{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T04:21:17Z","timestamp":1765772477759,"version":"3.41.0"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T00:00:00Z","timestamp":1749427200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T00:00:00Z","timestamp":1749427200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR2022QF084"],"award-info":[{"award-number":["ZR2022QF084"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]},{"name":"the Youth Innovation Team Development Program of Shandong Provincial Higher Education Institutions","award":["2022KJ234","2022KJ234"],"award-info":[{"award-number":["2022KJ234","2022KJ234"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"DOI":"10.1007\/s11227-025-07459-5","type":"journal-article","created":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T16:31:44Z","timestamp":1749486704000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A combinatorial test case prioritization method based on the quadratic network with wide multi-layer kernels"],"prefix":"10.1007","volume":"81","author":[{"given":"Yunlong","family":"Sheng","sequence":"first","affiliation":[]},{"given":"Xuye","family":"Zhuang","sequence":"additional","affiliation":[]},{"given":"Jiancheng","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Bowen","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Siting","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,9]]},"reference":[{"key":"7459_CR1","doi-asserted-by":"publisher","first-page":"3745","DOI":"10.1016\/j.measurement.2013.02.021","volume":"46","author":"RN Kacker","year":"2013","unstructured":"Kacker RN, Kuhn DR, Lei Y, Lawrence JF (2013) Combinatorial testing for software: an adaptation of design of experiments. Measurement 46:3745\u20133752","journal-title":"Measurement"},{"key":"7459_CR2","doi-asserted-by":"crossref","unstructured":"Morgan J (2018) Combinatorial testing: An approach to systems and software testing based on covering arrays, Analytic Methods in Systems and Software Testing, pp. 131\u2013158","DOI":"10.1002\/9781119357056.ch5"},{"key":"7459_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/bs.adcom.2015.05.003","volume":"99","author":"DR Kuhn","year":"2015","unstructured":"Kuhn DR, Bryce RC, Duan F, Ghandehari LS, Kacker RN (2015) Combinatorial testing: Theory and practice. Adv Comput 99:1\u201366","journal-title":"Adv Comput"},{"key":"7459_CR4","first-page":"1","volume":"421","author":"M Wagner","year":"2022","unstructured":"Wagner M, Colbourn CJ, Simos DE (2022) In-Parameter-Order strategies for covering perfect hash families. Appl Math Comput 421:1\u201321","journal-title":"Appl Math Comput"},{"key":"7459_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jss.2022.111353","volume":"190","author":"H Mercan","year":"2022","unstructured":"Mercan H, Aytar A, Coskun G et al (2022) CIT-daily: A combinatorial interaction testing-based daily build process. J Syst Softw 190:1\u201315","journal-title":"J Syst Softw"},{"issue":"6","key":"7459_CR6","doi-asserted-by":"publisher","first-page":"610","DOI":"10.1049\/iet-sen.2018.5309","volume":"13","author":"A Dutta","year":"2019","unstructured":"Dutta A, Patel A, Mall R (2019) Investigation into the effectiveness of white-box T-way testing. IET Softw 13(6):610\u2013616","journal-title":"IET Softw"},{"issue":"6","key":"7459_CR7","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1109\/TSE.2004.24","volume":"30","author":"DR Kuhn","year":"2004","unstructured":"Kuhn DR, Wallace DR, Gallo AM (2004) Software fault interactions and implications for software testing. IEEE Trans Softw Eng 30(6):418\u2013421","journal-title":"IEEE Trans Softw Eng"},{"issue":"2","key":"7459_CR8","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1080\/24754269.2021.1904095","volume":"5","author":"R Lekivetz","year":"2021","unstructured":"Lekivetz R, Morgan J (2021) Combinatorial testing: using blocking to assign test cases for validating complex software systems. Stat Theory Relat F 5(2):114\u2013121","journal-title":"Stat Theory Relat F"},{"key":"7459_CR9","doi-asserted-by":"publisher","first-page":"115019","DOI":"10.1109\/ACCESS.2021.3103912","volume":"99","author":"H Shu","year":"2021","unstructured":"Shu H, Lv H, Liu K et al (2021) Test scenarios construction based on combinatorial testing strategy for automated vehicles. IEEE Access 99:115019\u2013115029","journal-title":"IEEE Access"},{"key":"7459_CR10","doi-asserted-by":"publisher","first-page":"52957","DOI":"10.1109\/ACCESS.2021.3070510","volume":"99","author":"F Skopljanac-Macina","year":"2021","unstructured":"Skopljanac-Macina F, Zakarija I, Blaskovic B (2021) Towards automated assessment generation in e-learning systems using combinatorial testing and Formal Concept Analysis. IEEE Access 99:52957\u201352976","journal-title":"IEEE Access"},{"key":"7459_CR11","doi-asserted-by":"publisher","first-page":"84021","DOI":"10.1109\/ACCESS.2021.3087165","volume":"99","author":"C Zong","year":"2021","unstructured":"Zong C, Zhang Y, Yao Y et al (2021) A comparison of fault detection efficiency between adaptive random testing and greedy combinatorial testing for control logics in nuclear industrial distributed control systems. IEEE Access 99:84021\u201384033","journal-title":"IEEE Access"},{"key":"7459_CR12","unstructured":"Arshad I, Alsamhi SH, Afzal W (2022) Big data testing techniques: Taxonomy, challenges and future trends, arXiv, pp. 1\u201332"},{"issue":"6","key":"7459_CR13","first-page":"1283","volume":"14","author":"Z Wang","year":"2018","unstructured":"Wang Z, She F (2018) Combinatorial Test Case Prioritization Based On Incremental Combinatorial Coverage Strength. Int J Perform Eng 14(6):1283\u20131290","journal-title":"Int J Perform Eng"},{"issue":"7","key":"7459_CR14","doi-asserted-by":"publisher","first-page":"997","DOI":"10.1142\/S0218194019500335","volume":"29","author":"M Bures","year":"2019","unstructured":"Bures M, Ahmed BS, Zamli KZ (2019) Prioritized Process Test: An Alternative to Current Process Testing Strategies. Int J Softw Eng Knowl Eng 29(7):997\u20131028","journal-title":"Int J Softw Eng Knowl Eng"},{"key":"7459_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2674632.2674643","volume":"39","author":"S Sabharwal","year":"2014","unstructured":"Sabharwal S, Aggarwal M (2014) Identifying interactions for combinatorial test set prioritization using data flow techniques. ACM SIGSOFT Soft Eng Notes 39:1\u20134","journal-title":"ACM SIGSOFT Soft Eng Notes"},{"key":"7459_CR16","doi-asserted-by":"publisher","first-page":"33","DOI":"10.4236\/jcc.2022.102003","volume":"10","author":"X Han","year":"2022","unstructured":"Han X, Yan G (2022) Fault prediction with static software metrics in evolving software: A case study in Apache Ant. J Comput Commun 10:33\u201345","journal-title":"J Comput Commun"},{"key":"7459_CR17","doi-asserted-by":"crossref","unstructured":"Marijan D (2022) Comparative study of machine learning test case prioritization for continuous integration testing, arXiv:2204.10899, pp. 1\u201323","DOI":"10.2139\/ssrn.4105089"},{"key":"7459_CR18","doi-asserted-by":"crossref","unstructured":"Nicanor LD, Aguirre H, Maricela QL (2021) Enhancement to Test Case Prioritization Through Object-Oriented Software Architectural Design, in Proc. 10th Annual Conf. Software Process Improvement, Mexico, pp. 131\u2013138","DOI":"10.1109\/CIMPS54606.2021.9652755"},{"key":"7459_CR19","doi-asserted-by":"crossref","unstructured":"Huang R, Zhou Y, Chen TY, Towey D, Chen J, Zong W (2017) Prioritizing Random Combinatorial Test Suites, in Proc. 17th Symposium on Applied Computing, New York, USA, pp. 1183\u20131189","DOI":"10.1145\/3019612.3019774"},{"key":"7459_CR20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s42519-019-0067-2","volume":"14","author":"R Lekivetz","year":"2020","unstructured":"Lekivetz R, Morgan J (2020) Covering arrays: Using prior information for construction, evaluation and to facilitate fault localization. J Stat Theory Pr Magn Switz 14:1\u201320","journal-title":"J Stat Theory Pr Magn Switz"},{"key":"7459_CR21","doi-asserted-by":"crossref","unstructured":"Akimoto H, Isogami Y, Kitamura T, Noda N, Kishi T (2019) A Prioritization Method for SPL Pairwise Testing Based on User Profiles, in Proc. 26th Asia-Pacific Software Engineering Conference, Piscataway, USA, pp. 118\u2013125","DOI":"10.1109\/APSEC48747.2019.00025"},{"key":"7459_CR22","doi-asserted-by":"crossref","unstructured":"Satish P, Nikhil P, Rangarajan K (2017) A test prioritization algorithm that cares for Don\u2019t Care values and higher order combinatorial coverage. ACM SIGSOFT Software Engineering Notes 42:1\u20139","DOI":"10.1145\/3149485.3149510"},{"key":"7459_CR23","doi-asserted-by":"crossref","unstructured":"Huang R, Zong W, Chen TY, Tower D, Sun W (2018) On the Selection of Strength for Fixed-Strength Interaction Coverage Based Prioritization, in Proc. IEEE 42nd Annual Computer Software and Applications Conference. Washington DC, USA 2018:310\u2013315","DOI":"10.1109\/COMPSAC.2018.00049"},{"key":"7459_CR24","doi-asserted-by":"crossref","unstructured":"Choi E, Kawabata S, Mizuno O, Artho C, Kitamura T (2016) Test Effectiveness Evaluation of Prioritized Combinatorial Testing: A Case Study, in Proc. 2016 IEEE International Conference on Software Quality, Reliability and Security, Washington DC, USA, pp. 61\u201368","DOI":"10.1109\/QRS.2016.17"},{"issue":"4","key":"7459_CR25","first-page":"58","volume":"12","author":"MB Vani","year":"2015","unstructured":"Vani MB, Deepalakshmi R (2015) Enhanced Prioritization Criteria And Evaluation Metric Of T-Way Combinatorial Interaction Test For Web Based Application. Int J Emerg Technol Comput Sci Electron 12(4):58\u201363","journal-title":"Int J Emerg Technol Comput Sci Electron"},{"issue":"4","key":"7459_CR26","doi-asserted-by":"publisher","first-page":"124","DOI":"10.4018\/IJSI.289173","volume":"9","author":"R Gouda","year":"2021","unstructured":"Gouda R, Chandraprakash V (2021) Multi-Objective Crow Search And Fruit Fly Optimization For Combinatorial Test Case Prioritization. Int J Softw innov 9(4):124\u2013142","journal-title":"Int J Softw innov"},{"key":"7459_CR27","doi-asserted-by":"publisher","first-page":"71683","DOI":"10.1109\/ACCESS.2022.3188856","volume":"10","author":"M Ahmed","year":"2022","unstructured":"Ahmed M, Nasser AB, Zamli KZ (2022) Construction of prioritized t-way test suite using bi-objective dragonfly algorithm. IEEE Access 10:71683\u201371698","journal-title":"IEEE Access"},{"key":"7459_CR28","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.infsof.2015.02.008","volume":"62","author":"C Nie","year":"2015","unstructured":"Nie C, Wu H, Niu X, Fei-Ching K, Hareton L, Charles JC (2015) Combinatorial testing, random testing, and adaptive random testing for detecting interaction triggered failures. Inf Softw Technol 62:198\u2013213","journal-title":"Inf Softw Technol"},{"key":"7459_CR29","doi-asserted-by":"publisher","first-page":"68350","DOI":"10.1109\/ACCESS.2018.2879638","volume":"6","author":"R Huang","year":"2018","unstructured":"Huang R, Zhang Q, Chen TY, Hamlyn-Harris J, Tower D, Chen J (2018) An empirical comparison of fixed-strength and mixed-strength for interaction coverage based prioritization. IEEE Access 6:68350\u201369372","journal-title":"IEEE Access"},{"issue":"1","key":"7459_CR30","doi-asserted-by":"publisher","first-page":"114","DOI":"10.23940\/ijpe.21.01.p11.114122","volume":"17","author":"Z Wang","year":"2021","unstructured":"Wang Z, Zhang Y, Gao P, Shuang S (2021) Comparing fault detection efficiencies of adaptive random testing and greedy combinatorial testing for boolean-specifications. Int J Perform Eng 17(1):114\u2013122","journal-title":"Int J Perform Eng"},{"key":"7459_CR31","doi-asserted-by":"crossref","unstructured":"Wei C, Sun Y, Sheng Y, Jiang S (2021) Machine Learning Based Combinatorial Test Cases Ordering Approach, in Proc. 2021 IEEE International Conference on Software Engineering and Artificial Intelligence, Xiamen, China, pp. 37\u201342","DOI":"10.1109\/SEAI52285.2021.9477533"},{"key":"7459_CR32","doi-asserted-by":"crossref","unstructured":"Marijan D (2022) Comparative study of machine learning test case prioritization for continuous integration testing, arXiv, pp. 1\u201323","DOI":"10.2139\/ssrn.4105089"},{"key":"7459_CR33","doi-asserted-by":"crossref","unstructured":"Sheng Y, Zhuang X, Shang D et al (2022) A Prioritization Method for Combinatorial Test Cases Based on Small Sample Tests, in  Proc. 2022 the third International Conference on Sensing, Measurement & Data Analytics in the era of Artificial Intelligence (ICSMD 2022), Harbin, China","DOI":"10.1109\/ICSMD57530.2022.10058419"},{"issue":"2","key":"7459_CR34","doi-asserted-by":"publisher","first-page":"2440006","DOI":"10.1142\/S0218539324400060","volume":"32","author":"Y Sheng","year":"2025","unstructured":"Sheng Y, Yang S, Zhuang X et al (2025) A Prioritization Method for Combinatorial Test Cases Based on Convolutional Neural Network with Wide Multi-Layer Kernels and Its Application. Int J Reliab Qual Saf Eng 32(2):2440006","journal-title":"Int J Reliab Qual Saf Eng"},{"key":"7459_CR35","doi-asserted-by":"publisher","first-page":"109025","DOI":"10.1109\/ACCESS.2021.3101844","volume":"9","author":"P Zhao","year":"2021","unstructured":"Zhao P, Chang X, Wang M (2021) A novel multivariate time-series anomaly detection approach using an unsupervised deep neural network. IEEE Access 9:109025\u2013109041","journal-title":"IEEE Access"},{"key":"7459_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ress.2022.108750","volume":"228","author":"D Zhou","year":"2022","unstructured":"Zhou D, Zhuang X, Zuo H, Cai J et al (2022) A model fusion strategy for identifying aircraft risk using CNN and Att-BiLSTM. Reliab Eng Syst Saf 228:1\u201314","journal-title":"Reliab Eng Syst Saf"},{"issue":"7","key":"7459_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s19071693","volume":"19","author":"W Gong","year":"2019","unstructured":"Gong W, Chen H, Zhang Z et al (2019) A novel deep learning method for intelligent fault diagnosis of rotating machinery based on improved CNN-SVM and multichannel data fusion. Sensors 19(7):1\u201337","journal-title":"Sensors"},{"key":"7459_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/app12083989","volume":"12","author":"P Madan","year":"2022","unstructured":"Madan P, Singh V, Chaudhari V et al (2022) An optimization-based diabetes prediction model using CNN and bi-directional LSTM in real-time environment. Appl Sci 12:1\u201326","journal-title":"Appl Sci"},{"issue":"5","key":"7459_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/cpe.6746","volume":"34","author":"SA Tuncer","year":"2022","unstructured":"Tuncer SA, Alkan A (2022) Classification of EMG signals taken from arm with hybrid CNN-SVM architecture. Concurr Comput Pract Exper 34(5):1\u201311","journal-title":"Concurr Comput Pract Exper"},{"key":"7459_CR40","volume":"112","author":"Y Zhang","year":"2022","unstructured":"Zhang Y, Wei J, Duan M et al (2022) Coherent pixel selection using a dual-channel 1-D CNN for time series InSAR analysis. Int J Appl Earth Obs Geoinform 112:102927","journal-title":"Int J Appl Earth Obs Geoinform"},{"key":"7459_CR41","first-page":"1","volume":"12","author":"O Ozaltin","year":"2022","unstructured":"Ozaltin O, Yeniay O (2022) A novel proposed CNN-SVM architecture for ECG scalograms classification. Soft Comput 12:1\u201320","journal-title":"Soft Comput"},{"issue":"9","key":"7459_CR42","first-page":"231","volume":"13","author":"AK Jean","year":"2022","unstructured":"Jean AK, Diarra M, Bakary BA et al (2022) Application based on hybrid CNN-SVM and PCA-SVM approaches for classification of cocoa beans. Int J Adv Comput Sci Appl 13(9):231\u2013238","journal-title":"Int J Adv Comput Sci Appl"},{"key":"7459_CR43","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.123483","volume":"249","author":"L Liu","year":"2024","unstructured":"Liu L, Lin G, Zhu L et al (2024) Revisiting Code Smell Severity Prioritization using learning to rank techniques. Exp Syst Appl 249:123483","journal-title":"Exp Syst Appl"},{"key":"7459_CR44","doi-asserted-by":"publisher","first-page":"45290","DOI":"10.1109\/ACCESS.2025.3543277","volume":"13","author":"M Eashid","year":"2025","unstructured":"Eashid M, Osman MH, Sharif KY et al (2025) Interpretable Deep Learning for Efficient Code Smell Prioritization in Software Development. IEEE Access 13:45290\u201345311","journal-title":"IEEE Access"},{"key":"7459_CR45","doi-asserted-by":"crossref","unstructured":"Arcaini P, Gargantini A, Radavelli M (2019) Efficient and Guaranteed Detection of T-Way Failure-Inducing Combinations, in  Proc. 2019 IEEE International Conference on Software Testing, Verification and Validation Workshops, Xiamen, China, pp. 200\u2013209","DOI":"10.1109\/ICSTW.2019.00054"},{"issue":"2","key":"7459_CR46","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1109\/TSE.2018.2844259","volume":"46","author":"X Niu","year":"2020","unstructured":"Niu X, Nie C, Yu L et al (2020) Identifying failure-causing schemas in the presence of multiple faults. IEEE Trans Softw Eng 46(2):141\u2013162","journal-title":"IEEE Trans Softw Eng"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-025-07459-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-025-07459-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-025-07459-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T16:31:51Z","timestamp":1749486711000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-025-07459-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,9]]},"references-count":46,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2025,6]]}},"alternative-id":["7459"],"URL":"https:\/\/doi.org\/10.1007\/s11227-025-07459-5","relation":{},"ISSN":["1573-0484"],"issn-type":[{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,9]]},"assertion":[{"value":"16 May 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 June 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"997"}}