{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T14:41:23Z","timestamp":1726152083344},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172037"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"CCF-Huawei Formal Verification Innovation Research Plan"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2023,4,1]]},"DOI":"10.1109\/tse.2022.3177713","type":"journal-article","created":{"date-parts":[[2022,5,26]],"date-time":"2022-05-26T19:37:31Z","timestamp":1653593851000},"page":"1443-1463","source":"Crossref","is-referenced-by-count":6,"title":["BugBuilder: An Automated Approach to Building Bug Repository"],"prefix":"10.1109","volume":"49","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-6404-9143","authenticated-orcid":false,"given":"Yanjie","family":"Jiang","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-3267-6801","authenticated-orcid":false,"given":"Hui","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"given":"Xiaoqing","family":"Luo","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"given":"Zhihao","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"given":"Xiaye","family":"Chi","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-5566-2368","authenticated-orcid":false,"given":"Nan","family":"Niu","sequence":"additional","affiliation":[{"name":"Department of EECS, University of Cincinnati, Cincinnati, OH, USA"}]},{"given":"Yuxia","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-6077-8709","authenticated-orcid":false,"given":"Yamin","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"given":"Pan","family":"Bian","sequence":"additional","affiliation":[{"name":"Huawei Technologies Co., Ltd, Shenzhen, Guangdong, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-8304-7055","authenticated-orcid":false,"given":"Lu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Key Laboratory of High Confidence Software Technologies, Ministry of Education, Peking University, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2521368"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3092703.3092717"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330574"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.62"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213856"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2543218"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.113156"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2013.20"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2019.04.014"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2009.5090029"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-016-9470-4"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.65"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.17"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180182"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.45"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2628055"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321702"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-005-3861-2"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2560811"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606626"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2940179"},{"key":"ref22","first-page":"1","article-title":"Hoppity: Learning graph transformations to detect and fix bugs in programs","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Dinella"},{"key":"ref23","first-page":"602","article-title":"Dlfix: Context-based code transformation learning for automated program repair","volume-title":"Proc. 42nd Int. Conf. Softw. Eng.","author":"Li"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.2996975"},{"key":"ref25","first-page":"16","article-title":"BugBench: Benchmarks for evaluating bug detection tools","volume-title":"Proc. Workshop Eval. Softw. Defect Detection Tools","author":"Lu"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2454513"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-C.2017.76"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3135932.3135941"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180243"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106255"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-021-10083-5"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180206"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00069"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-017-9355-3"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1083142.1083149"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2019.00019"},{"key":"ref37","first-page":"10","article-title":"Bugs.jar: A large-scale, diverse dataset of real-world Java bugs","volume-title":"Proc. 15th Int. Conf. Mining Softw. Repositories","author":"Saha"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2019.8667991"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00048"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985842"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70731"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2013.6671284"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.32890\/jict2021.20.4.3"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/MobileSoft52590.2021.00010"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2006.41"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.14"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985815"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2017.38"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.29"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/s11831-020-09491-5"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-021-10045-x"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/SANER50967.2021.00016"},{"issue":"3","key":"ref55","doi-asserted-by":"crossref","first-page":"930","DOI":"10.1109\/TSE.2020.3007722","article-title":"Refactoringminer 2.0","volume":"48","author":"Tsantalis","year":"2022","journal-title":"IEEE Trans. Softw. Eng."},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2006.105"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338911"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/10103953\/09782533.pdf?arnumber=9782533","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T03:04:51Z","timestamp":1706756691000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9782533\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,1]]},"references-count":55,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tse.2022.3177713","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,1]]}}}