{"id":"https://openalex.org/W4406255835","doi":"https://doi.org/10.18293/seke2024-025","title":"Software Defect Prediction via Code Grayscale Pixel Visualization with Fusion Attention (S)","display_name":"Software Defect Prediction via Code Grayscale Pixel Visualization with Fusion Attention (S)","publication_year":2024,"publication_date":"2024-10-28","ids":{"openalex":"https://openalex.org/W4406255835","doi":"https://doi.org/10.18293/seke2024-025"},"language":"en","primary_location":{"id":"doi:10.18293/seke2024-025","is_oa":true,"landing_page_url":"https://doi.org/10.18293/seke2024-025","pdf_url":"https://doi.org/10.18293/seke2024-025","source":{"id":"https://openalex.org/S4220650826","display_name":"Proceedings/Proceedings of the ... International Conference on Software Engineering and Knowledge Engineering","issn_l":"2325-9000","issn":["2325-9000","2325-9086"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Conferences on Software Engineering and Knowledge Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://doi.org/10.18293/seke2024-025","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037105307","display_name":"Shaojian Qiu","orcid":"https://orcid.org/0000-0002-4138-2514"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Shaojian Qiu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045056508","display_name":"Shaosheng Wang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shaosheng Wang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112956668","display_name":"Wei Rong","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wei Rong","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5107903346","display_name":"Lili Liao","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lili Liao","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5080413335","display_name":"Yi-Shen Lin","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yishen Lin","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5037105307"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.40365374,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2024","issue":null,"first_page":"170","last_page":"174"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.98580002784729,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.972100019454956,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/grayscale","display_name":"Grayscale","score":0.8486887812614441},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7654235363006592},{"id":"https://openalex.org/keywords/visualization","display_name":"Visualization","score":0.686169445514679},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.6372748613357544},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5951428413391113},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5707606077194214},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.497788667678833},{"id":"https://openalex.org/keywords/fusion","display_name":"Fusion","score":0.4727787971496582},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.4143780469894409},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3268547058105469},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.14969143271446228}],"concepts":[{"id":"https://openalex.org/C78201319","wikidata":"https://www.wikidata.org/wiki/Q685727","display_name":"Grayscale","level":3,"score":0.8486887812614441},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7654235363006592},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.686169445514679},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.6372748613357544},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5951428413391113},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5707606077194214},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.497788667678833},{"id":"https://openalex.org/C158525013","wikidata":"https://www.wikidata.org/wiki/Q2593739","display_name":"Fusion","level":2,"score":0.4727787971496582},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.4143780469894409},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3268547058105469},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.14969143271446228},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.18293/seke2024-025","is_oa":true,"landing_page_url":"https://doi.org/10.18293/seke2024-025","pdf_url":"https://doi.org/10.18293/seke2024-025","source":{"id":"https://openalex.org/S4220650826","display_name":"Proceedings/Proceedings of the ... International Conference on Software Engineering and Knowledge Engineering","issn_l":"2325-9000","issn":["2325-9000","2325-9086"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Conferences on Software Engineering and Knowledge Engineering","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.18293/seke2024-025","is_oa":true,"landing_page_url":"https://doi.org/10.18293/seke2024-025","pdf_url":"https://doi.org/10.18293/seke2024-025","source":{"id":"https://openalex.org/S4220650826","display_name":"Proceedings/Proceedings of the ... International Conference on Software Engineering and Knowledge Engineering","issn_l":"2325-9000","issn":["2325-9000","2325-9086"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Conferences on Software Engineering and Knowledge Engineering","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4579490052","display_name":null,"funder_award_id":"2022A151511","funder_id":"https://openalex.org/F4320337111","funder_display_name":"Basic and Applied Basic Research Foundation of Guangdong Province"},{"id":"https://openalex.org/G6536786679","display_name":null,"funder_award_id":"A1515110","funder_id":"https://openalex.org/F4320337111","funder_display_name":"Basic and Applied Basic Research Foundation of Guangdong Province"},{"id":"https://openalex.org/G8181024283","display_name":null,"funder_award_id":"2022A1515110564","funder_id":"https://openalex.org/F4320337111","funder_display_name":"Basic and Applied Basic Research Foundation of Guangdong Province"}],"funders":[{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null},{"id":"https://openalex.org/F4320337111","display_name":"Basic and Applied Basic Research Foundation of Guangdong Province","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4406255835.pdf","grobid_xml":"https://content.openalex.org/works/W4406255835.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W115686965","https://openalex.org/W2768918307","https://openalex.org/W2110031805","https://openalex.org/W2040020606","https://openalex.org/W4362659915","https://openalex.org/W2050926897","https://openalex.org/W2113071088","https://openalex.org/W2321543601","https://openalex.org/W1691631808","https://openalex.org/W1586320973"],"abstract_inverted_index":{"Software":[0],"defect":[1,20,35,47,128],"prediction":[2,21,48,129],"helps":[3],"quality":[4],"assurance":[5],"teams":[6],"find":[7],"defects":[8],"in":[9],"software,":[10],"thereby":[11],"enhancing":[12],"the":[13,16,30,38,69,77,98,113,119],"reliability":[14],"of":[15,33,40,124],"systems.In":[17],"existing":[18],"code-visualization-based":[19],"methods,":[22],"challenges":[23],"arise":[24],"from":[25,112],"mixing":[26,84],"code":[27,41,52,63,91],"information":[28,78],"and":[29,67,85,101,121],"potential":[31],"omission":[32],"critical":[34],"features.To":[36],"enhance":[37],"completeness":[39],"features,":[42],"this":[43],"paper":[44],"proposes":[45],"a":[46,57,72,90],"model":[49],"based":[50],"on":[51,107],"grayscale":[53,65],"pixel":[54],"visualization":[55],"with":[56],"fusion":[58],"attention":[59],"mechanism":[60],"(Gpv2DP).Gpv2DP":[61],"converts":[62],"into":[64],"images":[66,70],"reshapes":[68],"to":[71],"standard":[73],"size,":[74],"effectively":[75],"alleviating":[76],"loss":[79],"problem":[80],"caused":[81],"by":[82],"element":[83],"image":[86],"cropping.Furthermore,":[87],"it":[88],"constructs":[89],"feature":[92],"extracting":[93],"network":[94],"that":[95,118],"simultaneously":[96],"integrates":[97],"channel,":[99],"spatial":[100],"3D":[102],"attention.We":[103],"conduct":[104],"empirical":[105],"experiments":[106],"ten":[108],"open-source":[109],"Java":[110],"projects":[111],"PROMISE":[114],"repository.The":[115],"results":[116],"show":[117],"F-measure":[120],"AUC":[122],"metrics":[123],"Gpv2DP":[125],"outperform":[126],"related":[127],"methods.":[130]},"counts_by_year":[],"updated_date":"2026-03-25T14:56:36.534964","created_date":"2025-10-10T00:00:00"}
