{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T13:37:10Z","timestamp":1770298630135,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":89,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T00:00:00Z","timestamp":1633910400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,10,11]]},"DOI":"10.1145\/3475716.3475791","type":"proceedings-article","created":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T11:43:50Z","timestamp":1633520630000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["An Empirical Examination of the Impact of Bias on Just-in-time Defect Prediction"],"prefix":"10.1145","author":[{"given":"Jiri","family":"Gesi","sequence":"first","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"given":"Jiawei","family":"Li","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"given":"Iftekhar","family":"Ahmed","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,10,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"\"Ai fairness 360 \" https:\/\/aif360.mybluemix.net\/ accessed: 2021-05-1.  \"Ai fairness 360 \" https:\/\/aif360.mybluemix.net\/ accessed: 2021-05-1."},{"key":"e_1_3_2_1_2_1","unstructured":"\"Open stack data set \" https:\/\/docs.openstack.org\/wallaby\/?_ga=2.205840979.1124305833.1619313296-1069099767.1617679651 accessed: 2020-07-1.  \"Open stack data set \" https:\/\/docs.openstack.org\/wallaby\/?_ga=2.205840979.1124305833.1619313296-1069099767.1617679651 accessed: 2020-07-1."},{"key":"e_1_3_2_1_3_1","unstructured":"\"Openstack \" https:\/\/www.openstack.org\/ accessed: 2021-05-1.  \"Openstack \" https:\/\/www.openstack.org\/ accessed: 2021-05-1."},{"key":"e_1_3_2_1_4_1","unstructured":"\"Qt \" https:\/\/www.qt.io\/ accessed: 2021-05-1.  \"Qt \" https:\/\/www.qt.io\/ accessed: 2021-05-1."},{"key":"e_1_3_2_1_5_1","unstructured":"\"What-if tool \" https:\/\/pair-code.github.io\/what-if-tool\/ accessed: 2021-05-1.  \"What-if tool \" https:\/\/pair-code.github.io\/what-if-tool\/ accessed: 2021-05-1."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338937"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1021\/acscentsci.6b00367"},{"key":"e_1_3_2_1_8_1","volume-title":"Fairness and machine learning: Limitations and opportunities","author":"Barocas S.","year":"2018"},{"key":"e_1_3_2_1_9_1","first-page":"214","volume-title":"Reliability and Security (QRS). IEEE","author":"Bennin K. E.","year":"2016"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294948.1294953"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595716"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409704"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.310.6973.170"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/2987189.2987282"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409697"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3418932"},{"key":"e_1_3_2_1_17_1","volume-title":"Software engineering for fairness: A case study with hyperparameter optimization,\" arXiv preprint arXiv:1905.05786","author":"Chakraborty J.","year":"2019"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1622407.1622416"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2659747"},{"key":"e_1_3_2_1_20_1","article-title":"The impact of mis-labeled changes by szz on just-in-time defect prediction","author":"Fan Y.","year":"2020","journal-title":"IEEE Transactions on Software Engineering"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2011.2161285"},{"key":"e_1_3_2_1_22_1","first-page":"611","volume-title":"IEEE","author":"Ghazikhani A.","year":"2012"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818850"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2372251.2372285"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985456"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2011.0132"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409754"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070510"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.239"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/2819009.2819018"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00016"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380361"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/3060832.3060845"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693087"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568320"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9400-x"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2010.5609530"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2007.80"},{"key":"e_1_3_2_1_39_1","first-page":"33","volume-title":"Defect prediction: Accomplishments and future challenges,\" in 2016 IEEE 23rd international conference on software analysis, evolution, and reengineering (SANER)","author":"Kamei Y.","year":"2016"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.70"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3415295"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70773"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1137983.1138027"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985859"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.66"},{"key":"e_1_3_2_1_46_1","volume-title":"Siamese neural networks for one-shot image recognition,\" in ICML deep learning workshop","author":"Koch G.","year":"2015"},{"issue":"1","key":"e_1_3_2_1_47_1","first-page":"25","article-title":"Handling imbalanced datasets: A review","volume":"30","author":"Kotsiantis S.","year":"2006","journal-title":"GESTS International Transactions on Computer Science and Engineering"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.48"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337225"},{"key":"e_1_3_2_1_50_1","volume-title":"Deep learning,\" nature","author":"LeCun Y."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025156"},{"key":"e_1_3_2_1_52_1","first-page":"318","volume-title":"Reliability and Security (QRS). IEEE","author":"Li J.","year":"2017"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2014.66"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.07.007"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.04.090"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2693980"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3457607"},{"key":"e_1_3_2_1_58_1","first-page":"378","volume-title":"IEEE","author":"Melekhov I.","year":"2016"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1002\/bltj.2229"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9550-0"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2010.25"},{"key":"e_1_3_2_1_62_1","first-page":"148","volume-title":"Learning text similarity with siamese recurrent networks,\" in Proceedings of the 1st Workshop on Representation Learning for NLP","author":"Neculoiu P.","year":"2016"},{"key":"e_1_3_2_1_63_1","volume-title":"Jitline: A simpler, better, faster, finergrained just-in-time defect prediction,\" arXiv preprint arXiv:2103.07068","author":"Pornprasit C.","year":"2021"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0211359"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985860"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491418"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.7326\/M18-1990"},{"key":"e_1_3_2_1_68_1","first-page":"637","volume-title":"Impact of using information gain in software defect prediction models,\" in International Conference on Intelligent Computing","author":"Rana Z. A.","year":"2014"},{"key":"e_1_3_2_1_69_1","unstructured":"J. Romano J. D. Kromrey J. Coraggio and J. Skowronek \"Appropriate statistics for ordinal level data: Should we really be using t-test and cohen'sd for evaluating group differences on the nsse and other surveys \" in annual meeting of the Florida Association of Institutional Research vol. 177 2006.  J. Romano J. D. Kromrey J. Coraggio and J. Skowronek \"Appropriate statistics for ordinal level data: Should we really be using t-test and cohen'sd for evaluating group differences on the nsse and other surveys \" in annual meeting of the Florida Association of Institutional Research vol. 177 2006."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-015-1575-5"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1002\/widm.38"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380403"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.5555\/2819009.2819026"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380400"},{"key":"e_1_3_2_1_75_1","first-page":"401","volume-title":"IEEE","author":"Tramer F.","year":"2017"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1177\/2053951717743530"},{"key":"e_1_3_2_1_77_1","first-page":"733","volume-title":"Revise: A tool for measuring and mitigating bias in visual datasets,\" in European Conference on Computer Vision","author":"Wang A.","year":"2020"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2749964"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2013.2259203"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386252"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.5555\/2976248.2976433"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2876256"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025120"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2015.14"},{"key":"e_1_3_2_1_85_1","volume-title":"Unsupervised traffic accident detection in first-person videos,\" arXiv preprint arXiv:1903.00618","author":"Yao Y.","year":"2019"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597078"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2889061"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595713"},{"key":"e_1_3_2_1_89_1","first-page":"69","volume-title":"Predicting bugs from history,\" in Software evolution","author":"Zimmermann T.","year":"2008"}],"event":{"name":"ESEM '21: ACM \/ IEEE International Symposium on Empirical Software Engineering and Measurement","location":"Bari Italy","acronym":"ESEM '21","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 15th ACM \/ IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3475716.3475791","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3475716.3475791","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:18Z","timestamp":1750193298000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3475716.3475791"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,11]]},"references-count":89,"alternative-id":["10.1145\/3475716.3475791","10.1145\/3475716"],"URL":"https:\/\/doi.org\/10.1145\/3475716.3475791","relation":{},"subject":[],"published":{"date-parts":[[2021,10,11]]},"assertion":[{"value":"2021-10-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}