{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:44:55Z","timestamp":1772041495915,"version":"3.50.1"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772259"],"award-info":[{"award-number":["61772259"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872177"],"award-info":[{"award-number":["61872177"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005374","name":"Nanjing University of Posts and Telecommunications","doi-asserted-by":"publisher","award":["NY220015"],"award-info":[{"award-number":["NY220015"]}],"id":[{"id":"10.13039\/501100005374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1109\/tr.2022.3159812","type":"journal-article","created":{"date-parts":[[2022,4,20]],"date-time":"2022-04-20T19:32:28Z","timestamp":1650483148000},"page":"716-734","source":"Crossref","is-referenced-by-count":18,"title":["An Empirical Study on Bugs in Python Interpreters"],"prefix":"10.1109","volume":"71","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2297-1612","authenticated-orcid":false,"given":"Ziyuan","family":"Wang","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0716-0264","authenticated-orcid":false,"given":"Dexin","family":"Bu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1613-5914","authenticated-orcid":false,"given":"Aiyue","family":"Sun","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2041-537X","authenticated-orcid":false,"given":"Shanyi","family":"Gou","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2719-1017","authenticated-orcid":false,"given":"Yong","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer and Information, Anhui Polytechnic University, Wuhu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2352-2226","authenticated-orcid":false,"given":"Lin","family":"Chen","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1181309.1181314"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1414004.1414030"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985457"},{"key":"ref4","first-page":"93","article-title":"Milk or wine: Does software security improve with age","volume-title":"Proc. 15th USENIX Secur. Symp.","author":"Ozment","year":"2016"},{"key":"ref5","first-page":"329","article-title":"Learning from mistakesA comprehensive study on real world concurrency bug characteristics","volume-title":"Proc. 13th Int. Conf. Architectural Support Program. Lang. Operating Syst.","author":"Lu","year":"2008"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.23940\/ijpe.21.01.p12.123134"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.15439\/2015F139"},{"key":"ref8","article-title":"Extending and embedding the Python interpreter","author":"Rossum","year":"2008"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2017.16"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806811"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100061"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227112"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2486046.2486067"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100070"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1292414.1292419"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.23940\/ijpe.20.08.p16.12891298"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45064-1_6"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.23940\/ijpe.20.02.p11.284296"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.66"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010260"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.31"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931074"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-013-9258-8"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.59"},{"issue":"4","key":"ref25","first-page":"771","article-title":"Progress on approaches to automatic program repair","volume":"27","author":"Xuan","year":"2016","journal-title":"J. Softw."},{"issue":"5","key":"ref26","first-page":"1422","article-title":"Empirical study of code smell impact on software evolution","volume":"30","author":"Zhang","year":"2019","journal-title":"J. Softw."},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338955"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134072"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3299815.3314472"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2019.2916204"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-016-9432-x"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2017.41"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213866"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950308"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.23940\/ijpe.20.07.p9.10671077"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.23940\/ijpe.21.09.p5.787795"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2006.37"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110884"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/248209.237175"},{"key":"ref40","article-title":"Grammar-based interpreter fuzz testing","volume-title":"Masters Thesis","author":"Holler","year":"2011"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966463"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2814270.2814319"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213848"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3166064"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884878"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/24\/9787285\/09760699.pdf?arnumber=9760699","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T21:17:26Z","timestamp":1705958246000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9760699\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6]]},"references-count":45,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tr.2022.3159812","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"value":"0018-9529","type":"print"},{"value":"1558-1721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6]]}}}