{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T21:44:16Z","timestamp":1774129456304,"version":"3.50.1"},"reference-count":195,"publisher":"Association for Computing Machinery (ACM)","issue":"11","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62172214"],"award-info":[{"award-number":["62172214"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001321","name":"National Research Foundation","doi-asserted-by":"crossref","award":["NRF-NRFI08-2022-0002"],"award-info":[{"award-number":["NRF-NRFI08-2022-0002"]}],"id":[{"id":"10.13039\/501100001321","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2025,11,30]]},"abstract":"<jats:p>Bug localization is a crucial aspect of software maintenance, running through the entire software lifecycle. Information retrieval-based bug localization (IRBL) identifies buggy code based on bug reports, expediting the bug resolution process for developers. Recent years have witnessed significant achievements in IRBL, propelled by the widespread adoption of deep learning (DL). To provide a comprehensive overview of the current state of the art and delve into key issues, we conduct a survey encompassing 61 IRBL studies leveraging DL. We summarize best practices in each phase of the IRBL workflow, undertake a meta-analysis of prior studies, and suggest future research directions. This exploration aims to guide further advancements in the field, fostering a deeper understanding and refining practices for effective bug localization. Our study suggests that the integration of DL in IRBL enhances the model\u2019s capacity to extract semantic and syntactic information from both bug reports and source code, addressing issues such as lexical gaps, neglect of code structure information, and cold-start problems. Future research avenues for IRBL encompass exploring diversity in programming languages, adopting fine-grained granularity, and focusing on real-world applications. Most importantly, although some studies have started using large language models for IRBL, there is still a need for more in-depth exploration and thorough investigation in this area.<\/jats:p>\n          <jats:p\/>","DOI":"10.1145\/3734217","type":"journal-article","created":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T11:29:37Z","timestamp":1746444577000},"page":"1-41","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["When Deep Learning Meets Information Retrieval-based Bug Localization: A Survey"],"prefix":"10.1145","volume":"57","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4123-4554","authenticated-orcid":false,"given":"Feifei","family":"Niu","sequence":"first","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9270-5072","authenticated-orcid":false,"given":"Chuanyi","family":"Li","sequence":"additional","affiliation":[{"name":"Software Institute, Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1955-1043","authenticated-orcid":false,"given":"Kui","family":"Liu","sequence":"additional","affiliation":[{"name":"Huawei Technologies Co Ltd, Shenzhen China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6302-3256","authenticated-orcid":false,"given":"Xin","family":"Xia","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4367-7201","authenticated-orcid":false,"given":"David","family":"Lo","sequence":"additional","affiliation":[{"name":"School of Computing and Information Systems, Singapore Management University, Singapore Singapore"}]}],"member":"320","published-online":{"date-parts":[[2025,6,11]]},"reference":[{"key":"e_1_3_3_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAIC.PART.2007.13"},{"key":"e_1_3_3_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/2659118.2659125"},{"key":"e_1_3_3_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.1995.497652"},{"key":"e_1_3_3_5_2","article-title":"AttentiveBugLocator: A bug localization model using attention-based SemanticFeatures and information retrieval","author":"Ahmad Aminu A.","year":"2023","unstructured":"Aminu A. Ahmad, Lasheng Yu, Mohamed Kholief, and Abba Garba. 2023. AttentiveBugLocator: A bug localization model using attention-based SemanticFeatures and information retrieval. Research Square (2023).","journal-title":"Research Square"},{"key":"e_1_3_3_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/3379597.3387474"},{"key":"e_1_3_3_7_2","doi-asserted-by":"publisher","DOI":"10.7753\/IJSEA1201.1035"},{"key":"e_1_3_3_8_2","doi-asserted-by":"publisher","DOI":"10.1002\/smr.2654"},{"key":"e_1_3_3_9_2","first-page":"120","article-title":"Automated software bug localization enabled by meta-heuristic-based convolutional neural network and improved deep neural network","author":"Ali Waqas","year":"2023","unstructured":"Waqas Ali, Lili Bo, Xiaobing Sun, Xiaoxue Wu, Saifullah Memon, Saima Siraj, and Ann Suwaree Ashton. 2023. Automated software bug localization enabled by meta-heuristic-based convolutional neural network and improved deep neural network. Expert Systems with Applications 232, C (2023), 120\u2013562.","journal-title":"Expert Systems with Applications"},{"key":"e_1_3_3_10_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13020321"},{"key":"e_1_3_3_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/APSECW53869.2021.00017"},{"key":"e_1_3_3_12_2","first-page":"177","volume-title":"Proceedings of the 25th ISSTA","author":"Le Tien-Duy B.","year":"2016","unstructured":"Tien-Duy B. Le, David Lo, Claire Le Goues, and Lars Grunske. 2016. A learning-to-rank based fault localization approach using likely invariants. In Proceedings of the 25th ISSTA. 177\u2013188."},{"key":"e_1_3_3_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/1595808.1595830"},{"key":"e_1_3_3_14_2","unstructured":"Dzmitry Bahdanau Kyunghyun Cho and Yoshua Bengio. 2015. Neural machine translation by jointly learning to align and translate. 3rd International Conference on Learning Representations ICLR 2015 San Diego CA USA May 7-9 2015 Conference Track Proceedings (2015) Yoshua Bengio and Yann LeCun (Eds.). Retrieved from http:\/\/arxiv.org\/abs\/1409.0473"},{"key":"e_1_3_3_15_2","first-page":"710","volume-title":"Proceedings of the 2021 8th INDIACom","author":"Baliyan Anupam","year":"2021","unstructured":"Anupam Baliyan, Akshit Batra, and Sunil Pratap Singh. 2021. Multilingual sentiment analysis using RNN-LSTM and neural machine translation. In Proceedings of the 2021 8th INDIACom. IEEE, 710\u2013713."},{"key":"e_1_3_3_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion.2019.00035"},{"key":"e_1_3_3_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/1328279.1328284"},{"key":"e_1_3_3_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453146"},{"key":"e_1_3_3_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/1370750.1370757"},{"key":"e_1_3_3_20_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-022-10371-6"},{"key":"e_1_3_3_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/1454247.1454257"},{"key":"e_1_3_3_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3418934"},{"key":"e_1_3_3_23_2","first-page":"1","article-title":"Applications of deep learning for mobile malware detection: A systematic literature review","author":"Catal Cagatay","year":"2022","unstructured":"Cagatay Catal, G\u00f6rkem Giray, and Bedir Tekinerdogan. 2022. Applications of deep learning for mobile malware detection: A systematic literature review. Neural Computing and Applications (2022), 1\u201326.","journal-title":"Neural Computing and Applications"},{"key":"e_1_3_3_24_2","unstructured":"Partha Chakraborty Mahmoud Alfadel and Meiyappan Nagappan. 2024. BLAZE: Cross-language and cross-project bug localization via dynamic chunking and hard example learning. arXiv:2407.17631. Retrieved from https:\/\/arxiv.org\/abs\/2407.17631. (2024)."},{"key":"e_1_3_3_25_2","article-title":"RLocator: Reinforcement learning for bug localization","author":"Chakraborty Partha","year":"2024","unstructured":"Partha Chakraborty, Mahmoud Alfadel, and Meiyappan Nagappan. 2024. RLocator: Reinforcement learning for bug localization. IEEE TSE 50, 10 (2024), 2695\u20132708.","journal-title":"IEEE TSE"},{"key":"e_1_3_3_26_2","unstructured":"Mahinthan Chandramohan Dai Quoc Nguyen Padmanabhan Krishnan and Jovan Jancic. 2024. Supporting cross-language cross-project bug localization using pre-trained language models. arXiv:2407.02732. Retrieved from https:\/\/arxiv.org\/abs\/2407.02732. (2024)."},{"key":"e_1_3_3_27_2","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"e_1_3_3_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/QRS57517.2022.00033"},{"key":"e_1_3_3_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510042"},{"key":"e_1_3_3_30_2","doi-asserted-by":"publisher","unstructured":"Agnieszka Ciborowska and Kostadin Damevski. 2023. Too few bug reports? Exploring data augmentation for improved changeset-based bug localization. CoRR abs\/2305.16430 (2023). 10.48550\/arXiv.2305.16430","DOI":"10.48550\/arXiv.2305.16430"},{"issue":"3","key":"e_1_3_3_31_2","first-page":"1044","article-title":"Data preparation for software vulnerability prediction: A systematic literature review","volume":"49","author":"Croft Roland","year":"2022","unstructured":"Roland Croft, Yongzheng Xie, and Muhammad Ali Babar. 2022. Data preparation for software vulnerability prediction: A systematic literature review. IEEE TSE 49, 3 (2022), 1044\u20131063.","journal-title":"IEEE TSE"},{"key":"e_1_3_3_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321702"},{"key":"e_1_3_3_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2013.6688891"},{"key":"e_1_3_3_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2012.22"},{"key":"e_1_3_3_35_2","doi-asserted-by":"publisher","unstructured":"Jacob Devlin Ming-Wei Chang Kenton Lee and Kristina Toutanova. 2019. Bert: Pre-training of deep bidirectional transformers for language understanding. In Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies NAACL-HLT 2019 Minneapolis MN USA June 2-7 2019 Volume 1 (Long and Short Papers) Jill Burstein Christy Doran and Thamar Solorio (Eds.). Association for Computational Linguistics 4171\u20134186. 10.18653\/v1\/n19-1423","DOI":"10.18653\/v1\/n19-1423"},{"key":"e_1_3_3_36_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.06.056"},{"key":"e_1_3_3_37_2","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3616338"},{"key":"e_1_3_3_38_2","doi-asserted-by":"publisher","unstructured":"Zhangyin Feng Daya Guo Duyu Tang Nan Duan Xiaocheng Feng Ming Gong Linjun Shou Bing Qin Ting Liu Daxin Jiang and Ming Zhou. 2020. Codebert: A pre-trained model for programming and natural languages. Findings of the AssociaHon for ComputaHonal LinguisHcs: EMNLP 2020 Online Event 16-20 November 2020 (EMNLP\u20192020) Trevor Cohn Yulan He and Yang Liu (Eds.). 1536\u20131547. 10.18653\/v1\/2020.findings-emnlp.139","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"e_1_3_3_39_2","doi-asserted-by":"crossref","unstructured":"Joel Escud\u00e9 Font and Marta R. Costa-Jussa. 2019. Equalizing gender biases in neural machine translation with word embeddings techniques. CoRR abs\/1901.03116 (2019). http:\/\/arxiv.org\/abs\/1901.03116","DOI":"10.18653\/v1\/W19-3821"},{"key":"e_1_3_3_40_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2022.111537"},{"key":"e_1_3_3_41_2","doi-asserted-by":"publisher","unstructured":"Daya Guo Shuai Lu Nan Duan Yanlin Wang Ming Zhou and Jian Yin. 2022. Unixcoder: Unified cross-modal pre-training for code representation. In Proceedings of the 60th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers) Smaranda Muresan Preslav Nakov and Aline Villavicencio (Eds.). Association for Computational Linguistics 7212\u20137225. 10.18653\/v1\/2022.acl-long.499","DOI":"10.18653\/v1\/2022.acl-long.499"},{"key":"e_1_3_3_42_2","unstructured":"Daya Guo Shuo Ren Shuai Lu Zhangyin Feng Duyu Tang Shujie Liu Long Zhou Nan Duan Alexey Svyatkovskiy Shengyu Fu Michele Tufano Shao Kun Deng Colin B. Clement Dawn Drain Neel Sundaresan Jian Yin Daxin Jiang and Ming Zhou. 2021. Graphcodebert: Pre-training code representations with data flow. 9th InternaHonal Conference on Learning RepresentaHons (ICLR\u201921) Virtual Event Austria May 3-7 2021. https:\/\/openreview.net\/forum?id=jLoC4ez43PZ"},{"issue":"6","key":"e_1_3_3_43_2","first-page":"1276","article-title":"A systematic literature review on fault prediction performance in software engineering","volume":"38","author":"Hall Tracy","year":"2011","unstructured":"Tracy Hall, Sarah Beecham, David Bowes, David Gray, and Steve Counsell. 2011. A systematic literature review on fault prediction performance in software engineering. IEEE TSE 38, 6 (2011), 1276\u20131304.","journal-title":"IEEE TSE"},{"key":"e_1_3_3_44_2","first-page":"1","article-title":"bjEnet: A fast and accurate software bug localization method in natural language semantic space","author":"Han Jiaxuan","year":"2024","unstructured":"Jiaxuan Han, Cheng Huang, and Jiayong Liu. 2024. bjEnet: A fast and accurate software bug localization method in natural language semantic space. Software Quality Journal 32, 4 (2024), 1\u201324.","journal-title":"Software Quality Journal"},{"key":"e_1_3_3_45_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-023-00379-9"},{"key":"e_1_3_3_46_2","doi-asserted-by":"publisher","DOI":"10.1002\/1099-1689(200009)10:3<171::AID-STVR209>3.0.CO;2-J"},{"key":"e_1_3_3_47_2","first-page":"1322","volume-title":"Proceedings of the 2008 IEEE International Joint Conference on Neural Networks","author":"He Haibo","year":"2008","unstructured":"Haibo He, Yang Bai, Edwardo A. Garcia, and Shutao Li. 2008. ADASYN: Adaptive synthetic sampling approach for imbalanced learning. In Proceedings of the 2008 IEEE International Joint Conference on Neural Networks. IEEE, 1322\u20131328."},{"key":"e_1_3_3_48_2","first-page":"392","volume-title":"Proceedings of the 2013 35th ICSE","author":"Herzig Kim","year":"2013","unstructured":"Kim Herzig, Sascha Just, and Andreas Zeller. 2013. It\u2019s not a bug, it\u2019s a feature: How misclassification impacts bug prediction. In Proceedings of the 2013 35th ICSE. IEEE, 392\u2013401."},{"key":"e_1_3_3_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2013.6624018"},{"key":"e_1_3_3_50_2","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"issue":"2","key":"e_1_3_3_51_2","first-page":"111","article-title":"A systematic literature review and meta-analysis on cross project defect prediction","volume":"45","author":"Hosseini Seyedrebvar","year":"2017","unstructured":"Seyedrebvar Hosseini, Burak Turhan, and Dimuthu Gunarathna. 2017. A systematic literature review and meta-analysis on cross project defect prediction. IEEE TSE 45, 2 (2017), 111\u2013147.","journal-title":"IEEE TSE"},{"key":"e_1_3_3_52_2","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/3987981"},{"key":"e_1_3_3_53_2","doi-asserted-by":"publisher","DOI":"10.1109\/AERO.2008.4526688"},{"key":"e_1_3_3_54_2","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/265"},{"key":"e_1_3_3_55_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5844"},{"key":"e_1_3_3_56_2","first-page":"1606","volume-title":"Proceedings of the IJCAI","volume":"16","author":"Huo Xuan","year":"2016","unstructured":"Xuan Huo, Ming Li, Zhi-Hua Zhou, et\u00a0al. 2016. Learning unified features from natural and programming languages for locating buggy source code.. In Proceedings of the IJCAI, Vol. 16. 1606\u20131612."},{"issue":"7","key":"e_1_3_3_57_2","first-page":"1368","article-title":"Deep transfer bug localization","volume":"47","author":"Huo Xuan","year":"2019","unstructured":"Xuan Huo, Ferdian Thung, Ming Li, David Lo, and Shu-Ting Shi. 2019. Deep transfer bug localization. IEEE TSE 47, 7 (2019), 1368\u20131380.","journal-title":"IEEE TSE"},{"key":"e_1_3_3_58_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3035063"},{"issue":"8","key":"e_1_3_3_59_2","first-page":"3010","article-title":"Legion: Massively composing rankers for improved bug localization at adobe","volume":"48","author":"Jarman Darryl","year":"2021","unstructured":"Darryl Jarman, Jeffrey Berry, Riley Smith, Ferdian Thung, and David Lo. 2021. Legion: Massively composing rankers for improved bug localization at adobe. IEEE TSE 48, 8 (2021), 3010\u20133024.","journal-title":"IEEE TSE"},{"key":"e_1_3_3_60_2","doi-asserted-by":"publisher","DOI":"10.1109\/DESSERT50317.2020.9125003"},{"key":"e_1_3_3_61_2","unstructured":"Carlos E. Jimenez John Yang Alexander Wettig Shunyu Yao Kexin Pei Ofir Press and Karthik Narasimhan. 2024. Swe-bench: Can language models resolve real-world github issues?The Twelth InternaHonal Conference on Learning RepresentaHons (ICLR\u201924) Vienna Austria May 7-11 2024. OpenReview.net. https:\/\/openreview.net\/forum?id=VTF8yNQM66"},{"key":"e_1_3_3_62_2","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2628055"},{"key":"e_1_3_3_63_2","doi-asserted-by":"publisher","unstructured":"Nal Kalchbrenner Edward Grefenstette and Phil Blunsom. 2014. A convolutional neural network for modelling sentences. In Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics ACL 2014 June 22-27 2014 BalHmore MD USA Volume 1: Long Papers. The Association for Computer Linguistics 655\u2013665. 10.3115\/v1\/p14-1062","DOI":"10.3115\/v1\/p14-1062"},{"key":"e_1_3_3_64_2","unstructured":"Staffs Keele et\u00a0al. 2007. Guidelines for Performing Systematic Literature Reviews in Software Engineering."},{"key":"e_1_3_3_65_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.66"},{"key":"e_1_3_3_66_2","unstructured":"Thomas N. Kipf and Max Welling. 2016. Semi-supervised classification with graph convolutional networks. arXiv:1609.02907. Retrieved from https:\/\/arxiv.org\/abs\/1609.02907. (2016)."},{"key":"e_1_3_3_67_2","first-page":"1","article-title":"Procedures for performing systematic reviews","volume":"33","author":"Kitchenham Barbara","year":"2004","unstructured":"Barbara Kitchenham. 2004. Procedures for performing systematic reviews. Keele, UK, Keele University 33 (2004), 1\u201326.","journal-title":"Keele, UK, Keele University"},{"key":"e_1_3_3_68_2","first-page":"296","volume-title":"Proceedings of the 11th MSR","author":"Kochhar Pavneet Singh","year":"2014","unstructured":"Pavneet Singh Kochhar, Tien-Duy B. Le, and David Lo. 2014. It\u2019s not a bug, it\u2019s a feature: Does misclassification affect bug localization?. In Proceedings of the 11th MSR. 296\u2013299."},{"key":"e_1_3_3_69_2","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642997"},{"key":"e_1_3_3_70_2","first-page":"165","volume-title":"Proceedings of the 25th ISSTA","author":"Kochhar Pavneet Singh","year":"2016","unstructured":"Pavneet Singh Kochhar, Xin Xia, David Lo, and Shanping Li. 2016. Practitioners\u2019 expectations on automated fault localization. In Proceedings of the 25th ISSTA. 165\u2013176."},{"issue":"1","key":"e_1_3_3_71_2","first-page":"25","article-title":"Handling imbalanced datasets: A review","volume":"30","author":"Kotsiantis Sotiris","year":"2006","unstructured":"Sotiris Kotsiantis, Dimitris Kanellopoulos, Panayiotis Pintelas, et\u00a0al. 2006. Handling imbalanced datasets: A review. GESTS International Transactions on Computer Science and Engineering 30, 1 (2006), 25\u201336.","journal-title":"GESTS International Transactions on Computer Science and Engineering"},{"issue":"3","key":"e_1_3_3_72_2","first-page":"230","article-title":"Semantic clustering: Identifying topics in source code","volume":"49","author":"Kuhn Adrian","year":"2007","unstructured":"Adrian Kuhn, St\u00e9phane Ducasse, and Tudor G\u00eerba. 2007. Semantic clustering: Identifying topics in source code. IST 49, 3 (2007), 230\u2013243.","journal-title":"IST"},{"key":"e_1_3_3_73_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.73"},{"key":"e_1_3_3_74_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2017.24"},{"key":"e_1_3_3_75_2","unstructured":"Zhenzhong Lan Mingda Chen Sebastian Goodman Kevin Gimpel Piyush Sharma and Radu Soricut. 2020. Albert: A lite bert for self-supervised learning of language representations. 8th International Conference on Learning Representations (ICLR\u201920) Addis Ababa Ethiopia April 26-30 2020. OpenReview.net. https:\/\/openreview.net\/forum?id=H1eA7AEtvS"},{"key":"e_1_3_3_76_2","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"},{"key":"e_1_3_3_77_2","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_3_78_2","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213856"},{"key":"e_1_3_3_79_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606583"},{"issue":"2","key":"e_1_3_3_80_2","first-page":"47","article-title":"An empirical study of the effectiveness of IR-based bug localization for large-scale industrial projects","volume":"27","author":"Li Wei","year":"2022","unstructured":"Wei Li, Qingan Li, Yunlong Ming, Weijiao Dai, Shi Ying, and Mengting Yuan. 2022. An empirical study of the effectiveness of IR-based bug localization for large-scale industrial projects. EMSE 27, 2 (2022), 47.","journal-title":"EMSE"},{"key":"e_1_3_3_81_2","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330574"},{"key":"e_1_3_3_82_2","unstructured":"Yujia Li Daniel Tarlow Marc Brockschmidt and Richard S. Zemel. 2016. Gated graph sequence neural networks. 4th International Conference on Learning RepresentaHons ICLR 2016 San Juan Puerto Rico May 2-4 2016 Conference Track Proceedings (2016) Yoshua Bengio and Yann LeCun (Eds.). Retrieved from http:\/\/arxiv.org\/abs\/1511.05493"},{"issue":"7","key":"e_1_3_3_83_2","first-page":"186","article-title":"Modeling function-level interactions for file-level bug localization","volume":"27","author":"Liang Hongliang","year":"2022","unstructured":"Hongliang Liang, Dengji Hang, and Xiangyu Li. 2022. Modeling function-level interactions for file-level bug localization. EMSE 27, 7 (2022), 186.","journal-title":"EMSE"},{"key":"e_1_3_3_84_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2936948"},{"key":"e_1_3_3_85_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2940557"},{"key":"e_1_3_3_86_2","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3271811"},{"key":"e_1_3_3_87_2","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2008.33"},{"key":"e_1_3_3_88_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3228802"},{"key":"e_1_3_3_89_2","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2023\/249"},{"key":"e_1_3_3_90_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-021-06078-4"},{"key":"e_1_3_3_91_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM54844.2022.00040"},{"key":"e_1_3_3_92_2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809071"},{"key":"e_1_3_3_93_2","doi-asserted-by":"publisher","DOI":"10.5555\/1038267.1039053"},{"key":"e_1_3_3_94_2","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2948705"},{"key":"e_1_3_3_95_2","doi-asserted-by":"crossref","unstructured":"E. Peters Matthew Neumann Mark Iyyer Mohit Gardner Matt Clark Christopher Lee Kenton and Zettlemoyer Luke. 1802. Deep contextualized word representations (2018). In Proceedings of the 2018 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies Volume 1 (Long Papers) Marilyn Walker Heng Ji and Amanda Stent (Eds.). Association for Computational Linguistics 2227\u20132237.","DOI":"10.18653\/v1\/N18-1202"},{"key":"e_1_3_3_96_2","unstructured":"Tomas Mikolov Kai Chen Greg Corrado and Jeffrey Dean. 2013. Efficient estimation of word representations in vector space. arXiv:1301.3781. Retrieved from https:\/\/arxiv.org\/abs\/1301.3781. (2013)."},{"key":"e_1_3_3_97_2","article-title":"Distributed representations of words and phrases and their compositionality","volume":"26","author":"Mikolov Tomas","year":"2013","unstructured":"Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg S. Corrado, and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. Advances in Neural Information Processing Systems 26 (2013), 3111\u201331119.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_3_98_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3265731"},{"key":"e_1_3_3_99_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2014.28"},{"key":"e_1_3_3_100_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.37"},{"key":"e_1_3_3_101_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-020-00735-3"},{"key":"e_1_3_3_102_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP52600.2021.00028"},{"key":"e_1_3_3_103_2","volume-title":"UNBIGGEN AI","author":"Ng Andrew","year":"2024","unstructured":"Andrew Ng. 2024. UNBIGGEN AI. Retrieved from https:\/\/spectrum.ieee.org\/andrew-ng-data-centric-ai"},{"key":"e_1_3_3_104_2","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3549165"},{"key":"e_1_3_3_105_2","doi-asserted-by":"publisher","DOI":"10.1145\/1900008.1900090"},{"key":"e_1_3_3_106_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00028"},{"key":"e_1_3_3_107_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSR59073.2023.00083"},{"issue":"6","key":"e_1_3_3_108_2","first-page":"1","article-title":"An extensive replication study of the ABLoTS approach for bug localization","volume":"29","author":"Niu Feifei","year":"2024","unstructured":"Feifei Niu, Enshuo Zhang, Christoph Mayr-Dorn, Wesley Klewerton Guez Assun\u00e7\u00e3o, Liguo Huang, Jidong Ge, Bin Luo, and Alexander Egyed. 2024. An extensive replication study of the ABLoTS approach for bug localization. EMSE 29, 6 (2024), 1\u201337.","journal-title":"EMSE"},{"key":"e_1_3_3_109_2","doi-asserted-by":"publisher","unstructured":"Matteo Pagliardini Prakhar Gupta and MarHn Jaggi. 2018. Unsupervised learning of sentence embeddings using compositional n-Gram Features. In Proceedings of the 2018 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies NAACL-HLT 2018 New Orleans Louisiana USA June 1-6 2018 Volume 1 (Long Papers) Marilyn A. Walker Heng Ji and Amanda Stent (Eds.). 528\u2013540. DOI:10.18653\/V1\/N18-1049","DOI":"10.18653\/V1\/N18-1049"},{"key":"e_1_3_3_110_2","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1509"},{"key":"e_1_3_3_111_2","first-page":"729","volume-title":"Proceedings of the 28th USENIX Security","author":"Pendlebury Feargus","year":"2019","unstructured":"Feargus Pendlebury, Fabio Pierazzi, Roberto Jordaney, Johannes Kinder, and Lorenzo Cavallaro. 2019. \\(\\lbrace\\) TESSERACT \\(\\rbrace\\) : Eliminating experimental bias in malware classification across space and time. In Proceedings of the 28th USENIX Security. 729\u2013746."},{"key":"e_1_3_3_112_2","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"key":"e_1_3_3_113_2","doi-asserted-by":"publisher","DOI":"10.1145\/3345629.3345632"},{"key":"e_1_3_3_114_2","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2021.3104728"},{"key":"e_1_3_3_115_2","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025157"},{"key":"e_1_3_3_116_2","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985451"},{"key":"e_1_3_3_117_2","doi-asserted-by":"publisher","DOI":"10.1145\/3196398.3196415"},{"key":"e_1_3_3_118_2","volume-title":"SentenceTransformer","author":"Reimers Nils","year":"2023","unstructured":"Nils Reimers. 2023. SentenceTransformer. Retrieved from https:\/\/huggingface.co\/sentence-transformers"},{"key":"e_1_3_3_119_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2003.1240292"},{"key":"e_1_3_3_120_2","doi-asserted-by":"publisher","DOI":"10.1038\/323533a0"},{"key":"e_1_3_3_121_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.38"},{"key":"e_1_3_3_122_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693093"},{"key":"e_1_3_3_123_2","article-title":"Automatic text processing: The transformation, analysis, and retrieval of","volume":"169","author":"Salton Gerard","year":"1989","unstructured":"Gerard Salton. 1989. Automatic text processing: The transformation, analysis, and retrieval of. Reading: Addison-Wesley 169 (1989).","journal-title":"Reading: Addison-Wesley"},{"key":"e_1_3_3_124_2","unstructured":"Shubham Sangle Sandeep Muvva Sridhar Chimalakonda Karthikeyan Ponnalagu and Vijendran Gopalan Venkoparao. 2020. DRAST\u2013A deep learning and AST based approach for bug localization. arXiv:2011.03449. Retrieved from https:\/\/arxiv.org\/abs\/2011.03449. (2020)."},{"key":"e_1_3_3_125_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2010.5463280"},{"key":"e_1_3_3_126_2","volume-title":"Introduction to Information Retrieval","author":"Sch\u00fctze Hinrich","year":"2008","unstructured":"Hinrich Sch\u00fctze, Christopher D. Manning, and Prabhakar Raghavan. 2008. Introduction to Information Retrieval. Vol. 39. Cambridge University Press Cambridge."},{"key":"e_1_3_3_127_2","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1007\/978-981-15-9651-3_23","article-title":"A review on word embedding techniques for text classification","author":"Birunda S. Selva","year":"2021","unstructured":"S. Selva Birunda and R. Kanniga Devi. 2021. A review on word embedding techniques for text classification. Innovative Data Communication Technologies and Application: Proceedings of ICIDCA 2020 (2021), 267\u2013281.","journal-title":"Innovative Data Communication Technologies and Application: Proceedings of ICIDCA 2020"},{"key":"e_1_3_3_128_2","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C57518.2022.00055"},{"key":"e_1_3_3_129_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2012.6224299"},{"key":"e_1_3_3_130_2","doi-asserted-by":"publisher","DOI":"10.1145\/1082983.1083147"},{"key":"e_1_3_3_131_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3182372"},{"key":"e_1_3_3_132_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.09.001"},{"key":"e_1_3_3_133_2","doi-asserted-by":"crossref","unstructured":"Jeniya Tabassum Mounica Maddela Wei Xu and Alan Ritter. 2020. Code and named entity recognition in stackoverflow. In Proceedings of the 58th Annual Meetting of the Association for Computational Linguistics Dan Jurafsky Joyce Cha Natalie Schluter and Joel Tetreault (Eds.). Association for Computational Linguistics 4913\u20134926. https:\/\/aclanthology.org\/2020.acl-main.443\/","DOI":"10.18653\/v1\/2020.acl-main.443"},{"key":"e_1_3_3_134_2","unstructured":"Wei Tao Yucheng Zhou Yanlin Wang Wenqiang Zhang Hongyu Zhang and Yu Cheng. 2024. Magis: Llm-based multi-agent framework for github issue resolution. arXiv:2403.17927. Retrieved from https:\/\/arxiv.org\/abs\/2403.17927. (2024)."},{"key":"e_1_3_3_135_2","doi-asserted-by":"publisher","DOI":"10.1109\/SANER56733.2023.00094"},{"key":"e_1_3_3_136_2","article-title":"Attention is all you need","volume":"30","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N. Gomez, \u0141ukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. Advances in Neural Information Processing Systems 30 (2017), 6000\u20136010.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_3_137_2","first-page":"77","volume-title":"Proceedings of the Trec","volume":"99","author":"Voorhees Ellen M.","year":"1999","unstructured":"Ellen M. Voorhees et\u00a0al. 1999. The trec-8 question answering track report. In Proceedings of the Trec, Vol. 99. 77\u201382."},{"issue":"3","key":"e_1_3_3_138_2","first-page":"1649","article-title":"Multi-dimension convolutional neural network for bug localization","volume":"15","author":"Wang Bei","year":"2020","unstructured":"Bei Wang, Ling Xu, Meng Yan, Chao Liu, and Ling Liu. 2020. Multi-dimension convolutional neural network for bug localization. IEEE TSC 15, 3 (2020), 1649\u20131663.","journal-title":"IEEE TSC"},{"key":"e_1_3_3_139_2","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771797"},{"key":"e_1_3_3_140_2","doi-asserted-by":"publisher","DOI":"10.1145\/2597008.2597148"},{"key":"e_1_3_3_141_2","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1801"},{"key":"e_1_3_3_142_2","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368151"},{"key":"e_1_3_3_143_2","doi-asserted-by":"publisher","unstructured":"Yue Wang Hung Le Akhilesh Deepak Gotmare Nghi D. Q. Bui Junnan Li and Steven C. H. Hoi. 2023. Codet5+: Open code large language models for code understanding and generation. In Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing (EMNLP\u201923) Houda Bouamor Juan Pino and Kalika Bali (Eds.). Association for ComputaHonal LinguisHcs 1069\u20131088. 10.18653\/v1\/2023.emnlp-main.68","DOI":"10.18653\/v1\/2023.emnlp-main.68"},{"key":"e_1_3_3_144_2","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970359"},{"key":"e_1_3_3_145_2","doi-asserted-by":"publisher","DOI":"10.1109\/SANER53432.2022.00027"},{"key":"e_1_3_3_146_2","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3417943"},{"key":"e_1_3_3_147_2","doi-asserted-by":"publisher","DOI":"10.1145\/2601248.2601268"},{"key":"e_1_3_3_148_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.40"},{"key":"e_1_3_3_149_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2521368"},{"key":"e_1_3_3_150_2","first-page":"1","article-title":"Software fault localization: An overview of research, techniques, and tools","author":"Wong W. Eric","year":"2023","unstructured":"W. Eric Wong, Ruizhi Gao, Yihao Li, Rui Abreu, Franz Wotawa, and Dongcheng Li. 2023. Software fault localization: An overview of research, techniques, and tools. Handbook of Software Fault Localization: Foundations and Advances (2023), 1\u2013117.","journal-title":"Handbook of Software Fault Localization: Foundations and Advances"},{"key":"e_1_3_3_151_2","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2610386"},{"key":"e_1_3_3_152_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00393"},{"key":"e_1_3_3_153_2","doi-asserted-by":"publisher","DOI":"10.1002\/9781119880929.ch8"},{"key":"e_1_3_3_154_2","doi-asserted-by":"publisher","DOI":"10.1145\/2597008.2597788"},{"key":"e_1_3_3_155_2","first-page":"107274","article-title":"BugRadar: Bug localization by knowledge graph link prediction","author":"Xiao Xi","year":"2023","unstructured":"Xi Xiao, Renjie Xiao, Qing Li, Jianhui Lv, Shunyan Cui, and Qixu Liu. 2023. BugRadar: Bug localization by knowledge graph link prediction. IST 162, C (2023), 107274.","journal-title":"IST"},{"key":"e_1_3_3_156_2","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2018.00097"},{"key":"e_1_3_3_157_2","first-page":"58","article-title":"Machine translation-based bug localization technique for bridging lexical gap","volume":"99","author":"Xiao Yan","year":"2018","unstructured":"Yan Xiao, Jacky Keung, Kwabena E. Bennin, and Qing Mi. 2018. Machine translation-based bug localization technique for bridging lexical gap. IST 99, C (2018), 58\u201361.","journal-title":"IST"},{"key":"e_1_3_3_158_2","first-page":"17","article-title":"Improving bug localization with word embedding and enhanced convolutional neural networks","volume":"105","author":"Xiao Yan","year":"2019","unstructured":"Yan Xiao, Jacky Keung, Kwabena E. Bennin, and Qing Mi. 2019. Improving bug localization with word embedding and enhanced convolutional neural networks. IST 105 (2019), 17\u201329.","journal-title":"IST"},{"key":"e_1_3_3_159_2","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2017.40"},{"key":"e_1_3_3_160_2","doi-asserted-by":"publisher","DOI":"10.1145\/3210459.3210469"},{"key":"e_1_3_3_161_2","doi-asserted-by":"publisher","DOI":"10.1145\/2522920.2522924"},{"key":"e_1_3_3_162_2","article-title":"Bug localization with features crossing and structured semantic information matching","author":"Xu Guoqing","year":"2023","unstructured":"Guoqing Xu, Xingqi Wang, Dan Wei, Yanli Shao, and Bin Chen. 2023. Bug localization with features crossing and structured semantic information matching. SEKE 33, 8 (2023), 1261\u20131291.","journal-title":"SEKE"},{"key":"e_1_3_3_163_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.44"},{"key":"e_1_3_3_164_2","doi-asserted-by":"publisher","DOI":"10.23919\/JSEE.2023.000010"},{"key":"e_1_3_3_165_2","doi-asserted-by":"publisher","DOI":"10.3390\/sym13030406"},{"key":"e_1_3_3_166_2","doi-asserted-by":"publisher","DOI":"10.1145\/3341105.3374005"},{"key":"e_1_3_3_167_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC52881.2021.00028"},{"key":"e_1_3_3_168_2","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635874"},{"issue":"4","key":"e_1_3_3_169_2","first-page":"379","article-title":"Mapping bug reports to relevant files: A ranking model, a fine-grained benchmark, and feature evaluation","volume":"42","author":"Ye Xin","year":"2015","unstructured":"Xin Ye, Razvan Bunescu, and Chang Liu. 2015. Mapping bug reports to relevant files: A ranking model, a fine-grained benchmark, and feature evaluation. IEEE TSE 42, 4 (2015), 379\u2013402.","journal-title":"IEEE TSE"},{"key":"e_1_3_3_170_2","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN54540.2023.10191494"},{"key":"e_1_3_3_171_2","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2015.23"},{"key":"e_1_3_3_172_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D17-1056"},{"key":"e_1_3_3_173_2","doi-asserted-by":"publisher","DOI":"10.1145\/3691620.3695061"},{"key":"e_1_3_3_174_2","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC51365.2020.00014"},{"key":"e_1_3_3_175_2","first-page":"106312","article-title":"Multiple fault localization of software programs: A systematic literature review","volume":"124","author":"Zakari Abubakar","year":"2020","unstructured":"Abubakar Zakari, Sai Peck Lee, Rui Abreu, Babiker Hussien Ahmed, and Rasheed Abubakar Rasheed. 2020. Multiple fault localization of software programs: A systematic literature review. IST 124 (2020), 106312.","journal-title":"IST"},{"key":"e_1_3_3_176_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2018.5137"},{"key":"e_1_3_3_177_2","unstructured":"Filip Zamfirov. 2022. A literature review on different types of empirically evaluated bug localization approaches. arXiv:2212.11774. Retrieved from https:\/\/arxiv.org\/abs\/2212.11774. (2022)."},{"key":"e_1_3_3_178_2","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464819"},{"key":"e_1_3_3_179_2","volume-title":"Proceedings of the The 12th ICLR","author":"Zhang Dejiao","year":"2024","unstructured":"Dejiao Zhang, Wasi Uddin Ahmad, Ming Tan, Hantian Ding, Ramesh Nallapati, Dan Roth, Xiaofei Ma, and Bing Xiang. 2024. Code representation learning at scale. In Proceedings of the The 12th ICLR."},{"issue":"6","key":"e_1_3_3_180_2","first-page":"625","article-title":"Identifying relevant studies in software engineering","volume":"53","author":"Zhang He","year":"2011","unstructured":"He Zhang, Muhammad Ali Babar, and Paolo Tell. 2011. Identifying relevant studies in software engineering. IST 53, 6 (2011), 625\u2013637.","journal-title":"IST"},{"key":"e_1_3_3_181_2","doi-asserted-by":"publisher","DOI":"10.1145\/3387904.3389281"},{"key":"e_1_3_3_182_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.107399"},{"key":"e_1_3_3_183_2","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134324"},{"key":"e_1_3_3_184_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM58522.2023.00205"},{"key":"e_1_3_3_185_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCEA62105.2024.10603974"},{"key":"e_1_3_3_186_2","unstructured":"Chunying Zhou Xiaoyuan Xie Gong Chen Peng He and Bing Li. 2024. Multi-view adaptive contrastive learning for information retrieval based fault localization. arXiv:2409.12519. Retrieved from https:\/\/arxiv.org\/abs\/2409.12519. (2024)."},{"key":"e_1_3_3_187_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227210"},{"key":"e_1_3_3_188_2","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2020\/493"},{"key":"e_1_3_3_189_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-021-00755-7"},{"key":"e_1_3_3_190_2","article-title":"BL-GAN: Semi-supervised bug localization via generative adversarial network","author":"Zhu Ziye","year":"2022","unstructured":"Ziye Zhu, Hanghang Tong, Yu Wang, and Yun Li. 2022. BL-GAN: Semi-supervised bug localization via generative adversarial network. IEEE TKDE 35, 11 (2022), 11112\u201311125.","journal-title":"IEEE TKDE"},{"key":"e_1_3_3_191_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.108741"},{"key":"e_1_3_3_192_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-82136-4_43"},{"key":"e_1_3_3_193_2","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595713"},{"issue":"2","key":"e_1_3_3_194_2","first-page":"332","article-title":"An empirical study of fault localization families and their combinations","volume":"47","author":"Zou Daming","year":"2019","unstructured":"Daming Zou, Jingjing Liang, Yingfei Xiong, Michael D. Ernst, and Lu Zhang. 2019. An empirical study of fault localization families and their combinations. IEEE TSE 47, 2 (2019), 332\u2013347.","journal-title":"IEEE TSE"},{"key":"e_1_3_3_195_2","unstructured":"Weiqin Zou Enming Li and Chunrong Fang. 2021. BLESER: Bug localization based on enhanced semantic retrieval. arXiv:2109.03555. Retrieved from https:\/\/arxiv.org\/abs\/2109.03555. (2021)."},{"issue":"8","key":"e_1_3_3_196_2","first-page":"836","article-title":"How practitioners perceive automated bug report management techniques","volume":"46","author":"Zou Weiqin","year":"2018","unstructured":"Weiqin Zou, David Lo, Zhenyu Chen, Xin Xia, Yang Feng, and Baowen Xu. 2018. How practitioners perceive automated bug report management techniques. IEEE TSE 46, 8 (2018), 836\u2013862.","journal-title":"IEEE TSE"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3734217","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T12:55:29Z","timestamp":1749646529000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3734217"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,11]]},"references-count":195,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2025,11,30]]}},"alternative-id":["10.1145\/3734217"],"URL":"https:\/\/doi.org\/10.1145\/3734217","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,11]]},"assertion":[{"value":"2024-05-14","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-04-29","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-06-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}