Research Article

Research on Cross-Company Defect Prediction Method to Improve Software Security

Table 7

Metric matching performance analysis results.

No.SourceTargetAUC-originalAUC-MM

1CM1Ant-1.70.5690.746
2MW1Ant-1.70.4310.707
3PC1Ant-1.70.4270.641
4PC3Ant-1.70.6870.748
5PC4Ant-1.70.4240.734
6CM1Camel-1.60.6110.549
7MW1Camel-1.60.4570.536
8PC1Camel-1.60.4190.55
9PC3Camel-1.60.5740.549
10PC4Camel-1.60.4720.589
11CM1Ivy-2.00.5690.761
12MW1Ivy-2.00.3820.71
13PC1Ivy-2.00.4570.603
14PC3Ivy-2.00.6810.756
15PC4Ivy-2.00.4670.729
16CM1Jedit-4.30.5550.689
17MW1Jedit-4.30.4050.693
18PC1Jedit-4.30.3330.674
19PC3Jedit-4.30.6560.678
20PC4Jedit-4.30.4540.7
21CM1Synapse-1.20.5560.635
22MW1Synapse-1.20.3980.676
23PC1Synapse-1.20.450.656
24PC3Synapse-1.20.690.665
25PC4Synapse-1.20.450.65
26CM1Velocity-1.60.4950.68
27MW1Velocity-1.60.3710.593
28PC1Velocity-1.60.3620.599
29PC3Velocity-1.60.6130.596
30PC4Velocity-1.60.4960.579
31CM1Xalan-2.40.5830.602
32MW1Xalan-2.40.420.611
33PC1Xalan-2.40.3940.6
34PC3Xalan-2.40.6230.663
35PC4Xalan-2.40.4370.607
Average0.4960.65