A survey on bug deduplication and triage methods from multiple points of view

C Qian, M Zhang, Y Nie, S Lu, H Cao - Applied Sciences, 2023 - mdpi.com
To address the issue of insufficient testing caused by the continuous reduction of software
development cycles, many organizations maintain bug repositories and bug tracking …

A discrete hidden Markov model for SMS spam detection

T Xia, X Chen - Applied Sciences, 2020 - mdpi.com
Many machine learning methods have been applied for short messaging service (SMS)
spam detection, including traditional methods such as naïve Bayes (NB), vector space …

Duplicate bug report detection and classification system based on deep learning technique

A Kukkar, R Mohana, Y Kumar, A Nayyar, M Bilal… - IEEE …, 2020 - ieeexplore.ieee.org
Duplicate bug report detection is a process of finding a duplicate bug report in the bug
tracking system. This process is essential to avoid unnecessary work and rediscovery. In …

Graph-based code semantics learning for efficient semantic code clone detection

D Yu, Q Yang, X Chen, J Chen, Y Xu - Information and Software …, 2023 - Elsevier
Recent studies have shown that high-quality code semantics learning can effectively
improve the performance of code clone detection. However, existing approaches suffer from …

Duplicate bug report detection using an attention-based neural language model

MB Messaoud, A Miladi, I Jenhani… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Context: Users and developers use bug tracking systems to report errors that occur during
the development and testing of software. The manual identification of duplicates is a tedious …

A weighted feature enhanced Hidden Markov Model for spam SMS filtering

T Xia, X Chen - Neurocomputing, 2021 - Elsevier
Short message service (SMS) is a most favored communication service people use in daily
life. However, this service is being misused by spammers. Rule based systems (RBS) and …

Automatic prediction of the severity of bugs using stack traces and categorical features

KK Sabor, M Hamdaqa, A Hamou-Lhadj - Information and Software …, 2020 - Elsevier
Context The severity of a bug is often used as an indicator of how a bug negatively affects
system functionality. It is used by developers to prioritize bugs which need to be fixed. The …

CASMS: Combining clustering with attention semantic model for identifying security bug reports

X Ma, J Keung, Z Yang, X Yu, Y Li, H Zhang - Information and Software …, 2022 - Elsevier
Context: Inappropriate public disclosure of security bug reports (SBRs) is likely to attract
malicious attackers to invade software systems; hence being able to detect SBRs has …

Hindbr: Heterogeneous information network based duplicate bug report prediction

G Xiao, X Du, Y Sui, T Yue - 2020 IEEE 31st international …, 2020 - ieeexplore.ieee.org
Duplicate bug reports often exist in bug tracking systems (BTSs). Almost all the existing
approaches for automatically detecting duplicate bug reports are based on text similarity. A …

Efficient feature extraction model for validation performance improvement of duplicate bug report detection in software bug triage systems

BS Neysiani, SM Babamir, M Aritsugi - Information and Software …, 2020 - Elsevier
Context There are many duplicate bug reports in the semi-structured software repository of
various software bug triage systems. The duplicate bug report detection (DBRD) process is a …