{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T14:47:28Z","timestamp":1776782848229,"version":"3.51.2"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["624B2067"],"award-info":[{"award-number":["624B2067"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072194"],"award-info":[{"award-number":["62072194"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172205"],"award-info":[{"award-number":["62172205"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005145","name":"Jiangsu Natural Science Foundation","doi-asserted-by":"publisher","award":["BK20231402"],"award-info":[{"award-number":["BK20231402"]}],"id":[{"id":"10.13039\/501100005145","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Collaborative Innovation Center of Novel Software Technology and Industrialization"},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["14380121"],"award-info":[{"award-number":["14380121"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1109\/tse.2025.3569530","type":"journal-article","created":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T17:46:53Z","timestamp":1747158413000},"page":"1838-1853","source":"Crossref","is-referenced-by-count":3,"title":["Isolating Compiler Faults Through Differentiated Compilation Configurations"],"prefix":"10.1109","volume":"51","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1153-2013","authenticated-orcid":false,"given":"Yibiao","family":"Yang","sequence":"first","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-5666-2158","authenticated-orcid":false,"given":"Qingyang","family":"Li","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5617-2205","authenticated-orcid":false,"given":"Maolin","family":"Sun","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-2740-0433","authenticated-orcid":false,"given":"Jing","family":"Yang","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9932-7315","authenticated-orcid":false,"given":"Jiangchang","family":"Wu","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4645-2526","authenticated-orcid":false,"given":"Yuming","family":"Zhou","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110884"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338957"},{"key":"ref3","first-page":"78","article-title":"Enhanced compiler bug isolation via memoized search","volume-title":"Proc. 35th IEEE\/ACM Int. Conf. Automat. Softw. Eng. (ASE)","author":"Chen","year":"2020"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2024.3397822"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.25"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2017.2688487"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2522920.2522924"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/saner53432.2022.00065"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TAIC.PART.2007.13"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2017.22"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931074"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/800192.805690"},{"key":"ref13","article-title":"Compilers Principles, Techniques & Tools. (2nd Edition)","author":"Aho","year":"2006"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110884"},{"key":"ref15","article-title":"GCC.","year":"2023"},{"key":"ref16","article-title":"LLVM."},{"key":"ref17","article-title":"Optimizing real world applications with GCC link time optimization","author":"Glek","year":"2010"},{"key":"ref18","first-page":"1","article-title":"Milepost GCC: Machine learning based research compiler","volume-title":"Proc. GCC Developers\u2019 Summit","author":"Fursin","year":"2008"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78133-4_15"},{"key":"ref20","first-page":"37","article-title":"High-level loop optimizations for GCC","volume-title":"Proc. GCC Develop. Summit","author":"Berlin","year":"2004"},{"key":"ref21","article-title":"GCOV.","year":"2023"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3691620.3695074"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3092703.3092717"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985795"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2521368"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.62"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2948158"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101949"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2000791.2000795"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2013.2285319"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380230603"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1085130.1085135"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2014.28"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.14"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1509"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1401827.1401841"},{"key":"ref37","first-page":"262","article-title":"Locus: Locating bugs from software changes","volume-title":"Proc. 31st IEEE\/ACM Int. Conf. Automat. Softw. Eng. (ASE)","author":"Wen","year":"2016"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/74105.74106"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/32.988498"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254104"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115697"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2018.00027"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1727"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/32\/11048386\/11002719.pdf?arnumber=11002719","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T17:34:24Z","timestamp":1750786464000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11002719\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6]]},"references-count":43,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tse.2025.3569530","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6]]}}}