{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T03:50:02Z","timestamp":1773892202089,"version":"3.50.1"},"reference-count":69,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.1109\/saner.2019.8667970","type":"proceedings-article","created":{"date-parts":[[2019,3,19]],"date-time":"2019-03-19T01:30:10Z","timestamp":1552959010000},"page":"1-12","source":"Crossref","is-referenced-by-count":137,"title":["AVATAR: Fixing Semantic Bugs with Fix Patterns of Static Analysis Violations"],"prefix":"10.1109","author":[{"given":"Kui","family":"Liu","sequence":"first","affiliation":[]},{"given":"Anil","family":"Koyuncu","sequence":"additional","affiliation":[]},{"given":"Dongsun","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Tegawende F.","family":"Bissyande","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950295"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2013.6671299"},{"key":"ref33","year":"2018","journal-title":"SpotBugs"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238213"},{"key":"ref31","year":"2018","journal-title":"FindBugs"},{"key":"ref30","article-title":"Learning quick fixes from code repositories","author":"rolim","year":"2018","journal-title":"arXiv preprint arXiv 1803 03806"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.50"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2011.12"},{"key":"ref35","year":"2018","journal-title":"Google Error prone"},{"key":"ref34","year":"2018","journal-title":"Facebook Infer"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2018.00085"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330203"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2628055"},{"key":"ref63","article-title":"You cannot fix what you cannot find! an investigation of fault localization bias in benchmarking automated program repair systems","author":"liu","year":"2019","journal-title":"Proceedings International Conference on Software Testing Verification and Validation"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.62"},{"key":"ref64","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1145\/2635868.2635906","article-title":"Test case purification for improving fault localization","author":"xuan","year":"2014","journal-title":"2nd ACM-SIGSOFT Symposium on the foundations of software engineering"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1414004.1414013"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180245"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-016-9470-4"},{"key":"ref29","article-title":"Mining fix patterns for findbugs violations","author":"liu","year":"2019","journal-title":"IEEE Transactions on Software Engineering"},{"key":"ref67","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1145\/3196398.3196473","article-title":"Bugs. jar: a large-scale, diverse dataset of real-world java bugs","author":"saha","year":"2018","journal-title":"Proceedings of International Conference on Mining Software Repositories"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/3276517"},{"key":"ref69","article-title":"Learning to spot and refactor inconsistent method names","author":"liu","year":"2019","journal-title":"Proceedings of the 41st ACM\/IEEE International Conference on Software Engineering"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070536"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606623"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213871"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568324"},{"key":"ref21","article-title":"Fixminer: Mining relevant fix patterns for automated program repair","author":"koyuncu","year":"2018","journal-title":"arXiv preprint arXiv 1810 06008"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2018.00037"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"492","DOI":"10.1145\/2591062.2591114","article-title":"Do the fix ingredients already exist? an empirical inquiry into the redundancy assumptions of program repair approaches","author":"martinez","year":"2014","journal-title":"Companion Proceedings of the 36th International Conference on Software Engineering"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2013.6624018"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3240732"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/S0893-6080(03)00115-1"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351752"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180233"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115676"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2948705"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.62"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.41"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/2522920.2522924"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483767"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TAIC.PART.2007.13"},{"key":"ref10","first-page":"213","article-title":"History driven program repair","author":"le","year":"2016","journal-title":"Proceedings of the 23rd IEEE International Conference on Software Analysis Evolution and Reengineering"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2914770.2837617"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115675"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115674"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106309"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106253"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2560811"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.45"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180247"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786825"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106274"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606626"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.104"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.60"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606625"},{"key":"ref8","first-page":"166","article-title":"Staged program repair with condition synthesis","author":"long","year":"2015","journal-title":"Proceedings of the 10th Joint Meeting on Foundations of Software Engineering"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.63"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642982"},{"key":"ref9","first-page":"428","article-title":"Enhancing automated program repair with deductive verification","author":"le","year":"2016","journal-title":"Proc of Intl Conference on Software Maintenance"},{"key":"ref46","year":"2018","journal-title":"Clang Static Analyzer"},{"key":"ref45","year":"2018","journal-title":"Cppcheck"},{"key":"ref48","author":"copeland","year":"2005","journal-title":"PMD Applied"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/1052883.1052895"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1145\/3092703.3092713","article-title":"Impact of Tool Support in Patch Construction","author":"koyuncu","year":"2017","journal-title":"Proc of ACM SIGSOFT international symposium on Software testing and analysis"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9077-5"},{"key":"ref44","year":"2018","journal-title":"Splint"},{"key":"ref43","year":"2018","journal-title":"PMD"}],"event":{"name":"2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER)","location":"Hangzhou, China","start":{"date-parts":[[2019,2,24]]},"end":{"date-parts":[[2019,2,27]]}},"container-title":["2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8663526\/8667965\/08667970.pdf?arnumber=8667970","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T14:50:25Z","timestamp":1658155825000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8667970\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2]]},"references-count":69,"URL":"https:\/\/doi.org\/10.1109\/saner.2019.8667970","relation":{},"subject":[],"published":{"date-parts":[[2019,2]]}}}