{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T15:37:30Z","timestamp":1766504250393,"version":"3.37.3"},"reference-count":66,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T00:00:00Z","timestamp":1648771200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T00:00:00Z","timestamp":1648771200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T00:00:00Z","timestamp":1648771200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61573362","61773841"],"award-info":[{"award-number":["61573362","61773841"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Research and Development Program of China","award":["2018YFB1003802"],"award-info":[{"award-number":["2018YFB1003802"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2020ZDPYMS40"],"award-info":[{"award-number":["2020ZDPYMS40"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2022,4,1]]},"DOI":"10.1109\/tse.2020.3014960","type":"journal-article","created":{"date-parts":[[2020,8,7]],"date-time":"2020-08-07T21:26:17Z","timestamp":1596835577000},"page":"1169-1184","source":"Crossref","is-referenced-by-count":11,"title":["Orderly Generation of Test Data via Sorting Mutant Branches Based on Their Dominance Degrees for Weak Mutation Testing"],"prefix":"10.1109","volume":"48","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3207-703X","authenticated-orcid":false,"given":"Xiangjuan","family":"Yao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5837-1344","authenticated-orcid":false,"given":"Gongjie","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3931-0159","authenticated-orcid":false,"given":"Feng","family":"Pan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2838-4301","authenticated-orcid":false,"given":"Dunwei","family":"Gong","sequence":"additional","affiliation":[]},{"given":"Changqing","family":"Wei","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1002\/9781119202486"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/ICSE.2017.61"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/C-M.1978.218136"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/TSE.1977.231145"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1007\/s10664-017-9582-5"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1016\/S0164-1212(96)00154-9"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/1831708.1831728"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/2025113.2025144"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/TSE.2017.2732347"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/TSE.2006.92"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1145\/2568225.2568271"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1145\/1082983.1083288"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/TSE.1982.235571"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/120807.120826"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1145\/2568225.2568265"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/TSE.2003.1183927"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1007\/s11219-011-9142-y"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/TSE.2010.62"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1016\/bs.adcom.2018.03.015"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1145\/2480362.2480592"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1002\/(SICI)1097-024X(199602)26:2<165::AID-SPE5>3.0.CO;2-K"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1145\/3180155.3180183"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.15439\/2017F375"},{"volume-title":"Mutation Analysis of Program Test Data","year":"1980","author":"Budd","key":"ref24"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1002\/stvr.4370040104"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.15439\/2017F215"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/ICSE.1993.346062"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/SCAM.2008.36"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1002\/stvr.392"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/32.92910"},{"volume-title":"Weak Mutation is Probably Strong Mutation","year":"1993","author":"Horgan","key":"ref31"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/32.286422"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1016\/j.infsof.2016.05.001"},{"issue":"10","key":"ref34","first-page":"2504","article-title":"Mutation testing based on statistical dominance analysis","volume":"26","author":"Zhang","year":"2015","journal-title":"Chinese J. Softw."},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1109\/TSE.2017.2786286"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1145\/1370114.1370133"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1002\/(SICI)1097-024X(199902)29:2<167::AID-SPE225>3.0.CO;2-V"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1145\/2927924"},{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1007\/978-3-540-79124-9_10"},{"issue":"4","key":"ref40","first-page":"617","article-title":"An approach for constraint-based test data generation in mutation testing","volume":"48","author":"Liu","year":"2011","journal-title":"J. Comput. Res. Develop."},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1109\/32.57624"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1007\/s00521-011-0568-8"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1007\/s10515-016-0197-7"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1145\/3182659"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1016\/j.jss.2011.06.028"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1109\/ICSTW.2010.31"},{"doi-asserted-by":"publisher","key":"ref47","DOI":"10.1109\/TSE.2012.14"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.1049\/iet-sen.2014.0058"},{"issue":"11","key":"ref49","first-page":"2318","article-title":"Test case generation based on mutation analysis and set evolution","volume":"38","author":"Zhang","year":"2015","journal-title":"Chinese J. Comput."},{"doi-asserted-by":"publisher","key":"ref50","DOI":"10.1016\/j.infsof.2012.02.004"},{"year":"2007","author":"May","article-title":"Test data generation: Two evolutionary approaches to mutation testing","key":"ref51"},{"doi-asserted-by":"publisher","key":"ref52","DOI":"10.1186\/s40411-016-0030-9"},{"key":"ref53","first-page":"1","article-title":"Test data generation techniques for mutation testing: A systematic mapping","volume-title":"Proc. 11th Workshop Exp. Softw. Eng.","author":"Carlos"},{"doi-asserted-by":"publisher","key":"ref54","DOI":"10.1002\/(sici)1099-1689(199709)7:3<165::aid-stvr143>3.0.co;2-u"},{"doi-asserted-by":"publisher","key":"ref55","DOI":"10.1109\/ICSTW.2014.21"},{"doi-asserted-by":"publisher","key":"ref56","DOI":"10.1109\/APSEC.2013.34"},{"doi-asserted-by":"publisher","key":"ref57","DOI":"10.1016\/j.scico.2014.05.012"},{"doi-asserted-by":"publisher","key":"ref58","DOI":"10.1109\/ICSE.2015.103"},{"doi-asserted-by":"publisher","key":"ref59","DOI":"10.1109\/32.962562"},{"doi-asserted-by":"publisher","key":"ref60","DOI":"10.1109\/32.988497"},{"doi-asserted-by":"publisher","key":"ref61","DOI":"10.1109\/ISSRE.1997.630875"},{"doi-asserted-by":"publisher","key":"ref62","DOI":"10.1109\/ISSRE.2015.7381798"},{"doi-asserted-by":"publisher","key":"ref63","DOI":"10.1016\/j.infsof.2015.08.008"},{"doi-asserted-by":"publisher","key":"ref64","DOI":"10.1017\/CBO9780511809163"},{"doi-asserted-by":"publisher","key":"ref65","DOI":"10.1002\/spe.4380210704"},{"doi-asserted-by":"publisher","key":"ref66","DOI":"10.1109\/CMPASS.1996.507890"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/9758085\/09162547.pdf?arnumber=9162547","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T22:42:20Z","timestamp":1704840140000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9162547\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,1]]},"references-count":66,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tse.2020.3014960","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"type":"print","value":"0098-5589"},{"type":"electronic","value":"1939-3520"},{"type":"electronic","value":"2326-3881"}],"subject":[],"published":{"date-parts":[[2022,4,1]]}}}