{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T11:17:45Z","timestamp":1777029465242,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":64,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T00:00:00Z","timestamp":1608508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSFC","award":["61972290, U163620068, 61962061, 61562090"],"award-info":[{"award-number":["61972290, U163620068, 61962061, 61562090"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,21]]},"DOI":"10.1145\/3324884.3416583","type":"proceedings-article","created":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T23:39:02Z","timestamp":1611790742000},"page":"871-882","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Detecting and explaining self-admitted technical debts with attention-based neural networks"],"prefix":"10.1145","author":[{"given":"Xin","family":"Wang","sequence":"first","affiliation":[{"name":"Wuhan University, Wuhan, China"}]},{"given":"Jin","family":"Liu","sequence":"additional","affiliation":[{"name":"Wuhan University, Wuhan, China"}]},{"given":"Li","family":"Li","sequence":"additional","affiliation":[{"name":"Monash University, Melbourne, Australia"}]},{"given":"Xiao","family":"Chen","sequence":"additional","affiliation":[{"name":"Monash University, Melbourne, Australia"}]},{"given":"Xiao","family":"Liu","sequence":"additional","affiliation":[{"name":"Deakin University, Geelong, Australia"}]},{"given":"Hao","family":"Wu","sequence":"additional","affiliation":[{"name":"Yunnan University, Kunming, China"}]}],"member":"320","published-online":{"date-parts":[[2021,1,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"2014 Sixth International Workshop on Managing Technical Debt. 1--7.","author":"Alves Nicolli S.R.","unstructured":"Nicolli S.R. Alves, Leilane F. Ribeiro, Vivyane Caires, Thiago S. Mendes, and Rodrigo O. Spinola. 2014. Towards an Ontology of Terms on Technical Debt. In 2014 Sixth International Workshop on Managing Technical Debt. 1--7."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2015.10.008"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2015.04.001"},{"key":"e_1_3_2_1_4_1","volume-title":"2016 IEEE\/ACM 13th Working Conference on Mining Software Repositories (MSR). 315--326","author":"Bavota G.","unstructured":"G. Bavota and B. Russo. 2016. A Large-Scale Empirical Study on Self-Admitted Technical Debt. In 2016 IEEE\/ACM 13th Working Conference on Mining Software Repositories (MSR). 315--326."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00051"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/157710.157715"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2654244"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2020.106270"},{"key":"e_1_3_2_1_9_1","volume-title":"Enhanced Feature Selection Using Word Embeddings for Self-Admitted Technical Debt Identification. In Euromicro Conference on Software Engineering and Advanced Applications.","author":"Flisar Jernej","year":"2018","unstructured":"Jernej Flisar and Vili Podgorelec. 2018. Enhanced Feature Selection Using Word Embeddings for Self-Admitted Technical Debt Identification. In Euromicro Conference on Software Engineering and Advanced Applications."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2933318"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2007.21"},{"key":"e_1_3_2_1_12_1","volume-title":"Gamification: a Game Changer for Managing Technical Debt? A Design Study. arXiv: Software Engineering","author":"Foucault Matthieu","year":"2018","unstructured":"Matthieu Foucault, Xavier Blanc, Margaretanne Storey, Jeanremy Falleri, and Cedric Teyton. 2018. Gamification: a Game Changer for Managing Technical Debt? A Design Study. arXiv: Software Engineering (2018)."},{"key":"e_1_3_2_1_13_1","volume-title":"Sp\u00ednola","author":"Freire S\u00e1vio","year":"2020","unstructured":"S\u00e1vio Freire, Nicolli Rios, Boris Gutierrez, Dar\u00edo Torres, Manoel G. Mendon\u00e7a, Clemente Izurieta, Carolyn B. Seaman, and Rodrigo O. Sp\u00ednola. 2020. Surveying Software Practitioners on Technical Debt Payment Practices and Reasons for not Paying off Debt Items. In EASE. 210--219."},{"key":"e_1_3_2_1_14_1","volume-title":"MAT: A simple yet strong baseline for identifying self-admitted technical debt. arXiv: Software Engineering","author":"Guo Zhaoqiang","year":"2019","unstructured":"Zhaoqiang Guo, Shiran Liu, Jinping Liu, Yanhui Li, Lin Chen, Hongmin Lu, Yuming Zhou, and Baowen Xu. 2019. MAT: A simple yet strong baseline for identifying self-admitted technical debt. arXiv: Software Engineering (2019)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Matthew J. Howard Samir Gupta Lori Pollock and K. Vijay-Shanker. 2013. Automatically mining software-based semantically-similar words from comment-code mappings. In MSR. 377--386.","DOI":"10.1109\/MSR.2013.6624052"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9522-4"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2019.00029"},{"key":"e_1_3_2_1_18_1","volume-title":"Joint Proceedings of the 4th International Workshop on Quantitative Approaches to Software Quality (QuASoQ","volume":"1771","author":"Izurieta Clemente","year":"2016","unstructured":"Clemente Izurieta, Ipek Ozkaya, Carolyn B. Seaman, Philippe Kruchten, Robert L. Nord, Will Snipes, and Paris Avgeriou. 2016. Perspectives on Managing Technical Debt: A Transition Point and Roadmap from Dagstuhl. In Joint Proceedings of the 4th International Workshop on Quantitative Approaches to Software Quality (QuASoQ 2016), Vol. 1771. 84--87."},{"key":"e_1_3_2_1_19_1","volume-title":"Bag of Tricks for Efficient Text Classification. EACL 2017","author":"Joulin Armand","year":"2017","unstructured":"Armand Joulin, Edouard Grave, and Piotr Bojanowski Tomas Mikolov. 2017. Bag of Tricks for Efficient Text Classification. EACL 2017 (2017), 427."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2016.90"},{"key":"e_1_3_2_1_21_1","volume-title":"FaCoY - A Code-to-Code Search Engine. In ICSE","author":"Kim Kisub","year":"2018","unstructured":"Kisub Kim, Dongsun Kim, Tegawend\u00e9 F Bissyand\u00e9, Eunjong Choi, Li Li, Jacques Klein, and Yves Le Traon. 2018. FaCoY - A Code-to-Code Search Engine. In ICSE 2018."},{"key":"e_1_3_2_1_22_1","volume-title":"Automated Testing of Android Apps: A Systematic Literature Review","author":"Kong Pingfan","year":"2018","unstructured":"Pingfan Kong, Li Li, Jun Gao, Kui Liu, Tegawend\u00e9 F Bissyand\u00e9, and Jacques Klein. 2018. Automated Testing of Android Apps: A Systematic Literature Review. IEEE Transactions on Reliability (2018)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2012.167"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2507288.2507326"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3345629.3345630"},{"key":"e_1_3_2_1_26_1","volume-title":"Static Analysis of Android Apps: A Systematic Literature Review. Information and Software Technology","author":"Li Li","year":"2017","unstructured":"Li Li, Tegawend\u00e9 F Bissyand\u00e9, Mike Papadakis, Siegfried Rasthofer, Alexandre Bartel, Damien Octeau, Jacques Klein, and Yves Le Traon. 2017. Static Analysis of Android Apps: A Systematic Literature Review. Information and Software Technology (2017)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2014.12.027"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183440.3183478"},{"key":"e_1_3_2_1_29_1","volume-title":"Wait For It: Identifying \"On-Hold\" Self-Admitted Technical Debt. arXiv: Software Engineering","author":"Maipradit Rungroj","year":"2019","unstructured":"Rungroj Maipradit, Christoph Treude, Hideaki Hata, and Kenichi Matsumoto. 2019. Wait For It: Identifying \"On-Hold\" Self-Admitted Technical Debt. arXiv: Software Engineering (2019)."},{"key":"e_1_3_2_1_30_1","volume-title":"An Empirical Study on the Removal of Self-Admitted Technical Debt. In 2017 IEEE International Conference on Software Maintenance and Evolution (ICSME). 238--248","author":"Maldonado E. D. S.","unstructured":"E. D. S. Maldonado, R. Abdalkareem, E. Shihab, and A. Serebrenik. 2017. An Empirical Study on the Removal of Self-Admitted Technical Debt. In 2017 IEEE International Conference on Software Maintenance and Evolution (ICSME). 238--248."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MTD.2015.7332619"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.09.026"},{"key":"e_1_3_2_1_33_1","volume-title":"Rework Effort Estimation of Self-admitted Technical Debt. In Joint Proceedings of the 4th International Workshop on Quantitative Approaches to Software Quality (QuASoQ 2016)","volume":"1771","author":"Mensah Solomon","year":"2016","unstructured":"Solomon Mensah, Jacky W. Keung, Michael Franklin Bosu, and Kwabena Ebo Bennin. 2016. Rework Effort Estimation of Self-admitted Technical Debt. In Joint Proceedings of the 4th International Workshop on Quantitative Approaches to Software Quality (QuASoQ 2016) Hamilton, New Zealand, December 6, 2016, Vol. 1771. 72--75."},{"key":"e_1_3_2_1_34_1","volume-title":"Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781","author":"Mikolov Tomas","year":"2013","unstructured":"Tomas Mikolov, Kai Chen, Greg Corrado, and Jeffrey Dean. 2013. Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 (2013)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241067.3241068"},{"key":"e_1_3_2_1_36_1","volume-title":"Glove: Global vectors for word representation. In EMNLP. 1532--1543.","author":"Pennington Jeffrey","year":"2014","unstructured":"Jeffrey Pennington, Richard Socher, and Christopher Manning. 2014. Glove: Global vectors for word representation. In EMNLP. 1532--1543."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N18-1202"},{"key":"e_1_3_2_1_38_1","volume-title":"An exploratory study on self-admitted technical debt","author":"Potdar Aniket","unstructured":"Aniket Potdar and Emad Shihab. 2014. An exploratory study on self-admitted technical debt. In ICSME. IEEE, 91--100."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324916"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/2666036.2666044"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.02.056"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"Giancarlo Sierra Ahmad Tahmid Emad Shihab and Nikolaos Tsantalis. 2019. Is Self-Admitted Technical Debt a Good Indicator of Architectural Divergences?. In SANER Xinyu Wang David Lo and Emad Shihab (Eds.). 534--543.","DOI":"10.1109\/SANER.2019.8667999"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13173-019-0087-5"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2013.6613836"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2017.99"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194016500339"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.12.052"},{"key":"e_1_3_2_1_48_1","unstructured":"Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit Llion Jones Aidan N Gomez \u0141ukasz Kaiser and Illia Polosukhin. 2017. Attention is all you need. In Advances in neural information processing systems. 5998--6008."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2008.03.033"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"crossref","unstructured":"Supatsara Wattanakriengkrai Rungroj Maipradit Hideki Hata Morakot Choetkiertikul and Kenichi Matsumoto. 2018. Identifying Design and Requirement Self-Admitted Technical Debt Using N-gram IDF. In IWESEP.","DOI":"10.1109\/IWESEP.2018.00010"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","unstructured":"Supatsara Wattanakriengkrai Napat Srisermphoak Sahawat Sintoplertchaikul Morakot Choetkiertikul Chaiyong Ragkhitwetsagul Thanwadee Sunetnanta Hideaki Hata and Kenichi Matsumoto. 2019. Automatic Classifying Self-Admitted Technical Debt Using N-Gram IDF. (2019) 316--322.","DOI":"10.1109\/APSEC48747.2019.00050"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.72"},{"key":"e_1_3_2_1_53_1","volume-title":"Technical Debt: A Research Roadmap Report on the Eighth Workshop on Managing Technical Debt (MTD 2016","year":"2017","unstructured":"Will, Snipes, Carolyn, Seaman, Ipek, Ozkaya, Clemente, and Izurieta. 2017. Technical Debt: A Research Roadmap Report on the Eighth Workshop on Managing Technical Debt (MTD 2016). Software Engineering Notes Acm Sigsoft (2017)."},{"key":"e_1_3_2_1_54_1","volume-title":"International Journal of Advancements in Computing Technology 4 (10","author":"Xuan Jifeng","year":"2012","unstructured":"Jifeng Xuan, Yan Hu, and Jiang He. 2012. Debt-Prone Bugs: Technical Debt in Software Maintenance. International Journal of Advancements in Computing Technology 4 (10 2012), 453--461."},{"key":"e_1_3_2_1_55_1","volume-title":"Automating change-level self-admitted technical debt determination","author":"Yan Meng","year":"2018","unstructured":"Meng Yan, Xin Xia, Emad Shihab, David Lo, Jianwei Yin, and Xiaohu Yang. 2018. Automating change-level self-admitted technical debt determination. IEEE Transactions on Software Engineering (2018)."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2831232"},{"key":"e_1_3_2_1_57_1","volume-title":"Huy Tu, and Tim Menzies.","author":"Yu Zhe","year":"2020","unstructured":"Zhe Yu, Fahmid Morshed Fahid, Huy Tu, and Tim Menzies. 2020. Identifying Self-Admitted Technical Debts with Jitterbug: A Two-step Approach. CoRR abs\/2002.11049 (2020)."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2017.44"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"crossref","unstructured":"Fiorella Zampetti Alexander Serebrenik and Massimiliano Di Penta. 2018. Was Self-Admitted Technical Debt Removal a Real Removal? An In-Depth Perspective. In MSR.","DOI":"10.1145\/3196398.3196423"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"crossref","unstructured":"Fiorella Zampetti Alexander Serebrenik and Massimiliano Di Penta. 2020. Automatically Learning Patterns for Self-Admitted Technical Debt Removal. In SANER.","DOI":"10.1109\/SANER48275.2020.9054868"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985362.1985366"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2460999.2461005"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.5555\/2639037.2639042"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P16-2034"}],"event":{"name":"ASE '20: 35th IEEE\/ACM International Conference on Automated Software Engineering","location":"Virtual Event Australia","acronym":"ASE '20","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416583","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3416583","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:38Z","timestamp":1750197698000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416583"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,21]]},"references-count":64,"alternative-id":["10.1145\/3324884.3416583","10.1145\/3324884"],"URL":"https:\/\/doi.org\/10.1145\/3324884.3416583","relation":{},"subject":[],"published":{"date-parts":[[2020,12,21]]},"assertion":[{"value":"2021-01-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}