{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T07:10:40Z","timestamp":1750749040632,"version":"3.37.3"},"reference-count":59,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key R&#x0026;D Program of China","doi-asserted-by":"publisher","award":["2022YFB3103900"],"award-info":[{"award-number":["2022YFB3103900"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62132020"],"award-info":[{"award-number":["62132020"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Alibaba Innovative Research Program"},{"name":"CCF-Ant Group Research Foundation"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2024,5]]},"DOI":"10.1109\/tse.2024.3377645","type":"journal-article","created":{"date-parts":[[2024,4,12]],"date-time":"2024-04-12T17:27:29Z","timestamp":1712942849000},"page":"1144-1162","source":"Crossref","is-referenced-by-count":2,"title":["Generic Sensitivity: Generics-Guided Context Sensitivity for Pointer Analysis"],"prefix":"10.1109","volume":"50","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-0931-8767","authenticated-orcid":false,"given":"Haofeng","family":"Li","sequence":"first","affiliation":[{"name":"SKLP, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Tian","family":"Tan","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"given":"Yue","family":"Li","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4162-0404","authenticated-orcid":false,"given":"Jie","family":"Lu","sequence":"additional","affiliation":[{"name":"SKLP, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Haining","family":"Meng","sequence":"additional","affiliation":[{"name":"SKLP, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Liqing","family":"Cao","sequence":"additional","affiliation":[{"name":"SKLP, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Yongheng","family":"Huang","sequence":"additional","affiliation":[{"name":"SKLP, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4476-0541","authenticated-orcid":false,"given":"Lian","family":"Li","sequence":"additional","affiliation":[{"name":"SKLP, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Lin","family":"Gao","sequence":"additional","affiliation":[{"name":"TianqiSoft Inc., Beijing, China"}]},{"given":"Peng","family":"Di","sequence":"additional","affiliation":[{"name":"Ant Group, Hangzhou, China"}]},{"given":"Liang","family":"Lin","sequence":"additional","affiliation":[{"name":"Alibaba Group, Beijing, China"}]},{"given":"ChenXi","family":"Cui","sequence":"additional","affiliation":[{"name":"Alibaba Group, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.30"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882338"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678891"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2214"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23089"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00034"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3133926"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/379605.379665"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025160"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1772954.1772985"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1561\/2500000014"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36946-9_8"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/566172.566174"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1044834.1044835"},{"volume-title":"Two Approaches to Interprocedural Data Flow Analysis","year":"1978","author":"Sharir","key":"ref16"},{"volume-title":"Control-Flow Analysis of Higher-Order Languages or Taming Lambda","year":"1991","author":"Shivers","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1926385.1926390"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2555670.2466483"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2499370.2462191"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236041"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568295"},{"year":"2023","key":"ref23","article-title":"Wala: T.J. Watson libraries for analysis"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1167473.1167488"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3276511"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3381915"},{"article-title":"Generic sensitivity: Customizing context-sensitive pointer analysis for generics","year":"2023","author":"Li","key":"ref27"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/11688839_5"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1640089.1640108"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3360574"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3485524"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062360"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/11531142_4"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1167515.1167498"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1961204.1961205"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598120"},{"article-title":"Program analysis and specialization for the C programming language","year":"1994","author":"Andersen","key":"ref37"},{"issue":"20","key":"ref38","first-page":"2851","article-title":"Points-to analysis: A fine-grained evaluation.","volume":"18","author":"Lundberg","year":"2012","journal-title":"J. Universal Comput. Sci."},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2487568.2487569"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3088515.3088519"},{"key":"ref41","first-page":"712","article-title":"Adaptive context-sensitive analysis for JavaScript","volume-title":"Proc. 29th Eur. Conf. Object-Oriented Program. (ECOOP)","author":"Wei","year":"2015"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594320"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3133924"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3276510"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3293607"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3428247"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3498720"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678880"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53413-7_24"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3591242"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3485547"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36579-6_12"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/996841.996859"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85261-2_23"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1002\/spe.895"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001443"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3037697.3037744"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3377555.3377885"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3386026"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/10531114\/10496593.pdf?arnumber=10496593","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T06:59:44Z","timestamp":1725605984000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10496593\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5]]},"references-count":59,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tse.2024.3377645","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"type":"print","value":"0098-5589"},{"type":"electronic","value":"1939-3520"},{"type":"electronic","value":"2326-3881"}],"subject":[],"published":{"date-parts":[[2024,5]]}}}