{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T06:41:50Z","timestamp":1765262510186,"version":"3.46.0"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T00:00:00Z","timestamp":1741046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T00:00:00Z","timestamp":1741046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,3,4]]},"DOI":"10.1109\/saner-c66551.2025.00031","type":"proceedings-article","created":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T18:38:52Z","timestamp":1765219132000},"page":"158-165","source":"Crossref","is-referenced-by-count":0,"title":["Identifying Flaky Tests in Quantum Code: A Machine Learning Approach"],"prefix":"10.1109","author":[{"given":"Khushdeep","family":"Kaur","sequence":"first","affiliation":[{"name":"University of Maryland,Department of Information Systems,MD,USA"}]},{"given":"Dongchan","family":"Kim","sequence":"additional","affiliation":[{"name":"University of Maryland,Department of Information Systems,MD,USA"}]},{"given":"Ainaz","family":"Jamshidi","sequence":"additional","affiliation":[{"name":"University of Maryland,Department of Information Systems,MD,USA"}]},{"given":"Lei","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Maryland,Department of Information Systems,MD,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2017.16"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330570"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICST53961.2022.00020"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3476105"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635920"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICST49551.2021.00026"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2019.00038"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME46990.2020.00037"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180164"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00140"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3082424"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/AST58925.2023.00018"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2022.3208864"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICST53961.2022.00034"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2022.111326"},{"article-title":"Quantum software engineering: Landscapes and horizons","year":"2020","author":"Zhao","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1070\/PU2005v048n01ABEH002024"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.81.865"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM56168.2023.10304850"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022643204877"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.29172\/7c2a6982-6d72-4cd8-bba6-2fccb06a7011"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39964-3_62"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/IEC47844.2019.8950616"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.4236\/jsip.2013.43B031"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s11749-016-0481-7"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/QCE60285.2024.10274"},{"article-title":"Automating quantum software maintenance: Flakiness detection and root cause analysis","year":"2024","author":"Sivaloganathan","key":"ref29"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29044-2"},{"key":"ref32","volume-title":"Case study research: Design and methods.","volume":"5","author":"Yin","year":"2009"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2014.11.013"}],"event":{"name":"2025 IEEE International Conference on Software Analysis, Evolution and Reengineering - Companion (SANER-C)","start":{"date-parts":[[2025,3,4]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2025,3,4]]}},"container-title":["2025 IEEE International Conference on Software Analysis, Evolution and Reengineering - Companion (SANER-C)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11272146\/11272056\/11272152.pdf?arnumber=11272152","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T06:36:58Z","timestamp":1765262218000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11272152\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,4]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/saner-c66551.2025.00031","relation":{},"subject":[],"published":{"date-parts":[[2025,3,4]]}}}