Advances in Neural Information Processing Systems","volume":"30","author":"Vaswani A.","year":"2017"},{"key":"S0218126623501839BIB057","doi-asserted-by":"crossref","first-page":"127754","DOI":"10.1109\/ACCESS.2019.2938854","volume":"7","author":"Zhou Z.","year":"2019","journal-title":"IEEE Access"},{"key":"S0218126623501839BIB058","first-page":"1","author":"Yan Y.","year":"2022","journal-title":"Neural Process. Lett."},{"key":"S0218126623501839BIB059","doi-asserted-by":"crossref","first-page":"104034","DOI":"10.1016\/j.bspc.2022.104034","volume":"79","author":"Hu Z.","year":"2023","journal-title":"Biomed. Signal Proc. Control"},{"key":"S0218126623501839BIB060","first-page":"21","volume-title":"Proceedings of Machine Translation Summit XVII: Research Track","author":"Di Gangi M. A.","year":"2019"},{"key":"S0218126623501839BIB061","first-page":"6734","volume-title":"ICASSP 2020 \u2014 2020 IEEE Int. Conf. Acoustics, Speech and Signal Processing","author":"Zheng Y.","year":"2020"},{"key":"S0218126623501839BIB064","first-page":"2818","volume-title":"Proc. IEEE Conf. Computer Vision and Pattern Recognition","author":"Szegedy C.","year":"2016"},{"key":"S0218126623501839BIB065","first-page":"4671","volume-title":"Advances in Neural Information Processing Systems","volume":"32","author":"M\u00fcller R.","year":"2019"},{"key":"S0218126623501839BIB066","first-page":"3903","volume-title":"Proc. IEEE\/CVF Conf. Computer Vision and Pattern Recognition","author":"Yuan L.","year":"2020"},{"key":"S0218126623501839BIB067","first-page":"2184","volume-title":"Advances in Neural Information Processing Systems","volume":"33","author":"Zhang Z.","year":"2020"},{"key":"S0218126623501839BIB068","first-page":"2210","volume-title":"Proc. 29th Int. Conf. Computational Linguistics","author":"Liu P.","year":"2022"},{"key":"S0218126623501839BIB069","doi-asserted-by":"crossref","first-page":"1652","DOI":"10.3390\/s20061652","volume":"20","author":"Wu P.","year":"2020","journal-title":"Sensors"},{"key":"S0218126623501839BIB071","doi-asserted-by":"crossref","first-page":"2623","DOI":"10.3390\/s22072623","volume":"22","author":"Park S.","year":"2022","journal-title":"Sensors"},{"key":"S0218126623501839BIB072","doi-asserted-by":"crossref","first-page":"36340","DOI":"10.1109\/ACCESS.2019.2903291","volume":"7","author":"Wang Y.","year":"2019","journal-title":"IEEE Access"},{"key":"S0218126623501839BIB073","doi-asserted-by":"crossref","first-page":"3745","DOI":"10.1109\/TCYB.2020.3013675","volume":"52","author":"Li Y.","year":"2022","journal-title":"IEEE Trans. Cybern."},{"key":"S0218126623501839BIB074","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1007\/978-3-030-42921-8_8","volume-title":"Int. Conf. Information Security and Cryptology","author":"Zhao Y.","year":"2020"}],"container-title":["Journal of Circuits, Systems and Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218126623501839","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,8]],"date-time":"2023-07-08T07:32:14Z","timestamp":1688801534000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S0218126623501839"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,11]]},"references-count":65,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2023,7,30]]}},"alternative-id":["10.1142\/S0218126623501839"],"URL":"https:\/\/doi.org\/10.1142\/s0218126623501839","relation":{},"ISSN":["0218-1266","1793-6454"],"issn-type":[{"type":"print","value":"0218-1266"},{"type":"electronic","value":"1793-6454"}],"subject":[],"published":{"date-parts":[[2023,1,11]]},"article-number":"2350183"}}