{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:37:42Z","timestamp":1771699062240,"version":"3.50.1"},"reference-count":70,"publisher":"Institution of Engineering and Technology (IET)","issue":"4","license":[{"start":{"date-parts":[[2022,5,17]],"date-time":"2022-05-17T00:00:00Z","timestamp":1652745600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872312"],"award-info":[{"award-number":["61872312"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972335"],"award-info":[{"award-number":["61972335"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62002309"],"award-info":[{"award-number":["62002309"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["ietresearch.onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["IET Software"],"published-print":{"date-parts":[[2022,8]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Bug localization is an important field in software engineering research. The traditional bug localization approaches based on information retrieval separate words through lexical analysis. In this way, the comments of the source code are ignored or treated as plain text, which will lose some semantic information. In this paper, MBL_SHL, an automatic Method\u2010level Bug Localization approach, which utilises code Summarization, Historical fixed bugs and code Length, is presented. Based on the code summarization technology, this approach first supplements the comment for uncommented code, and then calculates the Word2vec vector and Term Frequency\u2013Inverse Document Frequency vector for the bug report, methods and comments, respectively. After that the authors calculate separately the similarity between the bug report and each method, the bug report and each comment. The code length information and historical fix information are also considered as a weight and a part of the score, respectively, to calculate the final score of each method. Finally, the scores are sorted to determine the list of methods that may need to be modified when fixing the software bugs. We built a method\u2010granular bug localization dataset, which contains five open\u2010source projects. The experimental results show that the proposed approach significantly outperforms the existing approaches on the method level.<\/jats:p>","DOI":"10.1049\/sfw2.12060","type":"journal-article","created":{"date-parts":[[2022,5,18]],"date-time":"2022-05-18T00:07:44Z","timestamp":1652832464000},"page":"422-437","update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["An approach of method\u2010level bug localization"],"prefix":"10.1049","volume":"16","author":[{"given":"Zhen","family":"Ni","sequence":"first","affiliation":[{"name":"School of Information Engineering Yangzhou University  Yangzhou China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7267-4923","authenticated-orcid":false,"given":"Lili","family":"Bo","sequence":"additional","affiliation":[{"name":"School of Information Engineering Yangzhou University  Yangzhou China"},{"name":"State Key Laboratory for Novel Software Technology Nanjing University  Nanjing China"},{"name":"Key Laboratory of Safety\u2010Critical Software (Nanjing University of Aeronautics and Astronautics) Ministry of Industry and Information Technology  Nanjing China"}]},{"given":"Bin","family":"Li","sequence":"additional","affiliation":[{"name":"School of Information Engineering Yangzhou University  Yangzhou China"},{"name":"Jiangsu Province Engineering Research Center of Knowledge Management and Intelligent Service Yangzhou University  Yangzhou China"}]},{"given":"Tianhao","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Information Engineering Yangzhou University  Yangzhou China"}]},{"given":"Xiaobing","family":"Sun","sequence":"additional","affiliation":[{"name":"School of Information Engineering Yangzhou University  Yangzhou China"},{"name":"State Key Laboratory for Novel Software Technology Nanjing University  Nanjing China"},{"name":"Jiangsu Province Engineering Research Center of Knowledge Management and Intelligent Service Yangzhou University  Yangzhou China"}]},{"given":"Xiaoxue","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Information Engineering Yangzhou University  Yangzhou China"},{"name":"Jiangsu Province Engineering Research Center of Knowledge Management and Intelligent Service Yangzhou University  Yangzhou China"}]}],"member":"265","published-online":{"date-parts":[[2022,5,17]]},"reference":[{"key":"e_1_2_13_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2019.03.001"},{"key":"e_1_2_13_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515\u2010022\u201000325\u20101"},{"key":"e_1_2_13_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110538"},{"key":"e_1_2_13_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11704\u2010020\u20109441\u20101"},{"key":"e_1_2_13_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.107098"},{"key":"e_1_2_13_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2011.15"},{"key":"e_1_2_13_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-C.2017.102"},{"key":"e_1_2_13_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2010.04.002"},{"key":"e_1_2_13_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227210"},{"key":"e_1_2_13_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635874"},{"key":"e_1_2_13_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2015.2479232"},{"key":"e_1_2_13_13_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1801"},{"key":"e_1_2_13_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970359"},{"key":"e_1_2_13_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.11.002"},{"key":"e_1_2_13_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515\u2010017\u20100226\u20101"},{"key":"e_1_2_13_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.08.012"},{"key":"e_1_2_13_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2894976"},{"key":"e_1_2_13_19_1","unstructured":"Koyuncu A. et\u00a0al.:D&c: a divide\u2010and\u2010conquer approach to ir\u2010based bug localization arXiv preprint arXiv:190202703 (2019)"},{"key":"e_1_2_13_20_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1509"},{"key":"e_1_2_13_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.73"},{"key":"e_1_2_13_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931051"},{"key":"e_1_2_13_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.70"},{"key":"e_1_2_13_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2013.27"},{"key":"e_1_2_13_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CTS.2015.7210439"},{"key":"e_1_2_13_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.06.001"},{"key":"e_1_2_13_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321702"},{"key":"e_1_2_13_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00087"},{"key":"e_1_2_13_29_1","first-page":"3104","volume-title":"Advances in Neural Information Processing Systems","author":"Sutskever I.","year":"2014"},{"key":"e_1_2_13_30_1","doi-asserted-by":"crossref","unstructured":"Luong M.T. Pham H.andManning C.D.:Effective approaches to attention\u2010based neural machine translation arXiv preprint arXiv:150804025 (2015)","DOI":"10.18653\/v1\/D15-1166"},{"key":"e_1_2_13_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642982"},{"key":"e_1_2_13_32_1","volume-title":"Search engines: Information retrieval in practice","author":"Croft W.B.","year":"2010"},{"key":"e_1_2_13_33_1","doi-asserted-by":"publisher","DOI":"10.3758\/bf03203370"},{"key":"e_1_2_13_34_1","volume-title":"Introduction to information retrieval","author":"Sch\u00fctze H.","year":"2008"},{"key":"e_1_2_13_35_1","unstructured":"Mikolov T. et\u00a0al.:Efficient estimation of word representations in vector space arXiv preprint arXiv:13013781 (2013)"},{"key":"e_1_2_13_36_1","unstructured":"Sayer N.:Google code archive\u2010long\u2010term storage for google code project hosting XP055260798 Retrieved from the Internet [retrieved on 20160323] (2014)"},{"key":"e_1_2_13_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2015.49"},{"key":"e_1_2_13_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884862"},{"key":"e_1_2_13_39_1","first-page":"1606","article-title":"Learning unified features from natural and programming languages for locating buggy source code","volume":"16","author":"Huo X.","year":"2016","journal-title":"Int. Joint Conf. Artif. Intell."},{"key":"e_1_2_13_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2016.30"},{"key":"e_1_2_13_41_1","first-page":"1909","article-title":"Enhancing the unified features to locate buggy files by exploiting the sequential nature of source code","author":"Huo X.","year":"2017","journal-title":"Int. Joint Conf. Artif. Intell."},{"key":"e_1_2_13_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2018.00234"},{"key":"e_1_2_13_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.03.003"},{"key":"e_1_2_13_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3345629.3345632"},{"key":"e_1_2_13_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.08.002"},{"key":"e_1_2_13_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2019.2920771"},{"key":"e_1_2_13_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2936948"},{"key":"e_1_2_13_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.3006214"},{"key":"e_1_2_13_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/QRS51102.2020.00034"},{"key":"e_1_2_13_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2017.10.048"},{"key":"e_1_2_13_51_1","unstructured":"Bahdanau D. Cho K.andBengio Y.:Neural machine translation by jointly learning to align and translate arXiv preprint arXiv:14090473 (2014)"},{"key":"e_1_2_13_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.37"},{"key":"e_1_2_13_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693093"},{"key":"e_1_2_13_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2021.110961"},{"key":"e_1_2_13_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678546"},{"key":"e_1_2_13_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985451"},{"key":"e_1_2_13_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786880"},{"key":"e_1_2_13_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2018.2810892"},{"key":"e_1_2_13_59_1","unstructured":"Barbosa J.R. et\u00a0al.:Bulner: bug localization with word embeddings and network regularization arXiv preprint arXiv:190809876 2019"},{"key":"e_1_2_13_60_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5844"},{"key":"e_1_2_13_61_1","article-title":"Cooba: Cross\u2010project bug localization via adversarial transfer learning","author":"Zhu Z.","year":"2020","journal-title":"Int. Joint Conf. Artif. Intell."},{"key":"e_1_2_13_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387904.3389281"},{"key":"e_1_2_13_63_1","first-page":"348","volume-title":"2018 IEEE\/ACM 40th International Conference on Software Engineering","author":"Rahman M.M.","year":"2018"},{"key":"e_1_2_13_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236065"},{"key":"e_1_2_13_65_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664\u2010018\u20109672\u2010z"},{"key":"e_1_2_13_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2020.106334"},{"key":"e_1_2_13_67_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664\u2010020\u201009823\u2010w"},{"key":"e_1_2_13_68_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664\u2010021\u201010022\u20104"},{"key":"e_1_2_13_69_1","unstructured":"Devlin J. et\u00a0al.:Bert: pre\u2010training of deep bidirectional transformers for language understanding arXiv preprint arXiv:181004805 (2018)"},{"key":"e_1_2_13_70_1","unstructured":"Lan Z. et\u00a0al.:Albert: a lite bert for self\u2010supervised learning of language representations arXiv preprint arXiv:190911942 (2019)"},{"key":"e_1_2_13_71_1","doi-asserted-by":"crossref","unstructured":"Feng Z. et\u00a0al.:Codebert: a pre\u2010trained model for programming and natural languages arXiv preprint arXiv:200208155 (2020)","DOI":"10.18653\/v1\/2020.findings-emnlp.139"}],"container-title":["IET Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/sfw2.12060","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/sfw2.12060","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/sfw2.12060","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T22:07:39Z","timestamp":1761689259000},"score":1,"resource":{"primary":{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/10.1049\/sfw2.12060"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,17]]},"references-count":70,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,8]]}},"alternative-id":["10.1049\/sfw2.12060"],"URL":"https:\/\/doi.org\/10.1049\/sfw2.12060","archive":["Portico"],"relation":{},"ISSN":["1751-8806"],"issn-type":[{"value":"1751-8806","type":"print"}],"subject":[],"published":{"date-parts":[[2022,5,17]]},"assertion":[{"value":"2022-01-05","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-04-24","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-05-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}