{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T16:32:59Z","timestamp":1778344379057,"version":"3.51.4"},"reference-count":71,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2025,2,23]],"date-time":"2025-02-23T00:00:00Z","timestamp":1740268800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Guangxi Natural Science Foundation of China","award":["2024GXNSFBA010248"],"award-info":[{"award-number":["2024GXNSFBA010248"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62162004, U21A20474"],"award-info":[{"award-number":["62162004, U21A20474"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Softw. Eng. Methodol."],"published-print":{"date-parts":[[2025,3,31]]},"abstract":"<jats:p>\n            <jats:italic>Background<\/jats:italic>\n            :\n            <jats:bold>Code-line-level bugginess identification (CLBI)<\/jats:bold>\n            is an important area within software quality assurance, aiming to pinpoint potential buggy source code lines in a given software product. Recently, two concurrent approaches, GLANCE and DeepLineDP, have showcased impressive performance by respectively leveraging syntactic and semantic features compared with the existing\n            <jats:bold>state-of-the-art (SOTA)<\/jats:bold>\n            approaches in this field.\n            <jats:italic>Problem<\/jats:italic>\n            : Yet, the literature lacks a thorough investigation that fuses these two types of features to enhance CLBI. Such fusion holds the promise of significantly improving the efficacy of identifying defective lines.\n            <jats:italic>Objective<\/jats:italic>\n            : We aim to advance CLBI by fusing syntactic and semantic features, thereby harnessing their respective strengths.\n            <jats:italic>Method<\/jats:italic>\n            : We propose to build a CLBI approach,\n            <jats:bold>booSting DeePLineDP wIth syntaCtic fEatures (SPLICE)<\/jats:bold>\n            , by fusing syntactic features from GLANCE and semantic features from DeepLineDP. SPLICE comprises three variants\u2014SPLICE-S, SPLICE-G, and SPLICE-F\u2014each utilizing a unique line-level sorting approach. We make a comprehensive comparison with the existing SOTA approaches using six performance metrics.\n            <jats:italic>Result<\/jats:italic>\n            : Through an analysis of nine open source projects, our experimental results reveal that SPLICE is competitive with current SOTA CLBI approaches. Notably, SPLICE-F demonstrates superiority over all SOTA CLBI approaches, including GLANCE and DeepLineDP, across all six metrics, indicating a substantial improvement.\n            <jats:italic>Conclusion<\/jats:italic>\n            : This discovery underscores the critical importance of future CLBI research in fusing syntactic and semantic features to construct more effective bugginess identification approaches. It is worth noting that the analysis was conducted within the context of Java programs, which highlights the potential for exploring similar methods in other programming languages in future research.\n          <\/jats:p>","DOI":"10.1145\/3707456","type":"journal-article","created":{"date-parts":[[2024,12,7]],"date-time":"2024-12-07T09:29:32Z","timestamp":1733563772000},"page":"1-43","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Refining Code-Line-Level Bugginess Identification: Getting the Best of Both Worlds by Fusing Syntactic and Semantic Features"],"prefix":"10.1145","volume":"34","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-3725-735X","authenticated-orcid":false,"given":"Yufei","family":"Zhou","sequence":"first","affiliation":[{"name":"Guangxi Normal University, Guilin, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-3518-089X","authenticated-orcid":false,"given":"Haihua","family":"Tang","sequence":"additional","affiliation":[{"name":"Guangxi Normal University, Guilin, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-5189-3304","authenticated-orcid":false,"given":"Longtao","family":"Zhu","sequence":"additional","affiliation":[{"name":"Guangxi Normal University, Guilin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5325-9997","authenticated-orcid":false,"given":"Hao","family":"Ding","sequence":"additional","affiliation":[{"name":"Guangxi Normal University, Guilin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1325-6975","authenticated-orcid":false,"given":"Junyan","family":"Qian","sequence":"additional","affiliation":[{"name":"Guangxi Normal University, Guilin, China"}]}],"member":"320","published-online":{"date-parts":[[2025,2,23]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2022.3144348"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3582572"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.2982385"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC48747.2019.00050"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227135"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594321"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597102"},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970353"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.49"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.113156"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/3447247"},{"key":"e_1_3_2_13_2","first-page":"428","article-title":"On the \u201cnaturalness\u201d of buggy code","author":"Ray B.","year":"2021","unstructured":"B. Ray, V. Hellendoorn, S. Godhane, Z. Tu, A. Bacchelli, and P. T. Devanbu. 2021. On the \u201cnaturalness\u201d of buggy code. In 38th International Conference on Software Engineering (ICSE \u201916), 428\u2013439.","journal-title":"38th International Conference on Software Engineering (ICSE \u201916)"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606613"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.72"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330264"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2017.02.003"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.11.006"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2010.5609530"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSR52588.2021.00049"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238190"},{"key":"e_1_3_2_22_2","first-page":"1135","volume-title":"2016 Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"Ribeiro M. T.","year":"2016","unstructured":"M. T. Ribeiro, S. Singh, and C. Guestrin. 2016. Why should I trust you? Explaining the predictions of any classifier. In 2016 Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 1135\u20131144."},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635875"},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2019.00040"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-020-09848-1"},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-019-09750-5"},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/1251535.1251537"},{"key":"e_1_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME46990.2020.00022"},{"key":"e_1_3_2_29_2","unstructured":"Naplues\/CLBI. Retrieved from https:\/\/github.com\/Naplues\/CLBI"},{"key":"e_1_3_2_30_2","unstructured":"FindBugs\u2014Find Bugs in Java Programs. Retrieved from https:\/\/findbugs.sourceforge.net.\/"},{"key":"e_1_3_2_31_2","unstructured":"PMD. Retrieved from https:\/\/pmd.github.io\/"},{"key":"e_1_3_2_32_2","unstructured":"Error Prone. Retrieved from https:\/\/errorprone.info\/"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.3023177"},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/32.544352"},{"key":"e_1_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.103"},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/3567550"},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.102"},{"key":"e_1_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985860"},{"key":"e_1_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070510"},{"key":"e_1_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368160"},{"key":"e_1_3_2_41_2","unstructured":"Y. Liu Y. Li J. Guo Y. Zhou and B. Xu. 2018. Connecting software metrics across versions to predict defects. arXiv:1712.09835. Retrieved from https:\/\/arxiv.org\/abs\/1712.09835"},{"key":"e_1_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380389"},{"key":"e_1_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950353"},{"key":"e_1_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/2556777"},{"key":"e_1_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2584050"},{"key":"e_1_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2794977"},{"key":"e_1_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-009-9111-2"},{"key":"e_1_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884804"},{"key":"e_1_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-022-06830-5"},{"key":"e_1_3_2_50_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2877612"},{"key":"e_1_3_2_51_2","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001445"},{"key":"e_1_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2017.51"},{"key":"e_1_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.5555\/3295222.3295349"},{"key":"e_1_3_2_54_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.70"},{"key":"e_1_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2010.18"},{"key":"e_1_3_2_56_2","first-page":"424","volume-title":"36th International Conference on Software Engineering (ICSE 2014)","author":"Rahman F.","unstructured":"F. Rahman, S. Khatri, E. T. Barr, and P. Devanbu. Comparing static bug finders and statistical prediction. In 36th International Conference on Software Engineering (ICSE 2014), 424\u2013434."},{"key":"e_1_3_2_57_2","unstructured":"D. P. Kingma and J. Ba. 2014. Adam: A method for stochastic optimization. arXiv:1412.6980. Retrieved from https:\/\/arxiv.org\/abs\/1412.6980"},{"key":"e_1_3_2_58_2","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106290"},{"key":"e_1_3_2_59_2","unstructured":"D. Bahdanau K. Cho and Y. Bengio. 2014. Neural machine translation by jointly learning to align and translate. arXiv:1409.0473. Retrieved from https:\/\/arxiv.org\/abs\/1409.0473"},{"key":"e_1_3_2_60_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-1174"},{"key":"e_1_3_2_61_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00022"},{"key":"e_1_3_2_62_2","unstructured":"Parvez Mahbub and Mohammad Masudur Rahman. 2023. Predicting line-level defects by capturing code contexts with hierarchical transformers. arXiv:2312.11889. Retrieved from https:\/\/arxiv.org\/abs\/2312.11889"},{"key":"e_1_3_2_63_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2877678"},{"key":"e_1_3_2_64_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.113156"},{"key":"e_1_3_2_65_2","first-page":"9","volume-title":"3rd International Workshop on Predictor Models in Software Engineering (PROMISE \u201907)","author":"Thomas Z.","year":"2007","unstructured":"Z. Thomas, R. Premraj, and A. Zeller. 2007. Predicting defects for eclipse. In 3rd International Workshop on Predictor Models in Software Engineering (PROMISE \u201907), 9."},{"key":"e_1_3_2_66_2","unstructured":"yuFeiCode\/SPLICE. Retrieved from https:\/\/github.com\/yuFeiCode\/SPLICE"},{"key":"e_1_3_2_67_2","volume-title":"Elements of Software Science","author":"Halstead M. H.","year":"1977","unstructured":"M. H. Halstead. 1977. Elements of Software Science. Elsevier Science Inc."},{"key":"e_1_3_2_68_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.45"},{"key":"e_1_3_2_69_2","first-page":"321","article-title":"Automated parameter optimization of classification techniques for defect prediction models","author":"Tantithamthavorn C.","year":"2016","unstructured":"C. Tantithamthavorn, S. McIntosh, A. E. Hassan, and K. Matsumoto. 2016. Automated parameter optimization of classification techniques for defect prediction models. In 38th International Conference on Software Engineering (ICSE \u201916), 321\u2013332.","journal-title":"38th International Conference on Software Engineering (ICSE \u201916)"},{"key":"e_1_3_2_70_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8030292"},{"key":"e_1_3_2_71_2","first-page":"1437","volume-title":"35th International Conference on Machine Learning, PMLR","author":"Falkner S.","year":"2018","unstructured":"S. Falkner, A. Klein, and F. Hutter. 2018. BOHB: Robust and efficient hyperparameter optimization at scale. In 35th International Conference on Machine Learning, PMLR, 1437\u20131446."},{"key":"e_1_3_2_72_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2018.2840738"}],"container-title":["ACM Transactions on Software Engineering and Methodology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3707456","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3707456","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:17:38Z","timestamp":1750295858000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3707456"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,23]]},"references-count":71,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,3,31]]}},"alternative-id":["10.1145\/3707456"],"URL":"https:\/\/doi.org\/10.1145\/3707456","relation":{},"ISSN":["1049-331X","1557-7392"],"issn-type":[{"value":"1049-331X","type":"print"},{"value":"1557-7392","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,23]]},"assertion":[{"value":"2024-05-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-07","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-02-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}