An Empirical Study of IR-based Bug Localization for Deep Learning-based Software

被引:1
|
作者
Kim, Misoo [1 ]
Kim, Youngkyoung [2 ]
Lee, Eunseok [3 ]
机构
[1] Sungkyunkwan Univ, Inst Software Convergence, Suwon, South Korea
[2] Sungkyunkwan Univ, Dept Elect & Comp Engn, Suwon, South Korea
[3] Sungkyunkwan Univ, Coll Comp & Informat, Suwon, South Korea
基金
新加坡国家研究基金会;
关键词
Empirical study; Deep learning-related software; Information retrieval-based bug localization; !text type='Python']Python[!/text] bugs; CLASSIFIER CONFIGURATION; IMPACT;
D O I
10.1109/ICST53961.2022.00024
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
As the impact of deep-learning-based software (DLSW) increases, automatic debugging techniques for guaranteeing DLSW quality are becoming increasingly important. Information-retrieval-based bug localization (IRBL) techniques can aid in debugging by automatically localizing buggy entities (tiles and functions). The low-cost advantage of IRBL can alleviate the difficulty of identifying bug locations due to the complexity of DLSW. However, there are significant differences between DI SW and traditional software, and these differences lead to differences in search space and query quality for IRBL. That is, IRBL performance must be validated in DLSW. We empirically validated IRBL performance for DLSW from the following four perspectives: 1) similarity model, 2) query generation, 3) ranking model for buggy file localization, and 4) ranking model for buggy function localization. Based on four research questions and a large-scale experiment using 2,365 bug reports from 136 DLSW projects, we confirmed the salient characteristics of DLSW from the perspective of IRBL and derived four recommendations for practical IRBL usage in DLSW from the empirical results. Regarding IRBL performance, we validated that IRBL performance midi the combination of bug-related features outperformed that of using only file similarity by 15% and IRBL ranked buggy files and functions on average of 1.6th and 2.9th, respectively. Our study is valuable as a baseline for IRBL researchers and as a guideline for DLSW developers who wish to apply IRBL to ensure DLSW quality.
引用
收藏
页码:128 / 139
页数:12
相关论文
共 50 条
  • [31] Deep learning-based forgery identification and localization in videos
    Gowda, Raghavendra
    Pawar, Digambar
    [J]. SIGNAL IMAGE AND VIDEO PROCESSING, 2023, 17 (05) : 2185 - 2192
  • [32] Adversarial Attack on Deep Learning-Based Splice Localization
    Rozsa, Andras
    Zhong, Zheng
    Boult, Terrance E.
    [J]. 2020 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW 2020), 2020, : 2757 - 2765
  • [33] Deep Learning-Based Vein Localization on Embedded System
    Tang, Chaoying
    Xia, Shuhang
    Qian, Mengen
    Wang, Biao
    [J]. IEEE ACCESS, 2021, 9 : 27916 - 27927
  • [34] Deep Learning-based Localization in Limited Data Regimes
    Mitchell, Frost
    Baset, Aniqua
    Patwari, Neal
    Kasera, Sneha
    Bhaskara, Aditya
    [J]. PROCEEDINGS OF THE 2022 ACM WORKSHOP ON WIRELESS SECURITY AND MACHINE LEARNIG (WISEML '22), 2022, : 15 - 20
  • [35] Deep learning-based forgery identification and localization in videos
    Raghavendra Gowda
    Digambar Pawar
    [J]. Signal, Image and Video Processing, 2023, 17 : 2185 - 2192
  • [36] Deep Learning-based Beverage Recognition for Unmanned Vending Machines: An Empirical Study
    Zhang, Haijun
    Li, Donghai
    Ji, Yuzhu
    Zhou, Haibin
    Wu, Weiwei
    [J]. 2019 IEEE 17TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2019, : 1464 - 1467
  • [37] An Empirical Study of Deep Transfer Learning-Based Program Repair for Kotlin Projects
    Kim, Misoo
    Kim, Youngkyoung
    Jeong, Hohyeon
    Heo, Jinseok
    Kim, Sungoh
    Chung, Hyunhee
    Lee, Eunseok
    [J]. PROCEEDINGS OF THE 30TH ACM JOINT MEETING EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, ESEC/FSE 2022, 2022, : 1441 - 1452
  • [38] Open Science in Software Engineering: A Study on Deep Learning-Based Vulnerability Detection
    Nong, Yu
    Sharma, Rainy
    Hamou-Lhadj, Abdelwahab
    Luo, Xiapu
    Cai, Haipeng
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2023, 49 (04) : 1983 - 2005
  • [39] An Empirical Study of Deep Learning-Based SS7 Attack Detection
    Guo, Yuejun
    Ermis, Orhan
    Tang, Qiang
    Trang, Hoang
    De Oliveira, Alexandre
    [J]. INFORMATION, 2023, 14 (09)
  • [40] Phishing Webpage Classification via Deep Learning-Based Algorithms: An Empirical Study
    Nguyet Quang Do
    Selamat, Ali
    Krejcar, Ondrej
    Yokoi, Takeru
    Fujita, Hamido
    [J]. APPLIED SCIENCES-BASEL, 2021, 11 (19):