{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T04:47:24Z","timestamp":1692938844450},"reference-count":51,"publisher":"Wiley","issue":"6","license":[{"start":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T00:00:00Z","timestamp":1639526400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872119"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004826","name":"Natural Science Foundation of Beijing Municipality","doi-asserted-by":"publisher","award":["4212020"],"id":[{"id":"10.13039\/501100004826","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Expert Systems"],"published-print":{"date-parts":[[2022,7]]},"abstract":"Abstract<\/jats:title>Software testing is an indispensable part of the software engineering industry, which guarantees product reliability and safety. Traditional testing approaches face the testing Oracle problem, they are difficult to construct the expected outputs with the increasing of program complexity. As a result, metamorphic testing, which tests the program by examining the relationship between the execution results, is proposed. However, existing manual metamorphic relation construction requires huge effects of domain experts, and automatic methods are unstable and inefficient due to the insufficient software feature mining. Hence, we proposed a multi\u2010dimensional program structure\u2010based metamorphic relation prediction approach, which is composed of feature extraction and prediction model building. In the feature extraction stage, the testing program is converted to multiple intermediate structures (such as control flow graphs and abstract syntax trees) to explore its features. In the prediction model building stage, the extracted feature set is used as the training set, and a novel semi\u2010supervised support vector machine\u2010bagging\u2010K\u2010nearest neighbors algorithm is designed to train the prediction model. Besides, a two\u2010phase hybrid granularity search algorithm is proposed to improve the prediction performance by selecting the optimal number of weak classifiers. Compared with existing approaches, our proposed model can improve the accuracy by around 14%.<\/jats:p>","DOI":"10.1111\/exsy.12902","type":"journal-article","created":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T11:54:31Z","timestamp":1639569271000},"update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Syntax\u2010based metamorphic relation prediction via the bagging framework"],"prefix":"10.1111","volume":"39","author":[{"given":"Yuyu","family":"Yin","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology Hangzhou Dianzi University Hangzhou China"}]},{"given":"Jiajie","family":"Ruan","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology Hangzhou Dianzi University Hangzhou China"}]},{"given":"Youhuizi","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology Hangzhou Dianzi University Hangzhou China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-0092-2462","authenticated-orcid":false,"given":"Yu","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology Hangzhou Dianzi University Hangzhou China"}]},{"given":"Zhijin","family":"Pan","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronic Engineering Nanyang Technological University Singapore"}]}],"member":"311","published-online":{"date-parts":[[2021,12,15]]},"reference":[{"key":"e_1_2_8_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2013.02.061"},{"key":"e_1_2_8_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2372785"},{"key":"e_1_2_8_4_1","doi-asserted-by":"crossref","unstructured":"Beydeda S.(2006).Self\u2010metamorphic\u2010testing components. 30th Annual International Computer Software and Applications Conference [Conference presentation] (pp.265\u2013272). Chicago IL.","DOI":"10.1109\/COMPSAC.2006.161"},{"key":"e_1_2_8_5_1","unstructured":"Chan W. K. Cheung S. C. &Leung K. R.(2005).Towards a metamorphic testing methodology for service\u2010oriented software applications. International Conference on Quality Software [Conference presentation] (pp. 470\u2013476). Melbourne Australia."},{"key":"e_1_2_8_6_1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-61520-684-1.ch003"},{"key":"e_1_2_8_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/287000.287004"},{"key":"e_1_2_8_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/366378.366380"},{"key":"e_1_2_8_9_1","unstructured":"Chen T. Y. Cheung S. C. &Yiu S. M.(2020).Metamorphic testing: A new approach for generating next test cases(Technical Report No. HKUST\u2010CS98\u201001). Hong Kong China: The Hong Kong University of Science and Technology."},{"key":"e_1_2_8_10_1","doi-asserted-by":"crossref","unstructured":"Chen T. Y. Feng J. &Tse T. H.(2002).Metamorphic testing of programs on partial differential equations: a case study. Proceedings 26th Annual International Computer Software and Applications [Conference presentation] (pp. 327\u2013333). Oxford England.","DOI":"10.1109\/CMPSAC.2002.1045022"},{"key":"e_1_2_8_11_1","unstructured":"Chen T. Y. Kuo F. Liu Y. &Tang A.(2004).Metamorphic testing and testing with special values. Fourth International Workshop on Source Code Analysis and Manipulation [Conference presentation] (pp. 128\u2013134). Chicago IL."},{"key":"e_1_2_8_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(02)00129-5"},{"key":"e_1_2_8_13_1","doi-asserted-by":"crossref","unstructured":"Ding J. Kang X. &Hu X.\u2010H.(2017).Validating a deep learning framework by metamorphic testing. IEEE\/ACM Second International Workshop on Metamorphic Testing (MET) [Conference presentation] (pp. 28\u201334).https:\/\/doi.org\/10.1109\/MET.2017.2","DOI":"10.1109\/MET.2017.2"},{"key":"e_1_2_8_14_1","doi-asserted-by":"crossref","unstructured":"Dong G. Wu S. Wang G. Guo T. &Huang Y.(2010).Security assurance with metamorphic testing and genetic algorithm. IEEE\/WIC\/ACM International Conference on Web Intelligence and Intelligent Agent Technology [Conference presentation] (pp. 397\u2013401). Toronto Canada.","DOI":"10.1109\/WI-IAT.2010.101"},{"key":"e_1_2_8_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/192218.192221"},{"key":"e_1_2_8_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijforecast.2020.05.002"},{"key":"e_1_2_8_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3391198"},{"key":"e_1_2_8_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2020.3023155"},{"key":"e_1_2_8_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.08.021"},{"key":"e_1_2_8_20_1","unstructured":"Gunel J.(2017).Oracle problem in software testing. Proceedings of the 26th International Symposium on Software Testing and Analysis [Conference presentation] (pp. 444\u2013447). California IL."},{"key":"e_1_2_8_21_1","doi-asserted-by":"crossref","unstructured":"Hardin B. &Kanewala U.(2018).Using semi\u2010supervised learning for predicting metamorphic relations. 2018 IEEE\/ACM Third International Workshop on Metamorphic Testing [Conference presentation] (pp. 14\u201317). Gothenburg Sweden.","DOI":"10.1145\/3193977.3193985"},{"key":"e_1_2_8_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MET52542.2021.00014"},{"issue":"4","key":"e_1_2_8_23_1","first-page":"938","article-title":"Construction and realization of abstract syntax tree based on javacc","volume":"37","author":"Huang S.","year":"2016","journal-title":"Computer Engineering and Design"},{"key":"e_1_2_8_24_1","doi-asserted-by":"crossref","unstructured":"Jin H. Jiang Y. Liu N. Xu C. Ma X. &Lu J.(2015).Concolic metamorphic debugging. IEEE 39th Annual Computer Software and Applications Conference (Vol. 2 pp. 232\u2013241). doi:https:\/\/doi.org\/10.1109\/COMPSAC.2015.79","DOI":"10.1109\/COMPSAC.2015.79"},{"issue":"12","key":"e_1_2_8_25_1","first-page":"1","article-title":"A multi\u2010label metamorphic relations prediction approach based on rbf neural network","volume":"1","author":"Jin\u2010Wei Z.","year":"2016","journal-title":"Computer and Modernization"},{"key":"e_1_2_8_26_1","doi-asserted-by":"crossref","unstructured":"Kanewala U. &Bieman J. M.(2013).Using machine learning techniques to detect metamorphic relations for programs without test oracles. IEEE International Symposium on Software Reliability Engineering [Conference presentation] (pp. 1\u201310). California IL.","DOI":"10.1109\/ISSRE.2013.6698899"},{"key":"e_1_2_8_27_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1594"},{"key":"e_1_2_8_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2017.3571582"},{"key":"e_1_2_8_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-017-9392-4"},{"key":"e_1_2_8_30_1","doi-asserted-by":"publisher","DOI":"10.3233\/IDA-195011"},{"issue":"5","key":"e_1_2_8_31_1","first-page":"97","article-title":"Semi\u2010supervised learning for SVM\u2010KNN","volume":"5","author":"Li K.","year":"2010","journal-title":"Journal of Beijing Jiaotong University"},{"key":"e_1_2_8_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.46"},{"key":"e_1_2_8_33_1","doi-asserted-by":"crossref","unstructured":"Liu H. Xuan L. &Chen T. Y.(2012).A new method for constructing metamorphic relations. Twelfth International Conference on Quality Software [Conference presentation] (pp. 59\u201368). Shaanxi China.","DOI":"10.1109\/QSIC.2012.10"},{"key":"e_1_2_8_34_1","doi-asserted-by":"crossref","unstructured":"Liu H. Yusuf I. I. Schmidt H. W. &Chen T. Y.(2014).Metamorphic fault tolerance: An automated and systematic methodology for fault tolerance in the absence of test oracle. Companion Proceedings of the 36th International Conference on Software Engineering [Conference presentation] (pp.420\u2013423). Hyderabad India.","DOI":"10.1145\/2591062.2591109"},{"key":"e_1_2_8_35_1","unstructured":"Murphy C. Kaiser G. E. Hu L. &Wu L.(2008).Properties of machine learning applications for use in metamorphic testing. Twentieth international conference on software engineering and knowledge engineering [Conference presentation] (pp. 867\u2013872). San Francisco CA."},{"issue":"3","key":"e_1_2_8_36_1","first-page":"113","article-title":"Studying the feasibility and importance of software testing: An analysis","volume":"1","author":"Riaz A. S.","year":"2009","journal-title":"International Journal of Engineering Science and Technology"},{"key":"e_1_2_8_37_1","first-page":"3","volume-title":"Software testing","author":"Robert M. H.","year":"2016"},{"key":"e_1_2_8_38_1","doi-asserted-by":"crossref","unstructured":"Sharma A. &Wehrheim H.(2019).Testing machine learning algorithms for balanced data usage. Twelfth IEEE Conference on Software Testing Validation and Verification [Conference presentation] (pp. 125\u2013135). Xi'an China.","DOI":"10.1109\/ICST.2019.00022"},{"key":"e_1_2_8_39_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJHPCN.2016.074663"},{"key":"e_1_2_8_40_1","doi-asserted-by":"publisher","DOI":"10.1117\/1.JATIS.4.2.021402"},{"key":"e_1_2_8_41_1","doi-asserted-by":"crossref","unstructured":"Tolksdorf S. Lehmann D. &Pradel M.(2019).Interactive metamorphic testing of debuggers. Proceedings of the 28th ACM Sigsoft International Symposium on Software Testing and Analysis [Conference presentation] (pp. 273\u2013283). New York NY: Association for Computing Machinery.","DOI":"10.1145\/3293882.3330567"},{"key":"e_1_2_8_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1278201.1278210"},{"key":"e_1_2_8_43_1","doi-asserted-by":"crossref","unstructured":"Usman M. Wang W. &Khurshid S.(2020).Testmc: Testing model counters using differential and metamorphic testing. 35th IEEE\/ACM International Conference on Automated Software Engineering [Conference presentation] (pp. 709\u2013721). Melbourne Australia.","DOI":"10.1145\/3324884.3416563"},{"key":"e_1_2_8_44_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature.2016.19835"},{"key":"e_1_2_8_45_1","unstructured":"Wu P.(2005).Iterative metamorphic testing. 29th Annual International Computer Software and Applications Conference [Conference presentation] (pp. 19\u201324). Scotland UK."},{"key":"e_1_2_8_46_1","doi-asserted-by":"publisher","DOI":"10.1360\/jos161210"},{"key":"e_1_2_8_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.11.920"},{"key":"e_1_2_8_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2020.2972266"},{"key":"e_1_2_8_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-019-01246-2"},{"key":"e_1_2_8_50_1","doi-asserted-by":"crossref","unstructured":"Zhang J. Chen J. Hao D. Xiong Y. Xie B. Zhang L. &Mei H.(2014).Search\u2010based inference of polynomial metamorphic relations. International Conference on Automated Software Engineering [Conference presentation] (pp. 701\u2013712). Vasteras Sweden.","DOI":"10.1145\/2642937.2642994"},{"key":"e_1_2_8_51_1","doi-asserted-by":"crossref","unstructured":"Zhang M. Zhang Y. Zhang L. Liu C. &Khurshid S.(2018).DeepRoad: GAN\u2010based metamorphic testing and input validation framework for autonomous driving systems. 33rd IEEE\/ACM International Conference on Automated Software Engineering (ASE) [Conference presentation] (pp. 132\u2013142). New York NY: Association for Computing Machinery.","DOI":"10.1145\/3238147.3238187"},{"key":"e_1_2_8_52_1","doi-asserted-by":"crossref","unstructured":"Zhou Z. Q.(2017).Metamorphic testing: Beyond testing numerical computations. Proceedings of the Second International Workshop on Metamorphic Testing [Conference presentation] (p. 2). Buenos Aires Argentina.","DOI":"10.1109\/MET.2017.7"}],"container-title":["Expert Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1111\/exsy.12902","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1111\/exsy.12902","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1111\/exsy.12902","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,24]],"date-time":"2023-08-24T13:48:22Z","timestamp":1692884902000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1111\/exsy.12902"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,15]]},"references-count":51,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,7]]}},"alternative-id":["10.1111\/exsy.12902"],"URL":"https:\/\/doi.org\/10.1111\/exsy.12902","archive":["Portico"],"relation":{},"ISSN":["0266-4720","1468-0394"],"issn-type":[{"value":"0266-4720","type":"print"},{"value":"1468-0394","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12,15]]},"assertion":[{"value":"2021-01-29","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-11-08","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-12-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}