{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T14:33:56Z","timestamp":1773930836890,"version":"3.50.1"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,12,24]],"date-time":"2022-12-24T00:00:00Z","timestamp":1671840000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,12,24]],"date-time":"2022-12-24T00:00:00Z","timestamp":1671840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Major Public Welfare Project of Henan Province","award":["201300311200"],"award-info":[{"award-number":["201300311200"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61602154"],"award-info":[{"award-number":["61602154"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61340037"],"award-info":[{"award-number":["61340037"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100013066","name":"Key scientific research project of colleges and universities in Henan Province","doi-asserted-by":"crossref","award":["22A520024"],"award-info":[{"award-number":["22A520024"]}],"id":[{"id":"10.13039\/501100013066","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1007\/s00530-022-01039-w","type":"journal-article","created":{"date-parts":[[2022,12,24]],"date-time":"2022-12-24T12:02:36Z","timestamp":1671883356000},"page":"1089-1101","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A coincidental correctness test case identification framework with fuzzy C-means clustering"],"prefix":"10.1007","volume":"29","author":[{"given":"Heling","family":"Cao","sequence":"first","affiliation":[]},{"given":"Lei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yonghe","family":"Chu","sequence":"additional","affiliation":[]},{"given":"Miaolei","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Panpan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Chenyang","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,24]]},"reference":[{"issue":"8","key":"1039_CR1","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1109\/32.153381","volume":"18","author":"JM Voas","year":"1992","unstructured":"Voas, J.M.: PIE: a dynamic failure-based technique. IEEE Trans. Softw. Eng. 18(8), 717\u2013727 (1992)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"3","key":"1039_CR2","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1145\/1151695.1151696","volume":"15","author":"RM Hierons","year":"2006","unstructured":"Hierons, R.M.: Avoiding coincidental correctness in boundary value analysis. ACM Trans. Softw. Eng. Methodol. 15(3), 227\u2013241 (2006)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"issue":"6","key":"1039_CR3","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1109\/32.232020","volume":"19","author":"DJ Richardson","year":"1993","unstructured":"Richardson, D.J., Thompson, M.C.: An analysis of test data selection criteria using the RELAY model of fault detection. IEEE Trans. Softw. Eng. 19(6), 533\u2013553 (1993)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"1039_CR4","doi-asserted-by":"crossref","unstructured":"Masri, W., Podgurski, A.: An empirical study of the strength of information flows in programs. In: Proceedings of the 2006 International Workshop on Dynamic Systems Analysis, pp. 73\u201380. ACM, New York (2006)","DOI":"10.1145\/1138912.1138927"},{"issue":"2","key":"1039_CR5","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/1571629.1571631","volume":"19","author":"W Masri","year":"2009","unstructured":"Masri, W., Podgurski, A.: Measuring the strength of information flows in programs. ACM Trans. Softw. Eng. Methodol. 19(2), 5\u201337 (2009)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"1039_CR6","doi-asserted-by":"crossref","unstructured":"Wang, X., Cheung, S.C., Chan, W.K., et al.: Taming coincidental correctness: coverage refinement with context patterns to improve fault localization. In: Proceedings of the 31th International Conference on Software Engineering, pp. 45\u201355. IEEE computer society, Los Alamitos (2009)","DOI":"10.1109\/ICSE.2009.5070507"},{"key":"1039_CR7","doi-asserted-by":"crossref","unstructured":"Liu, C., Han, J.: Failure proximity: a fault localization- based approach. In: Proceedings of the 14th ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 46\u201356. ACM, New York (2006)","DOI":"10.1145\/1181775.1181782"},{"key":"1039_CR8","doi-asserted-by":"crossref","unstructured":"Park, S., Harrold, M.J., Vuduc, R.: Griffin: grouping suspicious memory-access patterns to improve understanding of concurrency bugs. In: Proceedings of the 2013 International Symposium on Software Testing and Analysis, pp. 134\u2013144. ACM, New York (2013)","DOI":"10.1145\/2483760.2483792"},{"issue":"1","key":"1039_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2559932","volume":"23","author":"W Masri","year":"2014","unstructured":"Masri, W., Assi, R.A.: Prevalence of coincidental correctness and mitigation of its impact on fault localization. ACM Trans. Softw. Eng. Methodol. 23(1), 1\u201328 (2014)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"1039_CR10","doi-asserted-by":"crossref","unstructured":"Yang, X., Mengleng, Liu M., Cao, M., et al.: Regression identification of coincidental correctness via weighted clustering. In: Proceedings of the 39th Annual International Computers, Software & Applications Conference, pp. 115\u2013120. IEEE, Taichung (2015)","DOI":"10.1109\/COMPSAC.2015.33"},{"issue":"5","key":"1039_CR11","doi-asserted-by":"publisher","first-page":"1396","DOI":"10.1109\/TFUZZ.2021.3058643","volume":"30","author":"D Li","year":"2021","unstructured":"Li, D., Zhang, H., Li, T., et al.: Hybrid missing value imputation algorithms using fuzzy c-means and vaguely quantified rough set. IEEE Trans. Fuzzy Syst. 30(5), 1396\u20131408 (2021)","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"1039_CR12","doi-asserted-by":"crossref","unstructured":"Masri, W., Assi, R.A.: Cleansing test suites from coincidental correctness to enhance fault-localization. In: Proceedings of the 3rd International Conference on Software Testing, Verification and Validation, pp. 165\u2013174. IEEE, Paris (2010)","DOI":"10.1109\/ICST.2010.22"},{"key":"1039_CR13","doi-asserted-by":"crossref","unstructured":"Masri, W., Assi, R.A., Zaraket, F., et al.: Enhancing fault localization via multivariate visualization. In: Proceedings of the 5th IEEE International Conference on Software Testing, Verification and Validation, pp. 737\u2013741. IEEE, Montreal (2012)","DOI":"10.1109\/ICST.2012.166"},{"key":"1039_CR14","doi-asserted-by":"crossref","unstructured":"Jones, J.A., Harrold, M.J., Stasko, J.: Visualization of test information to assist fault localization. In: Proceedings of the 24th International Conference on Software Engineering, pp. 467\u2013477. IEEE Computer Society, Los Alamito (2002)","DOI":"10.1145\/581396.581397"},{"key":"1039_CR15","unstructured":"Rui, A., Peter, Z., Arjan, J.C.v.G.: An evaluation of similarity coefficients for software fault localization. In: Proceedings of the 12th Pacific Rim International Symposium on Dependable Computing, pp. 39\u201346. IEEE, Riverside (2006)"},{"issue":"3","key":"1039_CR16","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/2000791.2000795","volume":"20","author":"L Naish","year":"2011","unstructured":"Naish, L., Lee, H.J., Ramamohanarao, K.: A model for spectra-based software diagnosis. ACM Trans. Softw. Eng. Methodol. 20(3), 11\u201343 (2011)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"issue":"4","key":"1039_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2522920.2522924","volume":"22","author":"X Xie","year":"2013","unstructured":"Xie, X., Chen, T.Y., Kuo, F.-C., et al.: A theoretical analysis of the risk evaluation formulas for spectrum-based fault localization. ACM Trans. Softw. Eng. Methodol. 22(4), 1\u201340 (2013)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"1039_CR18","unstructured":"http:\/\/sir.unl.edu\/portal\/index.html"},{"key":"1039_CR19","unstructured":"Renieris, M., Reiss, S.P.: Fault localization with nearest neighbor queries. In: Proceedings of the 18th IEEE International Conference on Automated Software Engineering, pp. 30\u201339. ACM, New York (2003)"},{"key":"1039_CR20","doi-asserted-by":"crossref","unstructured":"Wong, W.E., Debroy, V., Yihao, L., et al.: Software fault localization using DStar (D*). In: Proceedings of the 6th IEEE International Conference on Software Security and Reliability, pp. 21\u201330. IEEE, Los Alamitos (2012)","DOI":"10.1109\/SERE.2012.12"},{"key":"1039_CR21","doi-asserted-by":"crossref","unstructured":"Xu, J., Chan, W., Zhang, Z., et al.: A dynamic fault localization technique with noise reduction for java programs. In: Proceedings of the 11th International Conference on Quality Software, pp. 11\u201320. IEEE, Madrid (2011)","DOI":"10.1109\/QSIC.2011.32"},{"key":"1039_CR22","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Chen, W.K., Tse, T.H., et al.: Capturing propagation of infected program states. In: Proceedings of the 7th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, pp. 43\u201352. ACM, New York (2009)","DOI":"10.1145\/1595696.1595705"},{"key":"1039_CR23","doi-asserted-by":"crossref","unstructured":"Li, Z., Li, M., Liu, Y., et al.: Identify coincidental correct test cases based on fuzzy classification. In: International Conference on Software Analysis, Testing & Evolution, pp. 72\u201377. IEEE (2016)","DOI":"10.1109\/SATE.2016.19"},{"key":"1039_CR24","unstructured":"Assi, R.A., Masri, W., Trad, C.: How detrimental is coincidental correctness to coverage-based fault detection and localization? An empirical study. Softw. Test. Verif. Reliab. 1-26 (2021)"},{"issue":"3","key":"1039_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/stvr.1696","volume":"29","author":"R Abou Assi","year":"2019","unstructured":"Abou Assi, R., Trad, C., Maalouf, M., et al.: Coincidental correctness in the Defects4J benchmark. Softw. Test. Verif. Reliab. 29(3), 1\u201326 (2019)","journal-title":"Softw. Test. Verif. Reliab."},{"issue":"9","key":"1039_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00607-018-0591-z","volume":"100","author":"F Feyzi","year":"2018","unstructured":"Feyzi, F., Parsa, S.: A program slicing-based method for effective detection of coincidentally correct test cases. Computing 100(9), 1\u201343 (2018)","journal-title":"Computing"},{"issue":"5","key":"1039_CR27","doi-asserted-by":"publisher","first-page":"3873","DOI":"10.1007\/s10664-020-09859-y","volume":"25","author":"F Feyzi","year":"2020","unstructured":"Feyzi, F.: CGT-FL: using cooperative game theory to effective fault localization in presence of coincidental correctness. Empir. Softw. Eng. 25(5), 3873\u20133927 (2020)","journal-title":"Empir. Softw. Eng."}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-022-01039-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00530-022-01039-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-022-01039-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T14:12:00Z","timestamp":1685455920000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00530-022-01039-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,24]]},"references-count":27,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["1039"],"URL":"https:\/\/doi.org\/10.1007\/s00530-022-01039-w","relation":{},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"value":"0942-4962","type":"print"},{"value":"1432-1882","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,24]]},"assertion":[{"value":"20 July 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 December 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 December 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declared that they have no conflicts of interest to the manuscript. We declare that we do not have any commercial or associative interest that represents a conflict of interest in connection with the work submitted.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}}]}}