{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T16:21:31Z","timestamp":1778170891043,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,13]],"date-time":"2020-07-13T00:00:00Z","timestamp":1594598400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,13]]},"DOI":"10.1145\/3387904.3389263","type":"proceedings-article","created":{"date-parts":[[2020,9,12]],"date-time":"2020-09-12T20:04:38Z","timestamp":1599941078000},"page":"117-127","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":67,"title":["Duplicate Bug Report Detection Using Dual-Channel Convolutional Neural Networks"],"prefix":"10.1145","author":[{"given":"Jianjun","family":"He","sequence":"first","affiliation":[{"name":"Chongqing University, Chongqing, China"}]},{"given":"Ling","family":"Xu","sequence":"additional","affiliation":[{"name":"Chongqing University, Chongqing, China"}]},{"given":"Meng","family":"Yan","sequence":"additional","affiliation":[{"name":"Chongqing University, Chongqing, China"}]},{"given":"Xin","family":"Xia","sequence":"additional","affiliation":[{"name":"Monash University, Melbourne, VIC, Australia"}]},{"given":"Yan","family":"Lei","sequence":"additional","affiliation":[{"name":"Chongqing University, Chongqing, China"}]}],"member":"320","published-online":{"date-parts":[[2020,9,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1821"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2013.6624026"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1117696.1117704"},{"key":"e_1_3_2_1_4_1","first-page":"405","article-title":"Duplicate bug report detection using machine learning algorithms and automated feedback incorporation","volume":"16","author":"Bagal Prasad V","year":"2019","journal-title":"US Patent App."},{"key":"e_1_3_2_1_5_1","volume-title":"SIGIR 2012 workshop on open source information retrieval. 17","author":"Bia\u0142ecki Andrzej","year":"2012"},{"key":"e_1_3_2_1_6_1","first-page":"993","article-title":"Latent dirichlet allocation","author":"Blei David M","year":"2003","journal-title":"Journal of machine Learning research 3"},{"key":"e_1_3_2_1_7_1","first-page":"990","article-title":"System and method for detection of duplicate bug reports","volume":"9","author":"Bommaraju Satya Prateek","year":"2018","journal-title":"US Patent"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183440.3195092"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3234944.3234949"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2010.52"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950339"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2017.69"},{"key":"e_1_3_2_1_13_1","volume-title":"d.]. Chaff from the Wheat: Characterizing and Determining Valid Bug Reports","author":"Fan Yuanrui"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.05.017"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321639"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2008.4630070"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597128"},{"key":"e_1_3_2_1_19_1","volume-title":"Workshops at the Thirty-Second AAAI Conference on Artificial Intelligence.","author":"Le Hoa T","year":"2018"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the International Conference on Data Mining (DMIN). The Steering Committee of The World Congress in Computer Science, Computer ..., 194","author":"Lee Dean","year":"2016"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2013.17"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCI-CC.2015.7259377"},{"key":"e_1_3_2_1_23_1","volume-title":"Recurrent neural network for text classification with multi-task learning. arXiv preprint arXiv:1605.05101","author":"Liu Pengfei","year":"2016"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1032649.1033450"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Tie-Yan Liu etal 2009. Learning to rank for information retrieval. Foundations and Trends\u00ae in Information Retrieval 3 3 (2009) 225--331.  Tie-Yan Liu et al. 2009. Learning to rank for information retrieval. Foundations and Trends\u00ae in Information Retrieval 3 3 (2009) 225--331.","DOI":"10.1561\/1500000016"},{"key":"e_1_3_2_1_26_1","volume-title":"Deep Learning applied to NLP. arXiv preprint arXiv:1703.03091","author":"Lopez Marc Moreno","year":"2017"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351687"},{"key":"e_1_3_2_1_28_1","volume-title":"word2vec parameter learning explained. arXiv preprint arXiv:1411.2738","author":"Rong Xin","year":"2014"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.32"},{"key":"e_1_3_2_1_30_1","volume-title":"IEEE software 22, 2","author":"Serrano Nicolas","year":"2005"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100061"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806811"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Martin Sundermeyer Ralf Schl\u00fcter and Hermann Ney. 2012. LSTM neural networks for language modeling. In Thirteenth annual conference of the international speech communication association.  Martin Sundermeyer Ralf Schl\u00fcter and Hermann Ney. 2012. LSTM neural networks for language modeling. In Thirteenth annual conference of the international speech communication association.","DOI":"10.21437\/Interspeech.2012-65"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2010.49"},{"key":"e_1_3_2_1_35_1","unstructured":"D Swapna and K Thammi Reddy. 2016. Duplicate Bug Report Detection of User Interface Bugs using Decision Tree Induction and Inverted Index Structure. (2016).  D Swapna and K Thammi Reddy. 2016. Duplicate Bug Report Detection of User Interface Bugs using Decision Tree Induction and Inverted Index Structure. (2016)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2012.48"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368151"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.12.019"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.01.005"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2008.03.044"},{"key":"e_1_3_2_1_41_1","unstructured":"Xiang Zhang Junbo Zhao and Yann LeCun. 2015. Character-level convolutional networks for text classification. In Advances in neural information processing systems. 649--657.  Xiang Zhang Junbo Zhao and Yann LeCun. 2015. Character-level convolutional networks for text classification. In Advances in neural information processing systems. 649--657."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2396761.2396869"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSS.2016.16"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2016EDP7052"}],"event":{"name":"ICPC '20: 28th International Conference on Program Comprehension","location":"Seoul Republic of Korea","acronym":"ICPC '20","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 28th International Conference on Program Comprehension"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387904.3389263","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3387904.3389263","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:37Z","timestamp":1750200097000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387904.3389263"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,13]]},"references-count":43,"alternative-id":["10.1145\/3387904.3389263","10.1145\/3387904"],"URL":"https:\/\/doi.org\/10.1145\/3387904.3389263","relation":{},"subject":[],"published":{"date-parts":[[2020,7,13]]},"assertion":[{"value":"2020-09-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}