{"id":"https://openalex.org/W2896903901","doi":"https://doi.org/10.1145/3275219.3275239","title":"Classifying Bug Reports into Bugs and Non-bugs Using LSTM","display_name":"Classifying Bug Reports into Bugs and Non-bugs Using LSTM","publication_year":2018,"publication_date":"2018-09-16","ids":{"openalex":"https://openalex.org/W2896903901","doi":"https://doi.org/10.1145/3275219.3275239","mag":"2896903901"},"language":"en","primary_location":{"id":"doi:10.1145/3275219.3275239","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3275219.3275239","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Tenth Asia-Pacific Symposium on Internetware","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112698740","display_name":"Hanmin Qin","orcid":null},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hanmin Qin","raw_affiliation_strings":["Peking University"],"affiliations":[{"raw_affiliation_string":"Peking University","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102000914","display_name":"Xin Sun","orcid":"https://orcid.org/0000-0001-8225-2356"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xin Sun","raw_affiliation_strings":["Peking University"],"affiliations":[{"raw_affiliation_string":"Peking University","institution_ids":["https://openalex.org/I20231570"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5112698740"],"corresponding_institution_ids":["https://openalex.org/I20231570"],"apc_list":null,"apc_paid":null,"fwci":6.283,"has_fulltext":false,"cited_by_count":29,"citation_normalized_percentile":{"value":0.96796142,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8652826547622681},{"id":"https://openalex.org/keywords/software-bug","display_name":"Software bug","score":0.8544149398803711},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.7020586729049683},{"id":"https://openalex.org/keywords/scripting-language","display_name":"Scripting language","score":0.6178155541419983},{"id":"https://openalex.org/keywords/software-regression","display_name":"Software regression","score":0.5650554895401001},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.49537837505340576},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4569350779056549},{"id":"https://openalex.org/keywords/debugging","display_name":"Debugging","score":0.4300921857357025},{"id":"https://openalex.org/keywords/security-bug","display_name":"Security bug","score":0.4172670841217041},{"id":"https://openalex.org/keywords/software-maintenance","display_name":"Software maintenance","score":0.4103184938430786},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.39869654178619385},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.33146923780441284},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.2997902035713196},{"id":"https://openalex.org/keywords/software-quality","display_name":"Software quality","score":0.19350329041481018},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.1828918159008026},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.1116223931312561}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8652826547622681},{"id":"https://openalex.org/C1009929","wikidata":"https://www.wikidata.org/wiki/Q179550","display_name":"Software bug","level":3,"score":0.8544149398803711},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.7020586729049683},{"id":"https://openalex.org/C61423126","wikidata":"https://www.wikidata.org/wiki/Q187432","display_name":"Scripting language","level":2,"score":0.6178155541419983},{"id":"https://openalex.org/C191727507","wikidata":"https://www.wikidata.org/wiki/Q24346","display_name":"Software regression","level":5,"score":0.5650554895401001},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.49537837505340576},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4569350779056549},{"id":"https://openalex.org/C168065819","wikidata":"https://www.wikidata.org/wiki/Q845566","display_name":"Debugging","level":2,"score":0.4300921857357025},{"id":"https://openalex.org/C131275738","wikidata":"https://www.wikidata.org/wiki/Q7445023","display_name":"Security bug","level":5,"score":0.4172670841217041},{"id":"https://openalex.org/C101317890","wikidata":"https://www.wikidata.org/wiki/Q940053","display_name":"Software maintenance","level":4,"score":0.4103184938430786},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.39869654178619385},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.33146923780441284},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.2997902035713196},{"id":"https://openalex.org/C117447612","wikidata":"https://www.wikidata.org/wiki/Q1412670","display_name":"Software quality","level":4,"score":0.19350329041481018},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.1828918159008026},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.1116223931312561},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3275219.3275239","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3275219.3275239","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Tenth Asia-Pacific Symposium on Internetware","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1904365287","https://openalex.org/W2021946892","https://openalex.org/W2048766621","https://openalex.org/W2064675550","https://openalex.org/W2091863316","https://openalex.org/W2107277166","https://openalex.org/W2146335723","https://openalex.org/W2153579005","https://openalex.org/W2278507260","https://openalex.org/W2962783287","https://openalex.org/W4294170691"],"related_works":["https://openalex.org/W2044225531","https://openalex.org/W3048815537","https://openalex.org/W2123854374","https://openalex.org/W2038197060","https://openalex.org/W1980850370","https://openalex.org/W2967225146","https://openalex.org/W2095709152","https://openalex.org/W4317497242","https://openalex.org/W2135303064","https://openalex.org/W3185783519"],"abstract_inverted_index":{"Studies":[0],"have":[1],"found":[2],"that":[3],"significant":[4],"amount":[5],"of":[6],"bug":[7,21,25,42,95,100],"reports":[8,26,96],"are":[9,109],"misclassified":[10,99],"between":[11],"bugs":[12],"and":[13,70,91,97,103,117],"non-bugs,":[14],"which":[15,56],"inevitably":[16],"affects":[17],"relevant":[18],"studies,":[19],"e.g.,":[20],"prediction.":[22],"Manually":[23],"classifying":[24],"helps":[27],"reduce":[28],"the":[29,37],"noise":[30],"but":[31],"is":[32,57],"often":[33],"time-consuming.":[34],"To":[35],"ease":[36],"problem,":[38],"we":[39],"propose":[40],"a":[41,51],"classification":[43,62],"method":[44,65,69,73],"based":[45],"on":[46,74,111],"Long":[47],"Short-Term":[48],"Memory":[49],"(LSTM),":[50],"typical":[52],"recurrent":[53],"neural":[54],"network":[55],"widely":[58],"used":[59,105],"in":[60,106],"text":[61],"tasks.":[63],"Our":[64],"outperforms":[66],"existing":[67],"topic-based":[68],"n-gram":[71],"IDF-based":[72],"four":[75],"datasets":[76],"from":[77],"three":[78],"popular":[79],"JAVA":[80],"open":[81],"source":[82],"projects.":[83],"We":[84],"believe":[85],"our":[86,120],"work":[87,108],"can":[88],"assist":[89],"developers":[90],"researches":[92],"to":[93,115],"classify":[94],"identify":[98],"reports.":[101],"Datasets":[102],"scripts":[104],"this":[107],"provided":[110],"GitHub1":[112],"for":[113],"others":[114],"reproduce":[116],"further":[118],"improve":[119],"study.":[121]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":10},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
