{"id":"https://openalex.org/W4416250646","doi":"https://doi.org/10.1109/ijcnn64981.2025.11228088","title":"Enhancing Fault Localization via Causal Measurement Features","display_name":"Enhancing Fault Localization via Causal Measurement Features","publication_year":2025,"publication_date":"2025-06-30","ids":{"openalex":"https://openalex.org/W4416250646","doi":"https://doi.org/10.1109/ijcnn64981.2025.11228088"},"language":null,"primary_location":{"id":"doi:10.1109/ijcnn64981.2025.11228088","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn64981.2025.11228088","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100402196","display_name":"Yunlong Li","orcid":"https://orcid.org/0000-0002-5907-9206"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yunlong Li","raw_affiliation_strings":["Wuhan University,Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering,Wuhan,China"],"affiliations":[{"raw_affiliation_string":"Wuhan University,Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering,Wuhan,China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024856110","display_name":"Bo Cai","orcid":"https://orcid.org/0000-0001-5261-0191"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bo Cai","raw_affiliation_strings":["Wuhan University,Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering,Wuhan,China"],"affiliations":[{"raw_affiliation_string":"Wuhan University,Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering,Wuhan,China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102448640","display_name":"Hongyi Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongyi Yang","raw_affiliation_strings":["Wuhan University,Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering,Wuhan,China"],"affiliations":[{"raw_affiliation_string":"Wuhan University,Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering,Wuhan,China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052819352","display_name":"Changjiang Cai","orcid":"https://orcid.org/0000-0003-0118-9063"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chengqing Cai","raw_affiliation_strings":["Wuhan University,Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering,Wuhan,China"],"affiliations":[{"raw_affiliation_string":"Wuhan University,Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering,Wuhan,China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089248030","display_name":"Ye Qiu","orcid":"https://orcid.org/0000-0002-1190-0173"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yangbo Qiu","raw_affiliation_strings":["Wuhan University,Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering,Wuhan,China"],"affiliations":[{"raw_affiliation_string":"Wuhan University,Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering,Wuhan,China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100357791","display_name":"Tao Chen","orcid":"https://orcid.org/0000-0003-1306-6538"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tao Chen","raw_affiliation_strings":["Wuhan University,Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering,Wuhan,China"],"affiliations":[{"raw_affiliation_string":"Wuhan University,Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering,Wuhan,China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100374046","display_name":"Chen Zhang","orcid":"https://orcid.org/0000-0001-5440-3911"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chen Zhang","raw_affiliation_strings":["Wuhan University,Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering,Wuhan,China"],"affiliations":[{"raw_affiliation_string":"Wuhan University,Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering,Wuhan,China","institution_ids":["https://openalex.org/I37461747"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5100402196"],"corresponding_institution_ids":["https://openalex.org/I37461747"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.37098791,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.5138000249862671,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.5138000249862671,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.3695000112056732,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.053199999034404755,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fault","display_name":"Fault (geology)","score":0.5645999908447266},{"id":"https://openalex.org/keywords/counterfactual-thinking","display_name":"Counterfactual thinking","score":0.5435000061988831},{"id":"https://openalex.org/keywords/causality","display_name":"Causality (physics)","score":0.5102999806404114},{"id":"https://openalex.org/keywords/causal-inference","display_name":"Causal inference","score":0.4887999892234802},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.45249998569488525},{"id":"https://openalex.org/keywords/measure","display_name":"Measure (data warehouse)","score":0.450300008058548},{"id":"https://openalex.org/keywords/fault-detection-and-isolation","display_name":"Fault detection and isolation","score":0.398499995470047},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.38749998807907104},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.38580000400543213}],"concepts":[{"id":"https://openalex.org/C175551986","wikidata":"https://www.wikidata.org/wiki/Q47089","display_name":"Fault (geology)","level":2,"score":0.5645999908447266},{"id":"https://openalex.org/C108650721","wikidata":"https://www.wikidata.org/wiki/Q1783253","display_name":"Counterfactual thinking","level":2,"score":0.5435000061988831},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.541700005531311},{"id":"https://openalex.org/C64357122","wikidata":"https://www.wikidata.org/wiki/Q1149766","display_name":"Causality (physics)","level":2,"score":0.5102999806404114},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4936999976634979},{"id":"https://openalex.org/C158600405","wikidata":"https://www.wikidata.org/wiki/Q5054566","display_name":"Causal inference","level":2,"score":0.4887999892234802},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.45249998569488525},{"id":"https://openalex.org/C2780009758","wikidata":"https://www.wikidata.org/wiki/Q6804172","display_name":"Measure (data warehouse)","level":2,"score":0.450300008058548},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4341999888420105},{"id":"https://openalex.org/C152745839","wikidata":"https://www.wikidata.org/wiki/Q5438153","display_name":"Fault detection and isolation","level":3,"score":0.398499995470047},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.38749998807907104},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.38749998807907104},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.38580000400543213},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3790000081062317},{"id":"https://openalex.org/C84945661","wikidata":"https://www.wikidata.org/wiki/Q7366567","display_name":"Root cause","level":2,"score":0.3711000084877014},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.3612000048160553},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.34929999709129333},{"id":"https://openalex.org/C11671645","wikidata":"https://www.wikidata.org/wiki/Q5054567","display_name":"Causal model","level":2,"score":0.3488999903202057},{"id":"https://openalex.org/C87007009","wikidata":"https://www.wikidata.org/wiki/Q210832","display_name":"Statistical hypothesis testing","level":2,"score":0.3375999927520752},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.33070001006126404},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.3192000091075897},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.31700000166893005},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.2799000144004822},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.27320000529289246},{"id":"https://openalex.org/C17618745","wikidata":"https://www.wikidata.org/wiki/Q207509","display_name":"Copula (linguistics)","level":2,"score":0.26159998774528503},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.2599000036716461},{"id":"https://openalex.org/C134261354","wikidata":"https://www.wikidata.org/wiki/Q938438","display_name":"Statistical inference","level":2,"score":0.258899986743927},{"id":"https://openalex.org/C114289077","wikidata":"https://www.wikidata.org/wiki/Q3284399","display_name":"Statistical model","level":2,"score":0.25369998812675476},{"id":"https://openalex.org/C13625343","wikidata":"https://www.wikidata.org/wiki/Q7627418","display_name":"Stuck-at fault","level":4,"score":0.2506999969482422}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ijcnn64981.2025.11228088","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn64981.2025.11228088","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W1498436455","https://openalex.org/W2004222258","https://openalex.org/W2013655083","https://openalex.org/W2014011458","https://openalex.org/W2101794973","https://openalex.org/W2116341502","https://openalex.org/W2128049346","https://openalex.org/W2143891888","https://openalex.org/W2144344516","https://openalex.org/W2145064897","https://openalex.org/W2156723666","https://openalex.org/W2165663378","https://openalex.org/W2172154252","https://openalex.org/W2269228849","https://openalex.org/W2462689321","https://openalex.org/W2466388701","https://openalex.org/W2736091366","https://openalex.org/W2958754741","https://openalex.org/W3160492491","https://openalex.org/W3162747997","https://openalex.org/W3195442242","https://openalex.org/W4236213345","https://openalex.org/W4284670965","https://openalex.org/W4308641610","https://openalex.org/W4322766882","https://openalex.org/W4367040713","https://openalex.org/W4391579639","https://openalex.org/W4394769550","https://openalex.org/W4400484321","https://openalex.org/W4402469804"],"related_works":[],"abstract_inverted_index":{"Fault":[0,86],"localization":[1,26,79,123,202],"is":[2,91],"the":[3,8,42,60,69,92,100,107,134,147,157,188,207,210,216],"task":[4],"of":[5,16,71,146,156,209,219],"automatically":[6],"identifying":[7,99],"program":[9,37,137],"components":[10,38,138],"(e.g.,":[11],"files,":[12],"functions,":[13],"or":[14,30],"lines":[15],"code)":[17],"associated":[18],"with":[19],"specific":[20],"defects.":[21,40,67],"Existing":[22],"studies":[23],"on":[24,98,187],"fault":[25,64,78,111,122,182,201],"utilize":[27],"statistical":[28],"methods":[29,47],"neural":[31],"networks":[32],"to":[33,132],"establish":[34],"correlations":[35],"between":[36,63,110,136],"and":[39,66,105,113,129,139,153,177,199,225],"However,":[41],"results":[43],"obtained":[44],"by":[45,51,205],"these":[46,165],"may":[48],"be":[49,222],"influenced":[50],"confounding":[52],"factors,":[53],"as":[54],"they":[55],"do":[56],"not":[57],"explicitly":[58],"measure":[59],"causal":[61,72,108,117,130,143,229],"relationships":[62],"locations":[65,112],"Considering":[68],"lack":[70],"correlation":[73],"measurement":[74,144],"in":[75],"existing":[76,197],"learning-based":[77,94,121,200],"methods,":[80],"we":[81,150,167,213],"propose":[82],"Causal":[83],"Measurement":[84],"based":[85],"Localization":[87],"(CMFL)":[88],"method.":[89],"CMFL":[90,195],"first":[93],"approach":[95,171],"that":[96,172,194,215],"focuses":[97],"root":[101,217],"causes":[102],"triggering":[103],"defects":[104,220],"measuring":[106],"associations":[109],"defects,":[114,140],"thus":[115],"introducing":[116],"inference":[118],"theory":[119,128],"into":[120],"approaches.":[124],"We":[125],"apply":[126],"counterfactual":[127],"intervention":[131],"compute":[133],"causality":[135],"thereby":[141],"extracting":[142],"features":[145,155],"program.":[148],"Additionally,":[149],"extract":[151],"semantic":[152],"structural":[154],"code":[158,175],"using":[159],"pre-trained":[160],"language":[161],"models.":[162],"By":[163],"fusing":[164],"features,":[166],"achieve":[168],"a":[169],"comprehensive":[170],"considers":[173],"causality,":[174],"semantics,":[176],"structure,":[178],"enabling":[179],"more":[180,223],"effective":[181],"localization.":[183],"Our":[184],"extensive":[185],"experiments":[186],"widely":[189],"used":[190],"benchmark":[191],"Defects4J":[192],"show":[193,214],"outperforms":[196],"traditional":[198],"baselines.":[203],"Furthermore,":[204],"analyzing":[206],"rankings":[208],"localized":[211],"faults,":[212],"cause":[218],"can":[221],"accurately":[224],"directly":[226],"identified":[227],"through":[228],"measurement.":[230]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-11-14T00:00:00"}
