{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T20:52:52Z","timestamp":1769719972098,"version":"3.49.0"},"reference-count":59,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61773384"],"award-info":[{"award-number":["61773384"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61573362"],"award-info":[{"award-number":["61573362"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61503220"],"award-info":[{"award-number":["61503220"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013290","name":"National Key Research and Development Program of China Stem Cell and Translational Research","doi-asserted-by":"publisher","award":["2018YFB1003802-01"],"award-info":[{"award-number":["2018YFB1003802-01"]}],"id":[{"id":"10.13039\/501100013290","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010023","name":"Natural Science Research of Jiangsu Higher Education Institutions of China","doi-asserted-by":"publisher","award":["2018KJA520012"],"award-info":[{"award-number":["2018KJA520012"]}],"id":[{"id":"10.13039\/501100010023","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.1109\/tr.2019.2922684","type":"journal-article","created":{"date-parts":[[2019,11,20]],"date-time":"2019-11-20T20:56:00Z","timestamp":1574283360000},"page":"334-348","source":"Crossref","is-referenced-by-count":16,"title":["Efficiently Generating Test Data to Kill Stubborn Mutants by Dynamically Reducing the Search Domain"],"prefix":"10.1109","volume":"69","author":[{"given":"Xiangying","family":"Dang","sequence":"first","affiliation":[]},{"given":"Xiangjuan","family":"Yao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2838-4301","authenticated-orcid":false,"given":"Dunwei","family":"Gong","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9021-7996","authenticated-orcid":false,"given":"Tian","family":"Tian","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"617","article-title":"An approach for constraint-based test data generation in mutation testing","volume":"48","author":"liu","year":"2011","journal-title":"J Comput Res Develop"},{"key":"ref38","first-page":"1164","article-title":"Survey on mutation-based test data generation","volume":"5","author":"my","year":"2015","journal-title":"Int J Elect Comput Eng"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/DepCoS-RELCOMEX.2008.51"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1542"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-014-0173-z"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2013.6557654"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1099-1689(199709)7:3<165::AID-STVR143>3.0.CO;2-U"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-3433-6_45"},{"key":"ref35","first-page":"21","article-title":"Detecting equivalent mutants by means of constraint systems","author":"nica","year":"0","journal-title":"Proc 3rd Int Conf Adv Syst Test Validat Lifecycle"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TAIC-PART.2008.8"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45712-7_28"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2685612"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321693"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1109\/TSE.1977.231145","article-title":"testing programs with the aid of a compiler","volume":"se 3","author":"hamlet","year":"1977","journal-title":"IEEE Transactions on Software Engineering"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-014-9338-4"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2897010.2897012"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.06.028"},{"key":"ref21","first-page":"2318","article-title":"Test case generation based on mutation analysis and set evolution","volume":"38","author":"zhang","year":"2015","journal-title":"Chin J Comput"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.04.049"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.4236\/jsea.2015.812057"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-2525-9_13"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.14"},{"key":"ref50","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/978-3-642-23716-4_14","article-title":"Cooperative co-evolutionary optimization of software project staff assignments and job scheduling","volume":"6956","author":"jian","year":"2011","journal-title":"Search Based Software Engineering"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2011.03.008"},{"key":"ref59","doi-asserted-by":"crossref","first-page":"2429","DOI":"10.3724\/SP.J.1016.2013.02429","article-title":"Evolutionary generation of test data for paths coverage based on scarce data capturing","volume":"36","author":"zhang","year":"2013","journal-title":"Chin J Comput"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2009.0092"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.32"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2013.07.007"},{"key":"ref55","first-page":"256","article-title":"Multi-population genetic algorithms with variational search areas","volume":"23","author":"gong","year":"2006","journal-title":"Control Theory Appl"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/1276958.1277172"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36614-7_3"},{"key":"ref52","first-page":"264","article-title":"Simulated co-evolution as the mechanism for emergent planning and scheduling","author":"husbandsb","year":"0","journal-title":"Proc 4th Int Conf Genetic Algorithms"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.05.001"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2809496"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2015.7102589"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483782"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2018.00025"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.161"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568265"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970345"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/32.92910"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-024X(199902)29:2<167::AID-SPE225>3.3.CO;2-M"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2010.38"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/bs.adcom.2018.03.015"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1978.218136"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.62"},{"key":"ref5","first-page":"2355","article-title":"Feasible path generation of weak mutation testing based on statistical analysis","volume":"39","author":"dang","year":"2016","journal-title":"Chinese J of Computer Science"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2009.04.016"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/960114.29669"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1111\/mec.13389"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025144"},{"key":"ref46","first-page":"1","article-title":"How effective are mutation testing tools? An empirical analysis of java mutation testing tools with manual analysis and real faults","volume":"8","author":"kintis","year":"2017","journal-title":"Empirical Softw Eng"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.01.017"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.2307\/2406212"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TAIC-PART.2008.18"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1016.2008.01025"},{"key":"ref41","first-page":"1","article-title":"Test data generation techniques for mutation testing: A systematic mapping","author":"carlos","year":"0","journal-title":"Proc 11th Workshop Exp Softw Eng"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2013.14"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-011-9142-y"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/24\/9023405\/08907494.pdf?arnumber=8907494","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T13:42:40Z","timestamp":1651066960000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8907494\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3]]},"references-count":59,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tr.2019.2922684","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"value":"0018-9529","type":"print"},{"value":"1558-1721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3]]}}}