{"id":"https://openalex.org/W4415744168","doi":"https://doi.org/10.1109/qrs-c65679.2025.00034","title":"Software Defect Prediction Based on Gated Fusion of Pre-trained Models","display_name":"Software Defect Prediction Based on Gated Fusion of Pre-trained Models","publication_year":2025,"publication_date":"2025-07-16","ids":{"openalex":"https://openalex.org/W4415744168","doi":"https://doi.org/10.1109/qrs-c65679.2025.00034"},"language":null,"primary_location":{"id":"doi:10.1109/qrs-c65679.2025.00034","is_oa":false,"landing_page_url":"https://doi.org/10.1109/qrs-c65679.2025.00034","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 25th International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101644347","display_name":"Jianhao Li","orcid":"https://orcid.org/0009-0003-7370-0913"},"institutions":[{"id":"https://openalex.org/I118574674","display_name":"Jiangsu Normal University","ror":"https://ror.org/051hvcm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I118574674"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jianhao Li","raw_affiliation_strings":["Jiangsu Normal University,School of Computer Science and Technology,Xuzhou,China"],"affiliations":[{"raw_affiliation_string":"Jiangsu Normal University,School of Computer Science and Technology,Xuzhou,China","institution_ids":["https://openalex.org/I118574674"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009184834","display_name":"Yi Zhu","orcid":"https://orcid.org/0000-0003-3045-2588"},"institutions":[{"id":"https://openalex.org/I118574674","display_name":"Jiangsu Normal University","ror":"https://ror.org/051hvcm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I118574674"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yi Zhu","raw_affiliation_strings":["Jiangsu Normal University,School of Computer Science and Technology,Xuzhou,China"],"affiliations":[{"raw_affiliation_string":"Jiangsu Normal University,School of Computer Science and Technology,Xuzhou,China","institution_ids":["https://openalex.org/I118574674"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101732858","display_name":"Yu Qiao","orcid":"https://orcid.org/0000-0003-0962-826X"},"institutions":[{"id":"https://openalex.org/I118574674","display_name":"Jiangsu Normal University","ror":"https://ror.org/051hvcm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I118574674"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiao Yu","raw_affiliation_strings":["Jiangsu Normal University,School of Computer Science and Technology,Xuzhou,China"],"affiliations":[{"raw_affiliation_string":"Jiangsu Normal University,School of Computer Science and Technology,Xuzhou,China","institution_ids":["https://openalex.org/I118574674"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011118795","display_name":"Yi\ufffd Ding","orcid":"https://orcid.org/0000-0001-5035-9255"},"institutions":[{"id":"https://openalex.org/I118574674","display_name":"Jiangsu Normal University","ror":"https://ror.org/051hvcm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I118574674"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yi Ding","raw_affiliation_strings":["Jiangsu Normal University,School of Computer Science and Technology,Xuzhou,China"],"affiliations":[{"raw_affiliation_string":"Jiangsu Normal University,School of Computer Science and Technology,Xuzhou,China","institution_ids":["https://openalex.org/I118574674"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012271614","display_name":"Chongyang Huang","orcid":"https://orcid.org/0000-0002-9781-0258"},"institutions":[{"id":"https://openalex.org/I118574674","display_name":"Jiangsu Normal University","ror":"https://ror.org/051hvcm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I118574674"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chongyang Huang","raw_affiliation_strings":["Jiangsu Normal University,School of Computer Science and Technology,Xuzhou,China"],"affiliations":[{"raw_affiliation_string":"Jiangsu Normal University,School of Computer Science and Technology,Xuzhou,China","institution_ids":["https://openalex.org/I118574674"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101644347"],"corresponding_institution_ids":["https://openalex.org/I118574674"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.46954407,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"204","last_page":"213"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.951200008392334,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.951200008392334,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.012299999594688416,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.007000000216066837,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/semantics","display_name":"Semantics (computer science)","score":0.6377000212669373},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.6154000163078308},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5464000105857849},{"id":"https://openalex.org/keywords/syntax","display_name":"Syntax","score":0.5268999934196472},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4221000075340271},{"id":"https://openalex.org/keywords/semantic-data-model","display_name":"Semantic data model","score":0.41819998621940613},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.39910000562667847},{"id":"https://openalex.org/keywords/software-bug","display_name":"Software bug","score":0.3806000053882599}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7865999937057495},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.6377000212669373},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.6154000163078308},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5464000105857849},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5313000082969666},{"id":"https://openalex.org/C60048249","wikidata":"https://www.wikidata.org/wiki/Q37437","display_name":"Syntax","level":2,"score":0.5268999934196472},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4221000075340271},{"id":"https://openalex.org/C90312973","wikidata":"https://www.wikidata.org/wiki/Q7449052","display_name":"Semantic data model","level":2,"score":0.41819998621940613},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4172999858856201},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.39910000562667847},{"id":"https://openalex.org/C1009929","wikidata":"https://www.wikidata.org/wiki/Q179550","display_name":"Software bug","level":3,"score":0.3806000053882599},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3443000018596649},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.3328999876976013},{"id":"https://openalex.org/C114408938","wikidata":"https://www.wikidata.org/wiki/Q333373","display_name":"Abstract syntax","level":3,"score":0.3303999900817871},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.3138999938964844},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.30410000681877136},{"id":"https://openalex.org/C130318100","wikidata":"https://www.wikidata.org/wiki/Q2268914","display_name":"Semantic similarity","level":2,"score":0.29600000381469727},{"id":"https://openalex.org/C193125573","wikidata":"https://www.wikidata.org/wiki/Q7449065","display_name":"Semantic interpretation","level":2,"score":0.2840999960899353},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.2621000111103058},{"id":"https://openalex.org/C85407183","wikidata":"https://www.wikidata.org/wiki/Q1045785","display_name":"Semantic network","level":2,"score":0.2614000141620636},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.25940001010894775}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/qrs-c65679.2025.00034","is_oa":false,"landing_page_url":"https://doi.org/10.1109/qrs-c65679.2025.00034","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 25th International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1964962870","https://openalex.org/W1978859404","https://openalex.org/W2026312277","https://openalex.org/W2061019658","https://openalex.org/W2074636452","https://openalex.org/W2158864412","https://openalex.org/W2316930373","https://openalex.org/W2743316948","https://openalex.org/W2898435572","https://openalex.org/W2901941771","https://openalex.org/W2937381238","https://openalex.org/W2998056950","https://openalex.org/W3098605233","https://openalex.org/W3110943671","https://openalex.org/W3133782093","https://openalex.org/W4213103335","https://openalex.org/W4221166942","https://openalex.org/W4293072433","https://openalex.org/W4293764002","https://openalex.org/W4312436517","https://openalex.org/W4379618990","https://openalex.org/W4391582462"],"related_works":[],"abstract_inverted_index":{"With":[0],"the":[1,6,18,32,48,52,61,65,73,88,93,98,102,125,129,135,142,147,154,158,162,172,178,186,192,195,198],"increasing":[2],"size":[3],"of":[4,8,35,44,51,64,92,109,128,161,197],"software,":[5],"number":[7],"software":[9,22,29,39],"defects":[10,30],"is":[11,25],"also":[12],"increasing.":[13],"In":[14,81],"order":[15],"to":[16,27,59,71,78,123,139,167],"minimize":[17],"harm":[19],"caused":[20],"by":[21,104,175],"defects,":[23],"it":[24],"necessary":[26],"predict":[28],"at":[31],"early":[33],"stage":[34],"development.":[36],"Existing":[37],"traditional":[38,143,155],"defect":[40],"prediction":[41],"often":[42,69],"consists":[43],"manual":[45],"features,":[46,144,185],"ignoring":[47],"semantic":[49,62,75,126,159,184],"features":[50,127,156,160],"source":[53,66,130,163],"code.":[54],"Deep":[55],"learning":[56,105],"uses":[57],"AST":[58],"obtain":[60],"relationship":[63,100],"code,":[67,131],"which":[68,151],"fails":[70],"capture":[72],"deep":[74],"information":[76],"due":[77],"its":[79],"limitation.":[80],"recent":[82],"studies,":[83],"pre-trained":[84,121],"models":[85,122],"can":[86],"understand":[87],"syntax":[89],"and":[90,145,157,191],"semantics":[91],"code":[94,164],"as":[95,97],"well":[96],"logical":[99],"between":[101],"codes":[103],"a":[106],"large":[107],"amount":[108],"corpus":[110],"data":[111],"through":[112],"self-supervised":[113],"learning.":[114],"Based":[115],"on":[116],"this,":[117],"we":[118,133],"use":[119,134],"three":[120],"extract":[124],"meanwhile,":[132],"gated":[136],"network":[137],"mechanism":[138],"effectively":[140],"integrate":[141],"propose":[146],"Gated":[148],"Hierarchical":[149],"LLM(GH_LLM),":[150],"proves":[152],"that":[153],"are":[165,189],"complementary":[166],"each":[168],"other.":[169],"Afterwards,":[170],"in":[171],"PROMISE":[173],"dataset,":[174],"comparing":[176],"with":[177],"existing":[179],"baseline":[180],"model":[181],"for":[182],"extracting":[183],"relevant":[187],"metrics":[188],"improved,":[190],"experiments":[193],"verify":[194],"effectiveness":[196],"proposed":[199],"method.":[200]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-31T00:00:00"}
