Computer Science ›› 2018, Vol. 45 ›› Issue (6): 161-165.doi: 10.11896/j.issn.1002-137X.2018.06.028

• Software & Database Technology • Previous Articles     Next Articles

Multi-objective Supervised Defect Prediction Modeling Method Based on Code Changes

CHEN Xiang1,2,3, WANG Qiu-ping1   

  1. School of Computer Science and Technology,Nantong University,Nantong,Jiangshu 226019,China1;
    State Key Laboratory for Novel Software Technology at Nanjing University,Nanjing 210093,China2;
    Guangxi Key Laboratory of Trusted Software,Guilin University of Electronic Technology,Guilin,Guangxi 541004,China3
  • Received:2017-04-24 Online:2018-06-15 Published:2018-07-24

Abstract: Defect prediction based on code changes has the advantage of smaller code inspection cost,easy fault localization and rapid fixing.This paper firstly formalized this problem as a multi-objective optimization problem.One objective is to maximize the number of identified buggy changes,and the other objective is to minimize the cost of code inspection.There exist an obvious conflict between two objectives,so this paper proposed a novel method MULTI.This me-thod can generate a set of non-dominated prediction models.In the empirical studies,this paper chose six large-scale open source projects (with 227417code changes in total) and considerd ACC and POPT as evaluation indicators of perfor-mance.Final results show that the proposed method can perform significantly better than the state-of-the-art supervised methods (i.e.,EALR and Logistic) and unsupervised methods (i.e.,LT and AGE).

Key words: Software defect prediction, Multi-objective optimization, Code changes, Empirical studies

CLC Number: 

  • TP311.5
[1]CHEN X,GU Q,LIU W S,et al.Survey of static software defect prediction[J].Journal of Software,2016,27(1):1-25.(in Chinese)
[2]MOCKUS A,WEISS D M.Predicting risk of software changes[J].Bell Labs Technical Journal,2000,5(2):169-180.
[3]KAMEI Y,SHIHAB E,ADAMS B,et al.A large-scale empirical study of just-in-time quality assurance[J].IEEE Transactions on Software Engineering,2013,39(6):757-773.
[4]YANG X,LO D,XIA X,et al.Deep learning for just-in-time defect prediction[C]//International Conference on Software Qua-lity,Reliability,and Security.2015:17-26.
[5]KIM S,JR E J W,ZHANG Y.Classifying software changes:clean or buggy?[J].IEEE Transactions on Software Enginee-ring,2008,34(2):181-196.
[6]SHIVAJI S,WHITEHEAD E J,AKELLA R,et al.reducing features to improve code change-based bug prediction[J].IEEE Transactions on Software Engineering,2013,39(4):552-569.
[7]YANG Y,ZHOU Y,LIU J,et al.Effort-aware just-in-time defect prediction:simple unsupervised models could be better than supervised models[C]//Proceedings of the International Symposium on Foundations of Software Engineering.2016,157-168.
[8]HARMAN M,MANSOURI S A,ZHANG Y.Search-based software engineering:trends,techniques and applications[J].ACM Computing Survey,2012,45(1):1-61.
[9]HARMAN M.The relationship between search based software engineering and predictive modeling[C]//International Confe-rence on Predictive Models in Software Engineering.2010:1-13.
[10]DEB K,PRATAP A,AGARWAL S,et al.A fast and elitist multi-objective genetic algorithm:NSGA-II[J].IEEE Transactions on Evolutionary Computation,2002,6(2):182-197.
[11]TAN M,TAN L,DARA S,et defect prediction for imbalance data[C]//International Conference on Software Engineering.2015:99-108.
[12]BENJAMINI Y,HOCHBERG Y.controlling the false discovery rate:a practical and powerful approach to multiple testing[J].Journal of the Royal Statistical Society,Series B (Methodological),1995,57(1):289-300.
[13]ZITZLER E,THIELE L.Multiobjective evolutionary algorithms:a comparative case study and the strength pareto approach[J].IEEE Transactions on Evolutionary Computation,1999,3(4):257-271.
[14]LIU W S,CHEN X,GU Q,et al.A cluster-analysis-based feature-selection method for software defect prediction[J].SCIENCE CHINA:Information Sciences,2016,46(9):1298-1320.(in Chinese)
[15]LIU W S,CHEN X,GU Q,et al.A Noise Tolerable Feature Selection Framework for Software Defect Prediction[J].Chinese Journal of Computers,2018,41(3):506-520.(in Chinese)
[1] DONG Ming-gang,LIU Bao,JING Chao. Multi-objective Differential Evolution Algorithm with Fuzzy Adaptive Ranking-based Mutation [J]. Computer Science, 2019, 46(7): 224-232.
[2] XUE Can-guan, YAN Xue-feng. Software Defect Prediction Based on Improved Deep Forest Algorithm [J]. Computer Science, 2018, 45(8): 160-165.
[3] MA Yuan-feng,LI Ang-ru,YU Hui-min,PAN Xiao-ying. Dynamic Crowding Distance-based Hybrid Immune Algorithm for Multi-objective Optimization Problem [J]. Computer Science, 2018, 45(6A): 63-68.
[4] LAI Wen-xing, DENG Zhong-min. Improved NSGA2 Algorithm Based on Dominant Strength [J]. Computer Science, 2018, 45(6): 187-192.
[5] WANG Guo-hao, LI Qing-hua and LIU An-feng. Evoluation Genetic Algorithm of Multi-objective Optimization Scheduling on Cloud Workflow [J]. Computer Science, 2018, 45(5): 31-37.
[6] XIONG Li-rong, YOU Ri-jing, JIN Xin. Sensor-based Adaptive Rate Control Method for Mobile Streaming [J]. Computer Science, 2018, 45(10): 124-129.
[7] YAN Hong. Research and Application of Multi-objective Optimization Algorithm Based on Interval Reliability Lower Bound [J]. Computer Science, 2017, 44(Z11): 577-579, 585.
[8] LI Wei-kun, QUE Bo, WANG Wan-liang and NI Li-zhou. Multi-objective Moth-flame Optimization Algorithm Based Optimal Reactive Power Dispatch for Power System [J]. Computer Science, 2017, 44(Z11): 503-509.
[9] ZHU Hua-min, WU Li-fa and ZHAO Peng. Research on Deployment Decision Method of Virtual Application Network in Multi-cloud Environment [J]. Computer Science, 2017, 44(Z11): 286-292.
[10] YANG Jie, YAN Xue-feng and ZHANG De-ping. Cost-sensitive Software Defect Prediction Method Based on Boosting [J]. Computer Science, 2017, 44(8): 176-180, 206.
[11] ZHANG Xun, GU Chun-hua, LUO Fei, CHANG Yao-hui and WEN Geng. Virtual Machine Placement Strategy Based on Dynamic Programming [J]. Computer Science, 2017, 44(8): 54-59, 75.
[12] CHEN Yi-ou, LV Xin-ke and LING Xiang. New Task Scheduling Technique for Multicore Arrays [J]. Computer Science, 2017, 44(8): 42-45, 70.
[13] YUAN Wen-bing, CHANG Liang, XU Zhou-bo and GU Tian-long. Multi-plant Assembly Sequence Planning Based on Fruit Fly Optimization Algorithm [J]. Computer Science, 2017, 44(4): 246-251.
[14] GAN Lu, ZANG Lie and LI Hang. Deep Belief Network Software Defect Prediction Model [J]. Computer Science, 2017, 44(4): 229-233.
[15] GAO Guang, ZHAO Xin-can and WANG Li-ming. Multi-objective Signal Simulation Optimization for Urban Oversaturated Arterial [J]. Computer Science, 2017, 44(10): 209-215.
Full text



[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[3] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[4] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[5] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[6] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[7] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[8] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[9] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[10] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .