A cross-item defect prediction method using adversarial learning

In today’s information society, the rapid growth of information technology has resulted in software products being integrated into every aspect of people’s lives. Consequently, the ability to accurately identify software modules that may cause problems within a specified time frame has become crucia...

Full description

Bibliographic Details
Published in:Journal of Autonomous Intelligence
Main Author: Ma J.; Zain J.M.; Wang D.; Shi J.
Format: Article
Language:English
Published: Frontier Scientific Publishing 2024
Online Access:https://www.scopus.com/inward/record.uri?eid=2-s2.0-85185701078&doi=10.32629%2fjai.v7i4.641&partnerID=40&md5=fec2051e314ae964c3211033579fd9d5
id 2-s2.0-85185701078
spelling 2-s2.0-85185701078
Ma J.; Zain J.M.; Wang D.; Shi J.
A cross-item defect prediction method using adversarial learning
2024
Journal of Autonomous Intelligence
7
4
10.32629/jai.v7i4.641
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85185701078&doi=10.32629%2fjai.v7i4.641&partnerID=40&md5=fec2051e314ae964c3211033579fd9d5
In today’s information society, the rapid growth of information technology has resulted in software products being integrated into every aspect of people’s lives. Consequently, the ability to accurately identify software modules that may cause problems within a specified time frame has become crucial for determining software development progress. This is because ensuring software dependability is a critical component of software development. In this paper, the enhanced abstract continuous generative adversarial network (AC-GAN) technique covers data processing and model construction. Three levels: (1) convert the code of the source project and the target project into the form of an abstract syntax tree (Unified Abstract Syntax Tree, UAST), then traverse the abstract syntax tree in a depth-first manner to obtain a node sequence, and then use continuous recursion to replace the nodes in the node sequence; (2) the processed numerical vectors are sent to the GAN-based model; (3) the GAN-based model generates the final word vectors. The network structure model is utilized for feature extraction and data transfer, and a binary classifier is then employed to determine if the target item code file is flawed. 15 sets of source-target item pairings are used to evaluate the AC-GAN approach. The experimental findings demonstrate the usefulness of the technique. © 2024 by author(s).
Frontier Scientific Publishing
26305046
English
Article

author Ma J.; Zain J.M.; Wang D.; Shi J.
spellingShingle Ma J.; Zain J.M.; Wang D.; Shi J.
A cross-item defect prediction method using adversarial learning
author_facet Ma J.; Zain J.M.; Wang D.; Shi J.
author_sort Ma J.; Zain J.M.; Wang D.; Shi J.
title A cross-item defect prediction method using adversarial learning
title_short A cross-item defect prediction method using adversarial learning
title_full A cross-item defect prediction method using adversarial learning
title_fullStr A cross-item defect prediction method using adversarial learning
title_full_unstemmed A cross-item defect prediction method using adversarial learning
title_sort A cross-item defect prediction method using adversarial learning
publishDate 2024
container_title Journal of Autonomous Intelligence
container_volume 7
container_issue 4
doi_str_mv 10.32629/jai.v7i4.641
url https://www.scopus.com/inward/record.uri?eid=2-s2.0-85185701078&doi=10.32629%2fjai.v7i4.641&partnerID=40&md5=fec2051e314ae964c3211033579fd9d5
description In today’s information society, the rapid growth of information technology has resulted in software products being integrated into every aspect of people’s lives. Consequently, the ability to accurately identify software modules that may cause problems within a specified time frame has become crucial for determining software development progress. This is because ensuring software dependability is a critical component of software development. In this paper, the enhanced abstract continuous generative adversarial network (AC-GAN) technique covers data processing and model construction. Three levels: (1) convert the code of the source project and the target project into the form of an abstract syntax tree (Unified Abstract Syntax Tree, UAST), then traverse the abstract syntax tree in a depth-first manner to obtain a node sequence, and then use continuous recursion to replace the nodes in the node sequence; (2) the processed numerical vectors are sent to the GAN-based model; (3) the GAN-based model generates the final word vectors. The network structure model is utilized for feature extraction and data transfer, and a binary classifier is then employed to determine if the target item code file is flawed. 15 sets of source-target item pairings are used to evaluate the AC-GAN approach. The experimental findings demonstrate the usefulness of the technique. © 2024 by author(s).
publisher Frontier Scientific Publishing
issn 26305046
language English
format Article
accesstype
record_format scopus
collection Scopus
_version_ 1809677573645402112