{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T12:06:01Z","timestamp":1746101161110,"version":"3.37.3"},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872039"],"award-info":[{"award-number":["61872039"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["FRF-GF-19-019B"],"award-info":[{"award-number":["FRF-GF-19-019B"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004750","name":"Aeronautical Science Foundation of China","doi-asserted-by":"publisher","award":["2016ZD74004"],"award-info":[{"award-number":["2016ZD74004"]}],"id":[{"id":"10.13039\/501100004750","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Beijing Natural Science Foundation of China","award":["4162040"],"award-info":[{"award-number":["4162040"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1109\/tr.2020.3011423","type":"journal-article","created":{"date-parts":[[2020,8,10]],"date-time":"2020-08-10T21:23:27Z","timestamp":1597094607000},"page":"415-428","source":"Crossref","is-referenced-by-count":3,"title":["ReMuSSE: A Redundant Mutant Identification Technique Based on Selective Symbolic Execution"],"prefix":"10.1109","volume":"71","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3696-6176","authenticated-orcid":false,"given":"Chang-ai","family":"Sun","sequence":"first","affiliation":[{"name":"School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2807-3813","authenticated-orcid":false,"given":"An","family":"Fu","sequence":"additional","affiliation":[{"name":"School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, China"}]},{"given":"Xinling","family":"Guo","sequence":"additional","affiliation":[{"name":"School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3578-0994","authenticated-orcid":false,"given":"Tsong Yueh","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Software Engineering, Swinburne University of Technology, Melbourne, VIC, Australia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.62"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1977.231145"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1978.218136"},{"article-title":"Design of mutant operators for the c programming language","year":"1989","author":"Agrawal","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2008.123"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.07.002"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2011.54"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2001.991487"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.308"},{"key":"ref10","article-title":"Mutation operators for WS-BPEL 2.0","volume-title":"Proc. 21th Int. Conf. Softw. Syst. Eng. Appl.","author":"Estero-Botaro","year":"2008"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2011.52"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1509"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.104"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693094"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568254"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/bs.adcom.2018.03.015"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806863"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CMPSAC.1991.170202"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-5939-6_7"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1982.235571"},{"issue":"1","key":"ref21","first-page":"44","article-title":"A data flow analysis based redundant mutants identification technique","volume":"42","author":"Sun","year":"2019","journal-title":"Chin. J. Comput."},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/32.92910"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/120807.120826"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/32.286422"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.05.001"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-011-9142-y"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.162"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.02.006"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/24039.24041"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453114"},{"issue":"6","key":"ref31","first-page":"705","article-title":"Effective wove algorithm for software structure graph","volume":"26","author":"Sun","year":"2000","journal-title":"J. Beijing Univ. Aeronaut. Astronaut."},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/390016.808444"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3182657"},{"key":"ref35","first-page":"1","article-title":"Selective symbolic execution","volume-title":"Proc. 5th Workshop Hot Topics Syst. Dependability","author":"Chipounov","year":"2009"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3092703.3092714"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-024X(199602)26:2<165::AID-SPE5>3.0.CO;2-K"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2009.04.016"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.07.027"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1994.296778"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-005-3861-2"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1998.738488"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-5939-6_17"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s00165-014-0326-7"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2014.20"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2014.13"},{"key":"ref47","first-page":"1","article-title":"Static analysis of mutant subsumption","volume-title":"Proc. 8th IEEE Int. Conf. Softw. Testing, Verification Validation Workshops","author":"Bob","year":"2015"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2809496"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2016.01.007"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2018.00023"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2610388"},{"article-title":"On mutation","year":"1980","author":"Acree","key":"ref52"},{"article-title":"Mutation clustering","year":"2008","author":"Hussain","key":"ref53"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1993.346062"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/322993.322996"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/24\/9725327\/09163138.pdf?arnumber=9163138","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T00:19:04Z","timestamp":1704845944000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9163138\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3]]},"references-count":55,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tr.2020.3011423","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"type":"print","value":"0018-9529"},{"type":"electronic","value":"1558-1721"}],"subject":[],"published":{"date-parts":[[2022,3]]}}}