{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T23:31:11Z","timestamp":1775950271293,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":76,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,27]],"date-time":"2020-06-27T00:00:00Z","timestamp":1593216000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,27]]},"DOI":"10.1145\/3377811.3380389","type":"proceedings-article","created":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T18:25:38Z","timestamp":1601576738000},"page":"578-589","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":70,"title":["Software visualization and deep transfer learning for effective software defect prediction"],"prefix":"10.1145","author":[{"given":"Jinyin","family":"Chen","sequence":"first","affiliation":[{"name":"Zhejiang University of Technology, Hangzhou, China"}]},{"given":"Keke","family":"Hu","sequence":"additional","affiliation":[{"name":"Zhejiang University of Technology, Hangzhou, China"}]},{"given":"Yue","family":"Yu","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Hefei, China"}]},{"given":"Zhuangzhi","family":"Chen","sequence":"additional","affiliation":[{"name":"Zhejiang University of Technology, Hangzhou, China"}]},{"given":"Qi","family":"Xuan","sequence":"additional","affiliation":[{"name":"Zhejiang University of Technology, Hangzhou, China"}]},{"given":"Yi","family":"Liu","sequence":"additional","affiliation":[{"name":"Zhejiang University of Technology, Hangzhou, China"}]},{"given":"Vladimir","family":"Filkov","sequence":"additional","affiliation":[{"name":"University of California"}]}],"member":"320","published-online":{"date-parts":[[2020,10]]},"reference":[{"issue":"1","key":"e_1_3_2_1_1_1","first-page":"1","article-title":"A systematic literature review of software defect prediction: research trends, datasets, methods and frameworks","volume":"1","author":"Wahono Romi Satria","year":"2015","unstructured":"Romi Satria Wahono. A systematic literature review of software defect prediction: research trends, datasets, methods and frameworks. Journal of Software Engineering, 1(1):1--16, 2015.","journal-title":"Journal of Software Engineering"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9103-7"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-014-9241-7"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.10.001"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2877678"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2007.07.040"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWBIS.2018.8471701"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2015.02.006"},{"key":"e_1_3_2_1_9_1","first-page":"1","volume-title":"Cluster Computing","author":"Jayanthi R","year":"2018","unstructured":"R Jayanthi and Lilly Florence. Software defect prediction techniques using metrics based on neural network classifier. Cluster Computing, pages 1--12, 2018."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1021\/acs.energyfuels.7b00576"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chemolab.2018.01.008"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2017.2784394"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2842202"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2018.2885684"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2923022"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884804"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2017.42"},{"key":"e_1_3_2_1_18_1","volume-title":"Truyen Tran, John Grundy, Aditya Ghose, Taeksu Kim, and Chul-Joo Kim. A deep tree-based model for software defect prediction. arXiv preprint arXiv:1802.00921","author":"Dam Hoa Khanh","year":"2018","unstructured":"Hoa Khanh Dam, Trang Pham, Shien Wee Ng, Truyen Tran, John Grundy, Aditya Ghose, Taeksu Kim, and Chul-Joo Kim. A deep tree-based model for software defect prediction. arXiv preprint arXiv:1802.00921, 2018."},{"key":"e_1_3_2_1_19_1","first-page":"1097","volume-title":"Advances in neural information processing systems","author":"Krizhevsky Alex","year":"2012","unstructured":"Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hinton. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems, pages 1097--1105, 2012."},{"key":"e_1_3_2_1_20_1","volume-title":"Learning transferable features with deep adaptation networks. arXiv preprint arXiv:1502.02791","author":"Long Mingsheng","year":"2015","unstructured":"Mingsheng Long, Yue Cao, Jianmin Wang, and Michael I Jordan. Learning transferable features with deep adaptation networks. arXiv preprint arXiv:1502.02791, 2015."},{"key":"e_1_3_2_1_21_1","volume-title":"Self-attention generative adversarial networks. arXiv preprint arXiv:1805.08318","author":"Zhang Han","year":"2018","unstructured":"Han Zhang, Ian Goodfellow, Dimitris Metaxas, and Augustus Odena. Self-attention generative adversarial networks. arXiv preprint arXiv:1805.08318, 2018."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693087"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453106"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368114"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486846"},{"key":"e_1_3_2_1_26_1","volume-title":"Elements of software science","author":"Halstead Maurice Howard","year":"1977","unstructured":"Maurice Howard Halstead et al. Elements of software science, volume 7. Elsevier New York, 1977."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233837"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.295895"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.01.004"},{"key":"e_1_3_2_1_30_1","first-page":"364","volume-title":"Using software dependencies and churn metrics to predict field failures: An empirical case study. In null","author":"Nagappan Nachiappan","year":"2007","unstructured":"Nachiappan Nagappan and Thomas Ball. Using software dependencies and churn metrics to predict field failures: An empirical case study. In null, pages 364--373. IEEE, 2007."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070510"},{"key":"e_1_3_2_1_32_1","first-page":"19","volume-title":"Proceedings of the 6th International Conference on Predictive Models in Software Engineering","author":"Ostrand Thomas J","unstructured":"Thomas J Ostrand, Elaine J Weyuker, and Robert M Bell. Programmer-based fault prediction. In Proceedings of the 6th International Conference on Predictive Models in Software Engineering, page 19. ACM, 2010."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025156"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-010-0069-5"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453105"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2724538"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.11.005"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.12.091"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2890733"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR-WCRE.2014.6747166"},{"key":"e_1_3_2_1_41_1","first-page":"540","volume-title":"On the relative value of cross-company and within-company data for defect prediction","author":"Turhan Burak","year":"2009","unstructured":"Burak Turhan, Tim Menzies, Ay\u015fe B Bener, and Justin Di Stefano. On the relative value of cross-company and within-company data for defect prediction. volume 14, pages 540--578. Springer, 2009."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/2487085.2487161"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2543218"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2011.09.007"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486839"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2010.2091281"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1006\/jvlc.1993.1015"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.488299"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.2001.921708"},{"key":"e_1_3_2_1_50_1","volume-title":"Software visualization: visualizing the structure, behaviour, and evolution of software","author":"Diehl Stephan","year":"2007","unstructured":"Stephan Diehl. Software visualization: visualizing the structure, behaviour, and evolution of software. Springer Science & Business Media, 2007."},{"key":"e_1_3_2_1_51_1","first-page":"37","volume-title":"Proceedings of the 4th international workshop on principles of software evolution","author":"Lanza Michele","year":"2001","unstructured":"Michele Lanza. The evolution matrix: Recovering software evolution using software visualization techniques. In Proceedings of the 4th international workshop on principles of software evolution, pages 37--42. ACM, 2001."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11334-005-0019-8"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101941"},{"key":"e_1_3_2_1_54_1","volume-title":"Towards building an intelligent anti-malware system: a deep learning approach using support vector machine (svm) for malware classification. arXiv preprint arXiv:1801.00318","author":"Agarap Abien Fred","year":"2017","unstructured":"Abien Fred Agarap and Francis John Hill Pepito. Towards building an intelligent anti-malware system: a deep learning approach using support vector machine (svm) for malware classification. arXiv preprint arXiv:1801.00318, 2017."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-016-0043-6"},{"key":"e_1_3_2_1_56_1","article-title":"A baseline method for transfer learning","author":"Krishna Rahul","year":"2018","unstructured":"Rahul Krishna and Tim Menzies. Bellwethers: A baseline method for transfer learning. IEEE Transactions on Software Engineering, 2018.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01424-7_27"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273496.1273521"},{"key":"e_1_3_2_1_59_1","first-page":"1535","volume-title":"IJCAI Proceedings-International Joint Conference on Artificial Intelligence","volume":"22","author":"Wan Chang","year":"2011","unstructured":"Chang Wan, Rong Pan, and Jiefei Li. Bi-weighting domain adaptation for cross-language text classification. In IJCAI Proceedings-International Joint Conference on Artificial Intelligence, volume 22, page 1535, 2011."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2669193"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1007\/978-3-319-19258-1_29","volume-title":"Advances in Computational Intelligence","author":"Kandaswamy Chetak","year":"2015","unstructured":"Chetak Kandaswamy, Lu\u00eds M. Silva, Lu\u00eds A. Alexandre, and Jorge M. Santos. Deep transfer learning ensemble for classification. In Ignacio Rojas, Gonzalo Joya, and Andreu Catala, editors, Advances in Computational Intelligence, pages 335--348, Cham, 2015. Springer International Publishing."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.222"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_1_64_1","volume-title":"Domain-adversarial neural networks. arXiv preprint arXiv:1412.4446","author":"Ajakan Hana","year":"2014","unstructured":"Hana Ajakan, Pascal Germain, Hugo Larochelle, Fran\u00e7ois Laviolette, and Mario Marchand. Domain-adversarial neural networks. arXiv preprint arXiv:1412.4446, 2014."},{"key":"e_1_3_2_1_65_1","volume-title":"Unsupervised domain adaptation by back-propagation. arXiv preprint arXiv:1409.7495","author":"Ganin Yaroslav","year":"2014","unstructured":"Yaroslav Ganin and Victor Lempitsky. Unsupervised domain adaptation by back-propagation. arXiv preprint arXiv:1409.7495, 2014."},{"key":"e_1_3_2_1_66_1","volume-title":"Joint geometrical and statistical alignment for visual domain adaptation. arXiv preprint arXiv:1705.05498","author":"Zhang Jing","year":"2017","unstructured":"Jing Zhang, Wanqing Li, and Philip Ogunbona. Joint geometrical and statistical alignment for visual domain adaptation. arXiv preprint arXiv:1705.05498, 2017."},{"key":"e_1_3_2_1_67_1","volume-title":"Deep domain confusion: Maximizing for domain invariance. arXiv preprint arXiv:1412.3474","author":"Tzeng Eric","year":"2014","unstructured":"Eric Tzeng, Judy Hoffman, Ning Zhang, Kate Saenko, and Trevor Darrell. Deep domain confusion: Maximizing for domain invariance. arXiv preprint arXiv:1412.3474, 2014."},{"key":"e_1_3_2_1_68_1","volume-title":"Transferable representation learning with deep adaptation networks","author":"Long Mingsheng","year":"2018","unstructured":"Mingsheng Long, Yue Cao, Zhangjie Cao, Jianmin Wang, and Michael I Jordan. Transferable representation learning with deep adaptation networks. IEEE transactions on pattern analysis and machine intelligence, 2018."},{"key":"e_1_3_2_1_69_1","first-page":"1205","volume-title":"Advances in neural information processing systems","author":"Gretton Arthur","year":"2012","unstructured":"Arthur Gretton, Dino Sejdinovic, Heiko Strathmann, Sivaraman Balakrishnan, Massimiliano Pontil, Kenji Fukumizu, and Bharath K Sriperumbudur. Optimal kernel choice for large-scale two-sample tests. In Advances in neural information processing systems, pages 1205--1213, 2012."},{"key":"e_1_3_2_1_70_1","volume-title":"Deep transfer learning with joint adaptation networks. arXiv preprint arXiv:1605.06636","author":"Long Mingsheng","year":"2016","unstructured":"Mingsheng Long, Han Zhu, Jianmin Wang, and Michael I Jordan. Deep transfer learning with joint adaptation networks. arXiv preprint arXiv:1605.06636, 2016."},{"key":"e_1_3_2_1_71_1","volume-title":"Wasserstein gan. arXiv preprint arXiv:1701.07875","author":"Arjovsky Martin","year":"2017","unstructured":"Martin Arjovsky, Soumith Chintala, and L\u00e9on Bottou. Wasserstein gan. arXiv preprint arXiv:1701.07875, 2017."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/CICYBS.2013.6597204"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASID.2017.8285743"},{"key":"e_1_3_2_1_74_1","volume-title":"An overview of convolutional neural network architectures for deep learning","author":"Murphy John","year":"2016","unstructured":"John Murphy. An overview of convolutional neural network architectures for deep learning. 2016."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2877612"},{"key":"e_1_3_2_1_76_1","volume-title":"Visualizing data using t-sne. Journal of machine learning research, 9(Nov):2579--2605","author":"van der Maaten Laurens","year":"2008","unstructured":"Laurens van der Maaten and Geoffrey Hinton. Visualizing data using t-sne. Journal of machine learning research, 9(Nov):2579--2605, 2008."}],"event":{"name":"ICSE '20: 42nd International Conference on Software Engineering","location":"Seoul South Korea","acronym":"ICSE '20","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","KIISE Korean Institute of Information Scientists and Engineers","IEEE CS"]},"container-title":["Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377811.3380389","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3377811.3380389","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:39Z","timestamp":1750200099000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377811.3380389"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,27]]},"references-count":76,"alternative-id":["10.1145\/3377811.3380389","10.1145\/3377811"],"URL":"https:\/\/doi.org\/10.1145\/3377811.3380389","relation":{},"subject":[],"published":{"date-parts":[[2020,6,27]]},"assertion":[{"value":"2020-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}