{"id":"https://openalex.org/W4415744367","doi":"https://doi.org/10.1109/qrs-c65679.2025.00030","title":"SDPFE: A Formal Reasoning Approach for Explaining Software Defect Predictions","display_name":"SDPFE: A Formal Reasoning Approach for Explaining Software Defect Predictions","publication_year":2025,"publication_date":"2025-07-16","ids":{"openalex":"https://openalex.org/W4415744367","doi":"https://doi.org/10.1109/qrs-c65679.2025.00030"},"language":null,"primary_location":{"id":"doi:10.1109/qrs-c65679.2025.00030","is_oa":false,"landing_page_url":"https://doi.org/10.1109/qrs-c65679.2025.00030","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 25th International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061818362","display_name":"Chi\u2010Kuang Sun","orcid":"https://orcid.org/0000-0002-4467-2509"},"institutions":[{"id":"https://openalex.org/I1334729051","display_name":"Xinjiang Normal University","ror":"https://ror.org/00ndrvk93","country_code":"CN","type":"education","lineage":["https://openalex.org/I1334729051"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chi Sun","raw_affiliation_strings":["Xinjiang Normal University,College of Computer Science and Technology,Urumqi,China,830054"],"affiliations":[{"raw_affiliation_string":"Xinjiang Normal University,College of Computer Science and Technology,Urumqi,China,830054","institution_ids":["https://openalex.org/I1334729051"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100355339","display_name":"Yong Li","orcid":"https://orcid.org/0000-0002-1183-5359"},"institutions":[{"id":"https://openalex.org/I1334729051","display_name":"Xinjiang Normal University","ror":"https://ror.org/00ndrvk93","country_code":"CN","type":"education","lineage":["https://openalex.org/I1334729051"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Li","raw_affiliation_strings":["Xinjiang Normal University,College of Computer Science and Technology,Urumqi,China,830054"],"affiliations":[{"raw_affiliation_string":"Xinjiang Normal University,College of Computer Science and Technology,Urumqi,China,830054","institution_ids":["https://openalex.org/I1334729051"]}]},{"author_position":"last","author":{"id":null,"display_name":"Zheyuan Pan","orcid":null},"institutions":[{"id":"https://openalex.org/I1334729051","display_name":"Xinjiang Normal University","ror":"https://ror.org/00ndrvk93","country_code":"CN","type":"education","lineage":["https://openalex.org/I1334729051"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zheyuan Pan","raw_affiliation_strings":["Xinjiang Normal University,College of Computer Science and Technology,Urumqi,China,830054"],"affiliations":[{"raw_affiliation_string":"Xinjiang Normal University,College of Computer Science and Technology,Urumqi,China,830054","institution_ids":["https://openalex.org/I1334729051"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5061818362"],"corresponding_institution_ids":["https://openalex.org/I1334729051"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.4443568,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"168","last_page":"177"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.616599977016449,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.616599977016449,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12026","display_name":"Explainable Artificial Intelligence (XAI)","score":0.11550000309944153,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.10980000346899033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/interpretability","display_name":"Interpretability","score":0.7347999811172485},{"id":"https://openalex.org/keywords/satisfiability-modulo-theories","display_name":"Satisfiability modulo theories","score":0.5730999708175659},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4603999853134155},{"id":"https://openalex.org/keywords/formal-verification","display_name":"Formal verification","score":0.4404999911785126},{"id":"https://openalex.org/keywords/software-quality","display_name":"Software quality","score":0.43369999527931213},{"id":"https://openalex.org/keywords/formal-methods","display_name":"Formal methods","score":0.42329999804496765},{"id":"https://openalex.org/keywords/satisfiability","display_name":"Satisfiability","score":0.4009999930858612},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.3864000141620636},{"id":"https://openalex.org/keywords/model-checking","display_name":"Model checking","score":0.3824999928474426},{"id":"https://openalex.org/keywords/software-verification","display_name":"Software verification","score":0.34139999747276306}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7418000102043152},{"id":"https://openalex.org/C2781067378","wikidata":"https://www.wikidata.org/wiki/Q17027399","display_name":"Interpretability","level":2,"score":0.7347999811172485},{"id":"https://openalex.org/C164155591","wikidata":"https://www.wikidata.org/wiki/Q2067766","display_name":"Satisfiability modulo theories","level":2,"score":0.5730999708175659},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.47350001335144043},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4603999853134155},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4487999975681305},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.4404999911785126},{"id":"https://openalex.org/C117447612","wikidata":"https://www.wikidata.org/wiki/Q1412670","display_name":"Software quality","level":4,"score":0.43369999527931213},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.42980000376701355},{"id":"https://openalex.org/C75606506","wikidata":"https://www.wikidata.org/wiki/Q1049183","display_name":"Formal methods","level":2,"score":0.42329999804496765},{"id":"https://openalex.org/C168773769","wikidata":"https://www.wikidata.org/wiki/Q1350299","display_name":"Satisfiability","level":2,"score":0.4009999930858612},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.3864000141620636},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.3824999928474426},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3626999855041504},{"id":"https://openalex.org/C33054407","wikidata":"https://www.wikidata.org/wiki/Q6504747","display_name":"Software verification","level":5,"score":0.34139999747276306},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.34040001034736633},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.33640000224113464},{"id":"https://openalex.org/C76363472","wikidata":"https://www.wikidata.org/wiki/Q1437394","display_name":"Formal concept analysis","level":2,"score":0.3312000036239624},{"id":"https://openalex.org/C82214349","wikidata":"https://www.wikidata.org/wiki/Q657339","display_name":"Software metric","level":5,"score":0.3264000117778778},{"id":"https://openalex.org/C195344581","wikidata":"https://www.wikidata.org/wiki/Q2555318","display_name":"Automated reasoning","level":2,"score":0.3264000117778778},{"id":"https://openalex.org/C116253237","wikidata":"https://www.wikidata.org/wiki/Q1437424","display_name":"Formal specification","level":2,"score":0.3246000111103058},{"id":"https://openalex.org/C1009929","wikidata":"https://www.wikidata.org/wiki/Q179550","display_name":"Software bug","level":3,"score":0.32409998774528503},{"id":"https://openalex.org/C168065819","wikidata":"https://www.wikidata.org/wiki/Q845566","display_name":"Debugging","level":2,"score":0.3165000081062317},{"id":"https://openalex.org/C66429209","wikidata":"https://www.wikidata.org/wiki/Q7248499","display_name":"Programming complexity","level":5,"score":0.3111000061035156},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.3068999946117401},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.3018999993801117},{"id":"https://openalex.org/C106131492","wikidata":"https://www.wikidata.org/wiki/Q3072260","display_name":"Filter (signal processing)","level":2,"score":0.30160000920295715},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.2919999957084656},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.2858000099658966},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.2786000072956085},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.27619999647140503},{"id":"https://openalex.org/C51234621","wikidata":"https://www.wikidata.org/wiki/Q2149495","display_name":"Testability","level":2,"score":0.26330000162124634},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.262800008058548}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/qrs-c65679.2025.00030","is_oa":false,"landing_page_url":"https://doi.org/10.1109/qrs-c65679.2025.00030","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 25th International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320337504","display_name":"Research and Development","ror":"https://ror.org/027s68j25"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W1480909796","https://openalex.org/W2026312277","https://openalex.org/W2031525781","https://openalex.org/W2033872649","https://openalex.org/W2048737604","https://openalex.org/W2410001329","https://openalex.org/W2516809705","https://openalex.org/W2885541650","https://openalex.org/W2953460080","https://openalex.org/W2953796333","https://openalex.org/W2981731882","https://openalex.org/W3013745307","https://openalex.org/W3157699413","https://openalex.org/W3159623433","https://openalex.org/W3166696835","https://openalex.org/W3168910894","https://openalex.org/W3206383478","https://openalex.org/W4220744773","https://openalex.org/W4226075536","https://openalex.org/W4283820034","https://openalex.org/W4308095718","https://openalex.org/W4382202830","https://openalex.org/W4386833438","https://openalex.org/W4387581527","https://openalex.org/W4387674229","https://openalex.org/W4390321324","https://openalex.org/W4391407003","https://openalex.org/W4396894041","https://openalex.org/W4401321189","https://openalex.org/W4402508684","https://openalex.org/W4408733053","https://openalex.org/W6884612589"],"related_works":[],"abstract_inverted_index":{"With":[0],"the":[1,54,121,134,153,161,193,212],"increasing":[2],"scale":[3],"and":[4,56,146,160,195,208,214],"complexity":[5],"of":[6,36,58,120,217],"software":[7,9,19,23,106],"systems,":[8],"defect":[10,24,107,123],"prediction":[11,25,75],"has":[12,68],"become":[13],"an":[14],"indispensable":[15],"tool":[16],"for":[17,73,104],"maintaining":[18],"quality.":[20],"However,":[21],"existing":[22],"models":[26,60],"often":[27],"operate":[28],"as":[29,206],"black":[30],"boxes,":[31],"leading":[32],"to":[33,115,167,185],"a":[34,49,100,117,128,180],"lack":[35,80],"interpretability":[37,203],"in":[38,52],"their":[39,84],"predictions":[40],"during":[41],"practical":[42,85,215],"applications.":[43],"Explainable":[44],"Artificial":[45],"Intelligence":[46],"(XAI)":[47],"plays":[48],"pivotal":[50],"role":[51],"enhancing":[53],"transparency":[55],"reliability":[57,213],"these":[59,77],"by":[61,156,178],"providing":[62],"human-understandable":[63],"explanations.":[64,189],"While":[65],"previous":[66],"research":[67],"explored":[69],"various":[70],"model-agnostic":[71],"techniques":[72],"interpreting":[74],"results,":[76],"explanations":[78,177],"frequently":[79],"formal":[81,101,118,129],"guarantees,":[82],"limiting":[83],"utility.":[86],"To":[87],"address":[88],"this":[89,91],"limitation,":[90],"study":[92],"introduces":[93],"SDPFE":[94,109,200],"(Software":[95],"Defect":[96],"Prediction":[97],"Formal":[98],"Explainer),":[99],"reasoning-based":[102],"method":[103],"elucidating":[105],"predictions.":[108],"leverages":[110],"Satisfiability":[111],"Modulo":[112],"Theories":[113],"(SMT)":[114],"conduct":[116],"analysis":[119],"XGBoost":[122],"model.":[124],"Initially,":[125],"it":[126,151,173],"constructs":[127],"reasoning":[130],"model":[131],"that":[132,199],"translates":[133],"tree":[135],"structure":[136],"into":[137],"verifiable":[138],"SMT":[139],"atomic":[140],"predicates":[141],"through":[142],"path":[143],"exclusivity-based":[144],"derivation":[145],"dynamic":[147],"threshold":[148],"constraints.":[149],"Subsequently,":[150],"optimizes":[152],"explanation":[154],"process":[155],"integrating":[157],"weight":[158],"normalization":[159],"Minimal":[162],"Unsatisfiable":[163],"Core":[164],"(MUS)":[165],"algorithm":[166],"filter":[168],"critical":[169],"feature":[170],"subsets.":[171],"Finally,":[172],"generates":[174],"minimal":[175],"effective":[176],"designing":[179],"conflict-guided":[181],"incremental":[182],"enumeration":[183],"mechanism":[184],"produce":[186],"optimal":[187],"combinatorial":[188],"Experimental":[190],"results":[191],"on":[192],"OpenStack":[194],"Qt":[196],"datasets":[197],"demonstrate":[198],"outperforms":[201],"mainstream":[202],"methods":[204],"such":[205],"LIME":[207],"SHAP,":[209],"thereby":[210],"validating":[211],"significance":[216],"our":[218],"approach.":[219]},"counts_by_year":[],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-31T00:00:00"}
