{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T13:28:02Z","timestamp":1751894882948,"version":"3.40.3"},"publisher-location":"Cham","reference-count":49,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031545276"},{"type":"electronic","value":"9783031545283"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-54528-3_16","type":"book-chapter","created":{"date-parts":[[2024,2,22]],"date-time":"2024-02-22T07:06:29Z","timestamp":1708585589000},"page":"281-300","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Robustness-Enhanced Assertion Generation Method Based on\u00a0Code Mutation and\u00a0Attack Defense"],"prefix":"10.1007","author":[{"given":"Min","family":"Li","sequence":"first","affiliation":[]},{"given":"Shizhan","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Guodong","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Lu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hongyue","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Xiao","family":"Xue","sequence":"additional","affiliation":[]},{"given":"Zhiyong","family":"Feng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,23]]},"reference":[{"issue":"4","key":"16_CR1","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1145\/267580.267590","volume":"29","author":"H Zhu","year":"1997","unstructured":"Zhu, H., Hall, P.A., May, J.H.: Software unit test coverage and adequacy. ACM Comput. Surv. (CSUR) 29(4), 366\u2013427 (1997)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"16_CR2","unstructured":"Cohn, M.: Succeeding with agile: software development using Scrum. Pearson Education (2010)"},{"issue":"4","key":"16_CR3","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MS.2006.91","volume":"23","author":"P Runeson","year":"2006","unstructured":"Runeson, P.: A survey of unit testing practices. IEEE Softw. 23(4), 22\u201329 (2006)","journal-title":"IEEE Softw."},{"issue":"2","key":"16_CR4","first-page":"319","volume":"19","author":"M Olan","year":"2003","unstructured":"Olan, M.: Unit testing: test early, test often. J. Comput. Sci. Coll. 19(2), 319\u2013328 (2003)","journal-title":"J. Comput. Sci. Coll."},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Watson, C., Tufano, M., Moran, K., Bavota, G., Poshyvanyk, D.: On learning meaningful assert statements for unit test cases. In: Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering, 2020, pp. 1398\u20131409 (2020)","DOI":"10.1145\/3377811.3380429"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Klammer, C., Kern, A.: Writing unit tests: It\u2019s now or never! In: 2015 IEEE Eighth International Conference on Software Testing, Verification and Validation Workshops (ICSTW). IEEE, pp. 1\u20134 (2015)","DOI":"10.1109\/ICSTW.2015.7107469"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Fraser, G., Arcuri, A.: Evosuite: automatic test suite generation for object-oriented software. In: Proceedings of the 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering, pp. 416\u2013419 (2011)","DOI":"10.1145\/2025113.2025179"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Pacheco, C., Ernst, M.D.: Randoop: feedback-directed random testing for Java. In: Companion to the 22nd ACM SIGPLAN Conference on Object- Oriented Programming Systems and Applications Companion, pp. 815\u2013816 (2007)","DOI":"10.1145\/1297846.1297902"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Almasi, M.M., Hemmati, H., Fraser, G., Arcuri, A., Benefelds, J.: An industrial evaluation of unit test generation: finding real faults in a financial application. In: 2017 IEEE\/ACM 39th International Conference on Software Engineering: Software Engineering in Practice Track (ICSE-SEIP). IEEE, pp. 263\u2013272 (2017)","DOI":"10.1109\/ICSE-SEIP.2017.27"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Shamshiri, S.: Automated unit test generation for evolving software. In: Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, pp. 1038\u20131041 (2015)","DOI":"10.1145\/2786805.2803196"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Zhang, J., Panthaplackel, S., Nie, P., Li, J.J., Gligoric, M.: Coditt5: pretraining for source code and natural language editing. In: 37th IEEE\/ACM International Conference on Automated Software Engineering, pp. 1\u201312 (2022)","DOI":"10.1145\/3551349.3556955"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Fukumoto, D., Kashiwa, Y., Hirao, T., Fujiwara, K., Iida, H.: An empirical investigation on the performance of domain adaptation for t5 code completion. In: 2023 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), pp. 693\u2013697. IEEE (2023)","DOI":"10.1109\/SANER56733.2023.00073"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Xia, C.S., Wei, Y., Zhang, L.: Automated program repair in the era of large pre-trained language models. In: Proceedings of the 45th International Conference on Software Engineering (ICSE 2023). Association for Computing Machinery (2023)","DOI":"10.1109\/ICSE48619.2023.00129"},{"key":"16_CR14","unstructured":"Kolak, S.D., Martins, R., Le Goues, C., Hellendoorn, V.J.: Patch generation with language models: Feasibility and scaling behavior. In: Deep Learning for Code Workshop (2022)"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Prenner, J.A., Babii, H., Robbes, R.: Can openai\u2019s codex fix bugs? an evaluation on quixbugs. In: Proceedings of the Third International Workshop on Automated Program Repair, pp. 69\u201375 (2022)","DOI":"10.1145\/3524459.3527351"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"White, J., Hays, S., Fu, Q., Spencer-Smith, J., Schmidt, D.C.: Chatgpt prompt patterns for improving code quality, refactoring, requirements elicitation, and software design, arXiv preprint arXiv:2303.07839 (2023)","DOI":"10.1007\/978-3-031-55642-5_4"},{"key":"16_CR17","unstructured":"Jiang, X., Zheng, Z., Lyu, C., Li, L., Lyu, L.: Treebert: a tree-based pre-trained model for programming language. In: Uncertainty in Artificial Intelligence. PMLR, pp. 54\u201363 (2021)"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Wan, Y., Zhao, W., Zhang, H., Sui, Y., Xu, G., Jin, H.: What do they capture? a structural analysis of pre-trained language models for source code. In: Proceedings of the 44th International Conference on Software Engineering, pp. 2377\u20132388 (2022)","DOI":"10.1145\/3510003.3510050"},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"Wang, Y., Wang, W., Joty, S., Hoi, S.C.: Codet5: identifier-aware unified pre-trained encoder-decoder models for code understanding and generation. arXiv preprint arXiv:2109.00859 (2021)","DOI":"10.18653\/v1\/2021.emnlp-main.685"},{"key":"16_CR20","unstructured":"Lu, S., et al.: Codexglue: a machine learning benchmark dataset for code understanding and generation. arXiv preprint arXiv:2102.04664 (2021)"},{"key":"16_CR21","doi-asserted-by":"crossref","unstructured":"Feng, Z., et al.: Codebert: a pre-trained model for programming and natural languages. arXiv preprint arXiv:2002.08155 (2020)","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"16_CR22","doi-asserted-by":"crossref","unstructured":"Fu, M., Tantithamthavorn, C., Le, T., Nguyen, V., Phung, D.: Vulrepair: a t5-based automated software vulnerability repair. In: Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 935\u2013947 (2022)","DOI":"10.1145\/3540250.3549098"},{"key":"16_CR23","doi-asserted-by":"crossref","unstructured":"Fan, G., et al.: Dialog summarization for software collaborative platform via tuning pre-trained models. J. Syst. Softw., 111763 (2023)","DOI":"10.1016\/j.jss.2023.111763"},{"key":"16_CR24","doi-asserted-by":"crossref","unstructured":"Imai, S.: Is github copilot a substitute for human pair-programming? an empirical study. In: Proceedings of the ACM\/IEEE 44th International Conference on Software Engineering: Companion Proceedings, pp. 319\u2013321 (2022)","DOI":"10.1145\/3510454.3522684"},{"key":"16_CR25","unstructured":"Pearce, H., Tan, B., Ahmad, B., Karri, R., Dolan-Gavitt, B.: Can openai codex and other large language models help us fix security bugs? arXiv preprint arXiv:2112.02125 (2021)"},{"key":"16_CR26","unstructured":"Pearce, H., Tan, B., Krishnamurthy, P., Khorrami, F., Karri, R., Dolan Gavitt, B.: Pop quiz! can a large language model help with reverse engineering? arXiv preprint arXiv:2202.01142 (2022)"},{"key":"16_CR27","doi-asserted-by":"crossref","unstructured":"Sarsa, S., Denny, P., Hellas, A., Leinonen, J.: Automatic generation of programming exercises and code explanations using large language models. In: Proceedings of the 2022 ACM Conference on International Computing Education Research-Volume 1, pp. 27\u201343 (2022)","DOI":"10.1145\/3501385.3543957"},{"key":"16_CR28","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Zhang, H., Shen, B., Gu, X.: Diet code is healthy: simplifying programs for pre-trained models of code. In: Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 1073\u20131084 (2022)","DOI":"10.1145\/3540250.3549094"},{"key":"16_CR29","doi-asserted-by":"crossref","unstructured":"Li, Z., Wang, C., Liu, Z., Wang, H., Wang, S., Gao, C.: Cctest: testing and repairing code completion systems. arXiv preprint arXiv:2208.08289 (2022)","DOI":"10.1109\/ICSE48619.2023.00110"},{"issue":"1","key":"16_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3530786","volume":"32","author":"M Ojdanic","year":"2023","unstructured":"Ojdanic, M., Soremekun, E., Degiovanni, R., Papadakis, M., Le Traon, Y.: Mutation testing in evolving systems: studying the relevance of mutants to code evolution. ACM Trans. Softw. Eng. Methodol. 32(1), 1\u201339 (2023)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"issue":"2","key":"16_CR31","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1109\/TSE.2009.71","volume":"36","author":"M Harman","year":"2009","unstructured":"Harman, M., McMinn, P.: A theoretical and empirical study of search-based testing: Local, global, and hybrid search. IEEE Trans. Software Eng. 36(2), 226\u2013247 (2009)","journal-title":"IEEE Trans. Software Eng."},{"key":"16_CR32","doi-asserted-by":"crossref","unstructured":"Blasi, A., Gorla, A., Ernst, M.D., Pezz\u2018e, M.: Call me maybe: using nlp to automatically generate unit test cases respecting temporal constraints. In: 37th IEEE\/ACM International Conference on Automated Software Engineering, pp. 1\u201311 (2022)","DOI":"10.1145\/3551349.3556961"},{"key":"16_CR33","doi-asserted-by":"crossref","unstructured":"Delgado-Perez, A., Ramirez, A., Valle-Gomez, K.J., Medina-Bulo, I., Romero, J.R.: Interevo-tr: Interactive evolutionary test generation with readability assessment. IEEE Trans. Softw. Eng. (2022)","DOI":"10.1109\/TSE.2022.3227418"},{"issue":"1\u20133","key":"16_CR34","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.scico.2007.01.015","volume":"69","author":"MD Ernst","year":"2007","unstructured":"Ernst, M.D., et al.: The daikon system for dynamic detection of likely invariants. Sci. Comput. Program. 69(1\u20133), 35\u201345 (2007)","journal-title":"Sci. Comput. Program."},{"key":"16_CR35","doi-asserted-by":"crossref","unstructured":"Csallner, C., Tillmann, N., Smaragdakis, Y.: Dysy: dynamic symbolic execution for invariant inference. In: Proceedings of the 30th International Conference on Software Engineering, pp. 281\u2013290 (2008)","DOI":"10.1145\/1368088.1368127"},{"key":"16_CR36","doi-asserted-by":"crossref","unstructured":"Xiao, X., Li, S., Xie, T., Tillmann, N.: Characteristic studies of loop problems for structural test generation via symbolic execution. In: 2013 28th IEEE\/ACM International Conference on Automated Software Engineering (ASE). IEEE, pp. 246\u2013256 (2013)","DOI":"10.1109\/ASE.2013.6693084"},{"key":"16_CR37","unstructured":"Zeller, A., Gopinath, R., B\u0304ohme, M., Fraser, G., Holler, C.: The fuzzing book (2019)"},{"key":"16_CR38","doi-asserted-by":"crossref","unstructured":"Pacheco, C., Lahiri, S.K., Ernst, M.D., Ball, T.: Feedback-directed random test generation. In: 29th International Conference on Software Engineering (ICSE\u201907), pp. 75\u201384. IEEE (2007)","DOI":"10.1109\/ICSE.2007.37"},{"key":"16_CR39","doi-asserted-by":"crossref","unstructured":"Shamshiri, S., Just, R., Rojas, J.M., Fraser, G., McMinn, P., Arcuri, A.: Do automatically generated unit tests find real faults? an empirical study of effectiveness and challenges (t). In: 2015 30th IEEE\/ACM International Conference on Automated Software Engineering (ASE). IEEE, pp. 201\u2013211 (2015)","DOI":"10.1109\/ASE.2015.86"},{"key":"16_CR40","doi-asserted-by":"crossref","unstructured":"White, R., Krinke, J.: Testnmt: function-to-test neural machine translation. In: Proceedings of the 4th ACM SIGSOFT International Workshop on NLP for Software Engineering, pp. 30\u201333 (2018)","DOI":"10.1145\/3283812.3283823"},{"key":"16_CR41","unstructured":"Tufano, M., Drain, D., Svyatkovskiy, A., Deng, S.K., Sundaresan, N.: Unit test case generation with transformers and focal context"},{"key":"16_CR42","unstructured":"White, R., Krinke, J: Reassert: deep learning for assert generation. arXiv preprint arXiv:2011.09784 (2020)"},{"key":"16_CR43","doi-asserted-by":"crossref","unstructured":"Villmow, J., Depoix, J., Ulges, A.: Contest: a unit test completion benchmark featuring context. In: Proceedings of the 1st Workshop on Natural Language Processing for Programming (NLP4Prog 2021), pp. 17\u201325 (2021)","DOI":"10.18653\/v1\/2021.nlp4prog-1.2"},{"key":"16_CR44","unstructured":"Pascanu, R., Mikolov, T., Bengio, Y.: On the difficulty of training recurrent neural networks. In: International conference on machine learning. Pmlr, pp. 1310\u20131318 (2013)"},{"key":"16_CR45","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2022.111304","volume":"190","author":"S Yu","year":"2022","unstructured":"Yu, S., Wang, T., Wang, J.: Data augmentation by program transformation. J. Syst. Softw. 190, 111304 (2022)","journal-title":"J. Syst. Softw."},{"key":"16_CR46","doi-asserted-by":"crossref","unstructured":"Papineni, K., Roukos, S., Ward, T., Zhu, W.-J.: Bleu: a method for automatic evaluation of machine translation. In: Proceedings of the 40th Annual Meeting of the Association for Computational Linguistics, pp. 311\u2013318 (2002)","DOI":"10.3115\/1073083.1073135"},{"key":"16_CR47","unstructured":"Lin, C.-Y.: Rouge: a package for automatic evaluation of summaries. In: Text Summarization Branches Out, pp. 74\u201381 (2004)"},{"key":"16_CR48","doi-asserted-by":"crossref","unstructured":"Yang, G., Zhou, Y., Yang, W., Yue, T., Chen, X., Chen, T.: How important are good method names in neural code generation? a model robustness perspective. arXiv preprint arXiv:2211.15844 (2022)","DOI":"10.1145\/3630010"},{"key":"16_CR49","doi-asserted-by":"crossref","unstructured":"Dinella, E., Ryan, G., Mytkowicz, T., Lahiri, S.K.: Toga: a neural method for test oracle generation. In: Proceedings of the 44th International Conference on Software Engineering, pp. 2130\u20132141 (2022)","DOI":"10.1145\/3510003.3510141"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Collaborative Computing: Networking, Applications and Worksharing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-54528-3_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,12]],"date-time":"2024-11-12T06:14:18Z","timestamp":1731392058000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-54528-3_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031545276","9783031545283"],"references-count":49,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-54528-3_16","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"23 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CollaborateCom","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Collaborative Computing: Networking, Applications and Worksharing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Corfu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"colcom2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Cony +","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"176","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"72","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"41% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}