{"id":"https://openalex.org/W4415746220","doi":"https://doi.org/10.1109/icsme64153.2025.00098","title":"Bugs in AI-Generated Code - Understanding Bug Patterns and Possible Fix Strategies","display_name":"Bugs in AI-Generated Code - Understanding Bug Patterns and Possible Fix Strategies","publication_year":2025,"publication_date":"2025-09-07","ids":{"openalex":"https://openalex.org/W4415746220","doi":"https://doi.org/10.1109/icsme64153.2025.00098"},"language":null,"primary_location":{"id":"doi:10.1109/icsme64153.2025.00098","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsme64153.2025.00098","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Software Maintenance and Evolution (ICSME)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053157740","display_name":"Ruofan Gao","orcid":"https://orcid.org/0000-0003-1025-7056"},"institutions":[{"id":"https://openalex.org/I51158804","display_name":"Massey University","ror":"https://ror.org/052czxv31","country_code":"NZ","type":"education","lineage":["https://openalex.org/I51158804"]}],"countries":["NZ"],"is_corresponding":true,"raw_author_name":"Ruofan Gao","raw_affiliation_strings":["School of Mathematical and Computational Sciences, Massey University,Palmerston North,New Zealand"],"affiliations":[{"raw_affiliation_string":"School of Mathematical and Computational Sciences, Massey University,Palmerston North,New Zealand","institution_ids":["https://openalex.org/I51158804"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5053157740"],"corresponding_institution_ids":["https://openalex.org/I51158804"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.47022559,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"881","last_page":"883"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.5246999859809875,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.5246999859809875,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10883","display_name":"Ethics and Social Impacts of AI","score":0.07259999960660934,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.053700000047683716,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.6312000155448914},{"id":"https://openalex.org/keywords/quality","display_name":"Quality (philosophy)","score":0.5374000072479248},{"id":"https://openalex.org/keywords/code-review","display_name":"Code review","score":0.5030999779701233},{"id":"https://openalex.org/keywords/software-bug","display_name":"Software bug","score":0.4966999888420105},{"id":"https://openalex.org/keywords/software-quality","display_name":"Software quality","score":0.48019999265670776},{"id":"https://openalex.org/keywords/product","display_name":"Product (mathematics)","score":0.47839999198913574},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.44130000472068787},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.3774000108242035}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6518999934196472},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.6312000155448914},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.5374000072479248},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.5123999714851379},{"id":"https://openalex.org/C150292731","wikidata":"https://www.wikidata.org/wiki/Q1342704","display_name":"Code review","level":5,"score":0.5030999779701233},{"id":"https://openalex.org/C1009929","wikidata":"https://www.wikidata.org/wiki/Q179550","display_name":"Software bug","level":3,"score":0.4966999888420105},{"id":"https://openalex.org/C117447612","wikidata":"https://www.wikidata.org/wiki/Q1412670","display_name":"Software quality","level":4,"score":0.48019999265670776},{"id":"https://openalex.org/C90673727","wikidata":"https://www.wikidata.org/wiki/Q901718","display_name":"Product (mathematics)","level":2,"score":0.47839999198913574},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.44130000472068787},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.3774000108242035},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.35749998688697815},{"id":"https://openalex.org/C101317890","wikidata":"https://www.wikidata.org/wiki/Q940053","display_name":"Software maintenance","level":4,"score":0.33649998903274536},{"id":"https://openalex.org/C137287247","wikidata":"https://www.wikidata.org/wiki/Q1329550","display_name":"Static program analysis","level":4,"score":0.3273000121116638},{"id":"https://openalex.org/C133237599","wikidata":"https://www.wikidata.org/wiki/Q2295111","display_name":"Code smell","level":5,"score":0.3050999939441681},{"id":"https://openalex.org/C204983608","wikidata":"https://www.wikidata.org/wiki/Q2111958","display_name":"Productivity","level":2,"score":0.29910001158714294},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.29429998993873596},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.28619998693466187},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.28600001335144043},{"id":"https://openalex.org/C168065819","wikidata":"https://www.wikidata.org/wiki/Q845566","display_name":"Debugging","level":2,"score":0.2854999899864197},{"id":"https://openalex.org/C2776969324","wikidata":"https://www.wikidata.org/wiki/Q613918","display_name":"Software quality assurance","level":5,"score":0.2572000026702881}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icsme64153.2025.00098","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsme64153.2025.00098","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Software Maintenance and Evolution (ICSME)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2109156518","https://openalex.org/W2142958724","https://openalex.org/W2922320079","https://openalex.org/W3085545669","https://openalex.org/W3092453472","https://openalex.org/W4281763794","https://openalex.org/W4384345745","https://openalex.org/W4385245566","https://openalex.org/W4388483444","https://openalex.org/W4394769102","https://openalex.org/W4401543590","https://openalex.org/W4402684113","https://openalex.org/W4405396136","https://openalex.org/W4407392582","https://openalex.org/W4407551092"],"related_works":[],"abstract_inverted_index":{"Developers":[0],"increasingly":[1],"rely":[2],"on":[3,34,89],"AI":[4],"models":[5,32],"to":[6,9,41,51,70,97],"generate":[7],"code":[8,24,28],"boost":[10],"productivity":[11],"and":[12,44,53,61,82,87,94],"enhance":[13],"efficiency.":[14],"However,":[15],"there":[16],"remain":[17],"some":[18],"quality":[19,45],"concerns":[20],"regarding":[21],"the":[22,26,57,63,72,80,101],"AI-generated":[23,77],"as":[25],"generated":[27,102],"is":[29],"produced":[30],"by":[31],"trained":[33],"publicly":[35],"available":[36],"code,":[37,78],"which":[38],"are":[39],"known":[40],"contain":[42],"bugs":[43,75],"issues.":[46],"Those":[47],"issues":[48],"can":[49],"lead":[50],"trust":[52],"maintenance":[54],"challenges":[55],"in":[56,76,100],"end":[58],"software":[59],"product":[60],"throughout":[62],"development":[64],"timeline.":[65],"This":[66],"PhD":[67],"research":[68],"aims":[69],"understand":[71],"nature":[73],"of":[74,84],"classify":[79],"types":[81],"patterns":[83],"these":[85],"bugs,":[86],"based":[88],"this":[90],"classification,":[91],"investigate":[92],"mitigation":[93],"fix":[95],"strategies":[96],"reduce":[98],"bug-proneness":[99],"code.":[103]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-31T00:00:00"}
