{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T04:58:57Z","timestamp":1774673937434,"version":"3.50.1"},"reference-count":64,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2019,7,29]],"date-time":"2019-07-29T00:00:00Z","timestamp":1564358400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSFC Program","award":["61602403"],"award-info":[{"award-number":["61602403"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"name":"National Key Research and Development Program of China","award":["2018YFB1003904"],"award-info":[{"award-number":["2018YFB1003904"]}]},{"name":"Project of Science and Technology Research and Development Program of China Railway Corporation","award":["P2018X002"],"award-info":[{"award-number":["P2018X002"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Softw. Eng. Methodol."],"published-print":{"date-parts":[[2019,7,31]]},"abstract":"<jats:p>\n            Technical debt is a metaphor to reflect the tradeoff software engineers make between short-term benefits and long-term stability. Self-admitted technical debt (SATD), a variant of technical debt, has been proposed to identify debt that is\n            <jats:italic>intentionally introduced<\/jats:italic>\n            during software development, e.g., temporary fixes and workarounds. Previous studies have leveraged human-summarized patterns (which represent n-gram phrases that can be used to identify SATD) or text-mining techniques to detect SATD in source code comments. However, several characteristics of SATD features in code comments, such as vocabulary diversity, project uniqueness, length, and semantic variations, pose a big challenge to the accuracy of pattern or traditional text-mining-based SATD detection, especially for cross-project deployment. Furthermore, although traditional text-mining-based method outperforms pattern-based method in prediction accuracy, the text features it uses are less intuitive than human-summarized patterns, which makes the prediction results hard to explain. To improve the accuracy of SATD prediction, especially for cross-project prediction, we propose a Convolutional Neural Network-- (CNN) based approach for classifying code comments as SATD or non-SATD. To improve the explainability of our model\u2019s prediction results, we exploit the computational structure of CNNs to identify key phrases and patterns in code comments that are most relevant to SATD. We have conducted an extensive set of experiments with 62,566 code comments from 10 open-source projects and a user study with 150 comments of another three projects. Our evaluation confirms the effectiveness of different aspects of our approach and its superior performance, generalizability, adaptability, and explainability over current state-of-the-art traditional text-mining-based methods for SATD classification.\n          <\/jats:p>","DOI":"10.1145\/3324916","type":"journal-article","created":{"date-parts":[[2019,7,29]],"date-time":"2019-07-29T20:55:51Z","timestamp":1564433751000},"page":"1-45","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":124,"title":["Neural Network-based Detection of Self-Admitted Technical Debt"],"prefix":"10.1145","volume":"28","author":[{"given":"Xiaoxue","family":"Ren","sequence":"first","affiliation":[{"name":"Zhejiang University, Zhejiang, China"}]},{"given":"Zhenchang","family":"Xing","sequence":"additional","affiliation":[{"name":"Australian National University, Canberra, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6302-3256","authenticated-orcid":false,"given":"Xin","family":"Xia","sequence":"additional","affiliation":[{"name":"Monash University, Melbourne, VIC, Australia"}]},{"given":"David","family":"Lo","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]},{"given":"Xinyu","family":"Wang","sequence":"additional","affiliation":[{"name":"Zhejiang University, Zhejiang, China"}]},{"given":"John","family":"Grundy","sequence":"additional","affiliation":[{"name":"Monash University, Melbourne, VIC, Australia"}]}],"member":"320","published-online":{"date-parts":[[2019,7,29]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/157710.157715"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985362.1985366"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882362.1882373"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985362.1985370"},{"key":"e_1_2_1_5_1","volume-title":"Managing Software Debt: Building for Inevitable Change (Adobe Reader)","author":"Sterling Chris","unstructured":"Chris Sterling . 2010. Managing Software Debt: Building for Inevitable Change (Adobe Reader) . Addison-Wesley Professional , New York, NY . Chris Sterling. 2010. Managing Software Debt: Building for Inevitable Change (Adobe Reader). Addison-Wesley Professional, New York, NY."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.31"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.72"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1018431.1021443"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2010.44"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9522-4"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2654244"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1181"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P14-1146"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2016.45"},{"key":"e_1_2_1_15_1","unstructured":"Tomas Mikolov Ilya Sutskever Kai Chen Greg S. Corrado and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. In Advances in Neural Information Processing Systems. 3111--3119.   Tomas Mikolov Ilya Sutskever Kai Chen Greg S. Corrado and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. In Advances in Neural Information Processing Systems. 3111--3119."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2016.90"},{"key":"e_1_2_1_17_1","volume-title":"Kingma and Jimmy Ba","author":"Diederik","year":"2014","unstructured":"Diederik P. Kingma and Jimmy Ba . 2014 . Adam : A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014). Diederik P. Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970317"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/505282.505283"},{"key":"e_1_2_1_20_1","volume-title":"Proceedings of the AAAI-98 Workshop on Learning for Text Categorization","volume":"752","author":"McCallum Andrew","year":"1998","unstructured":"Andrew McCallum , Kamal Nigam , 1998 . A comparison of event models for naive bayes text classification . In Proceedings of the AAAI-98 Workshop on Learning for Text Categorization , Vol. 752 . Citeseer, 41--48. Andrew McCallum, Kamal Nigam, et al. 1998. A comparison of event models for naive bayes text classification. In Proceedings of the AAAI-98 Workshop on Learning for Text Categorization, Vol. 752. Citeseer, 41--48."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1162\/153244302760185243"},{"key":"e_1_2_1_22_1","volume-title":"Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining. Springer","author":"Sam Han Eui-Hong","year":"2001","unstructured":"Eui-Hong Sam Han , George Karypis , and Vipin Kumar . 2001 . Text categorization using weight adjusted k-nearest neighbor classification . In Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining. Springer , Berlin, 53--65. Eui-Hong Sam Han, George Karypis, and Vipin Kumar. 2001. Text categorization using weight adjusted k-nearest neighbor classification. In Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining. Springer, Berlin, 53--65."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2008.4493342"},{"key":"e_1_2_1_24_1","volume-title":"Proceedings of the IEEE 7th International Workshop on Managing Technical Debt (MTD'15)","author":"Everton","unstructured":"Everton da S. Maldonado and Emad Shihab. 2015. Detecting and quantifying different types of self-admitted technical debt . In Proceedings of the IEEE 7th International Workshop on Managing Technical Debt (MTD'15) . IEEE, 9--15. Everton da S. Maldonado and Emad Shihab. 2015. Detecting and quantifying different types of self-admitted technical debt. In Proceedings of the IEEE 7th International Workshop on Managing Technical Debt (MTD'15). IEEE, 9--15."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0026256"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.239"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.04.017"},{"key":"e_1_2_1_28_1","volume-title":"A sensitivity analysis of (and practitioners","author":"Zhang Ye","year":"2015","unstructured":"Ye Zhang and Byron Wallace . 2015. A sensitivity analysis of (and practitioners \u2019 guide to) convolutional neural networks for sentence classification. arXiv preprint arXiv:1510.03820 ( 2015 ). Ye Zhang and Byron Wallace. 2015. A sensitivity analysis of (and practitioners\u2019 guide to) convolutional neural networks for sentence classification. arXiv preprint arXiv:1510.03820 (2015)."},{"key":"e_1_2_1_29_1","volume-title":"Proceedings of the International Semantic Web Conference (Posters 8 Demos).","author":"Wohlgenannt Gerhard","year":"2016","unstructured":"Gerhard Wohlgenannt and Filip Minic . 2016 . Using word2vec to build a simple ontology learning system . In Proceedings of the International Semantic Web Conference (Posters 8 Demos). Gerhard Wohlgenannt and Filip Minic. 2016. Using word2vec to build a simple ontology learning system. In Proceedings of the International Semantic Web Conference (Posters 8 Demos)."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.2307\/3001968"},{"key":"e_1_2_1_31_1","volume-title":"Haykin","author":"Haykin Simon S.","year":"2009","unstructured":"Simon S. Haykin , Simon S. Haykin , Simon S. Haykin , and Simon S . Haykin . 2009 . Neural Networks and Learning Machines. Vol. 3 . Pearsons, Upper Saddle River, NJ. Simon S. Haykin, Simon S. Haykin, Simon S. Haykin, and Simon S. Haykin. 2009. Neural Networks and Learning Machines. Vol. 3. Pearsons, Upper Saddle River, NJ."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0031619"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2007.22"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393669"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693087"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/2666036.2666044"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2507288.2507326"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2012.130"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2460999.2461005"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901739.2901742"},{"key":"e_1_2_1_41_1","volume-title":"Proceedings of the 25th International Conference on Software Engineering. IEEE, 125--135","author":"Marcus Andrian","unstructured":"Andrian Marcus and Jonathan I. Maletic . 2003. Recovering documentation-to-source-code traceability links using latent semantic indexing . In Proceedings of the 25th International Conference on Software Engineering. IEEE, 125--135 . Andrian Marcus and Jonathan I. Maletic. 2003. Recovering documentation-to-source-code traceability links using latent semantic indexing. In Proceedings of the 25th International Conference on Software Engineering. IEEE, 125--135."},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1323293.1294276"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.106"},{"key":"e_1_2_1_44_1","volume-title":"Proceedings of the IEEE International Conference on Software Maintenance 2008 (ICSM\u201908)","author":"Malik Haroon","unstructured":"Haroon Malik , Istehad Chowdhury , Hsiao-Ming Tsou , Zhen Ming Jiang , and Ahmed E. Hassan . 2008. Understanding the rationale for updating a function\u2019s comment . In Proceedings of the IEEE International Conference on Software Maintenance 2008 (ICSM\u201908) . IEEE, 167--176. Haroon Malik, Istehad Chowdhury, Hsiao-Ming Tsou, Zhen Ming Jiang, and Ahmed E. Hassan. 2008. Understanding the rationale for updating a function\u2019s comment. In Proceedings of the IEEE International Conference on Software Maintenance 2008 (ICSM\u201908). IEEE, 167--176."},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2007.21"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.5555\/1894525.1894535"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070533"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368123"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950334"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806811"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638947"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970357"},{"key":"e_1_2_1_53_1","first-page":"16","article-title":"Learning to answer questions from image using convolutional neural network","volume":"3","author":"Ma Lin","year":"2016","unstructured":"Lin Ma , Zhengdong Lu , and Hang Li . 2016 . Learning to answer questions from image using convolutional neural network . In AAAI , Vol. 3. 16 . Lin Ma, Zhengdong Lu, and Hang Li. 2016. Learning to answer questions from image using convolutional neural network. In AAAI, Vol. 3. 16.","journal-title":"AAAI"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/361219.361220"},{"key":"e_1_2_1_55_1","first-page":"739","article-title":"Acquiring lexical knowledge from text: A case study","volume":"88","author":"Jacobs Paul S.","year":"1988","unstructured":"Paul S. Jacobs and Uri Zernik . 1988 . Acquiring lexical knowledge from text: A case study . In AAAI , Vol. 88. 739 -- 744 . Paul S. Jacobs and Uri Zernik. 1988. Acquiring lexical knowledge from text: A case study. In AAAI, Vol. 88. 739--744.","journal-title":"AAAI"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.5555\/944919.944966"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390156.1390177"},{"key":"e_1_2_1_58_1","volume-title":"Proceedings of the 48th Annual Meeting of the Association for Computational Linguistics. Association for Computational Linguistics, 384--394","author":"Turian Joseph","year":"2010","unstructured":"Joseph Turian , Lev Ratinov , and Yoshua Bengio . 2010 . Word representations: A simple and general method for semi-supervised learning . In Proceedings of the 48th Annual Meeting of the Association for Computational Linguistics. Association for Computational Linguistics, 384--394 . Joseph Turian, Lev Ratinov, and Yoshua Bengio. 2010. Word representations: A simple and general method for semi-supervised learning. In Proceedings of the 48th Annual Meeting of the Association for Computational Linguistics. Association for Computational Linguistics, 384--394."},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P14-1113"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884862"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.47"},{"key":"e_1_2_1_62_1","volume-title":"Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781","author":"Mikolov Tomas","year":"2013","unstructured":"Tomas Mikolov , Kai Chen , Greg Corrado , and Jeffrey Dean . 2013. Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 ( 2013 ). Tomas Mikolov, Kai Chen, Greg Corrado, and Jeffrey Dean. 2013. Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 (2013)."},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.48"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106238"}],"container-title":["ACM Transactions on Software Engineering and Methodology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324916","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324916","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:23Z","timestamp":1750193243000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324916"}},"subtitle":["From Performance to Explainability"],"short-title":[],"issued":{"date-parts":[[2019,7,29]]},"references-count":64,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,7,31]]}},"alternative-id":["10.1145\/3324916"],"URL":"https:\/\/doi.org\/10.1145\/3324916","relation":{},"ISSN":["1049-331X","1557-7392"],"issn-type":[{"value":"1049-331X","type":"print"},{"value":"1557-7392","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7,29]]},"assertion":[{"value":"2018-06-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-03-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-07-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}