2021 IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE) 2021
DOI: 10.1109/issre52982.2021.00020
|View full text |Cite
|
Sign up to set email alerts
|

GCN2defect : Graph Convolutional Networks for SMOTETomek-based Software Defect Prediction

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(14 citation statements)
references
References 29 publications
0
14
0
Order By: Relevance
“…Secondly, for FSet-3, building a software network [5] based on the actual dependencies between code files may better represent their relationships. Since the projects in the datasets may across multiple versions, it is not possible to construct the corresponding software network accurately, so we use a cooccurrence network (COON) instead.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Secondly, for FSet-3, building a software network [5] based on the actual dependencies between code files may better represent their relationships. Since the projects in the datasets may across multiple versions, it is not possible to construct the corresponding software network accurately, so we use a cooccurrence network (COON) instead.…”
Section: Discussionmentioning
confidence: 99%
“…Once the file is defective, it is more likely to have a higher priority or severity. Leveraging neural networks to capture semantic and syntactic features from source files is widely used for bug localization [4] and defect prediction [5].…”
Section: Introductionmentioning
confidence: 99%
“…For example, Qu et al [10] used network embedding technique, node2vec, to automatically learn to encode dependency network structure into lowdimensional vector spaces to improve software defect prediction. Zeng et al [11] also recently analyzed the influence of network structure features of code on defect prediction.…”
Section: B Representation Learning In Software Engineeringmentioning
confidence: 99%
“…Given a path of the source code, the token sequences of all files will be output.As treated in [7], we only select three types of nodes on ASTs as tokens: (1) nodes of method invocations and class instance creations; (2) declaration nodes, i.e., method/type/enum declarations; (3) control flow nodes, such as while, if, and throw. For more details, please refer to our previous work [11].…”
Section: A Generation Of Local Semantic Features 1) Parsing Astmentioning
confidence: 99%
See 1 more Smart Citation