{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,4]],"date-time":"2025-10-04T12:09:05Z","timestamp":1759579745652,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":61,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,26]],"date-time":"2018-10-26T00:00:00Z","timestamp":1540512000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,26]]},"DOI":"10.1145\/3236024.3236032","type":"proceedings-article","created":{"date-parts":[[2018,10,29]],"date-time":"2018-10-29T12:06:00Z","timestamp":1540814760000},"page":"411-422","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["NAR-miner: discovering negative association rules from code for bug detection"],"prefix":"10.1145","author":[{"given":"Pan","family":"Bian","sequence":"first","affiliation":[{"name":"Renmin University of China, China"}]},{"given":"Bin","family":"Liang","sequence":"additional","affiliation":[{"name":"Renmin University of China, China"}]},{"given":"Wenchang","family":"Shi","sequence":"additional","affiliation":[{"name":"Renmin University of China, China"}]},{"given":"Jianjun","family":"Huang","sequence":"additional","affiliation":[{"name":"Renmin University of China, China"}]},{"given":"Yan","family":"Cai","sequence":"additional","affiliation":[{"name":"Institute of Software at Chinese Academy of Sciences, China"}]}],"member":"320","published-online":{"date-parts":[[2018,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287630"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/645920.672836"},{"key":"e_1_3_2_1_3_1","unstructured":"Alfred V. Aho Ravi Sethi and Jeffrey D. Ullman. 1986. Compilers: principles techniques and tools. Addison-Wesley.   Alfred V. Aho Ravi Sethi and Jeffrey D. Ullman. 1986. Compilers: principles techniques and tools. Addison-Wesley."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/565816.503275"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025151"},{"key":"e_1_3_2_1_6_1","unstructured":"Pan Bian Bin Liang Yan Zhang Chaoqun Yang Wenchang Shi and Yan Cai. 2018. Detecting Bugs by Discovering Expectations and Their Violations. IEEE Transactions on Software Engineering (2018).  Pan Bian Bin Liang Yan Zhang Chaoqun Yang Wenchang Shi and Yan Cai. 2018. Detecting Bugs by Discovering Expectations and Their Violations. IEEE Transactions on Software Engineering (2018)."},{"key":"e_1_3_2_1_7_1","unstructured":"2816639  2816639"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273486"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970363"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.111"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/5397.5399"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1176617.1176667"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/115372.115320"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251229.1251230"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502041"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/24039.24041"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453150"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512539"},{"issue":"3","key":"e_1_3_2_1_19_1","first-page":"607","article-title":"Data mining: concepts and techniques, 3rd edition","volume":"13","author":"Han Jiawei","year":"2011","journal-title":"Morgan Kaufmann, Chapter"},{"volume-title":"Proceedings of the 25th USENIX Security Symposium, USENIX Security 16","year":"2016","author":"Jana Suman","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970354"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.31274\/etd-180810-6021"},{"volume-title":"Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI \u201906)","year":"2006","author":"Kremenek Ted","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635890"},{"volume-title":"Proceedings of the 6th Symposium on Operating System Design and Implementation (OSDI 2004","year":"2004","author":"Li Zhenmin","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081755"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884870"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081754"},{"volume-title":"Proceedings of the 14th USENIX Security Symposium","year":"2005","author":"Benjamin Livshits V.","key":"e_1_3_2_1_29_1"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1401827.1401838"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294272"},{"volume-title":"Proceedings of the 18th USENIX Security Symposium","year":"2009","author":"Molnar David","key":"e_1_3_2_1_32_1"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/844128.844136"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635924"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595767"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813604"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337332"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1858996.1859035"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250749"},{"key":"e_1_3_2_1_40_1","unstructured":"Bug report list for FFmpeg. March 2018. https:\/\/trac.ffmpeg.org.  Bug report list for FFmpeg. March 2018. https:\/\/trac.ffmpeg.org."},{"key":"e_1_3_2_1_41_1","unstructured":"Bug report list for OpenSSL. March 2018. https:\/\/github.com\/openssl\/openssl\/ issues. ESEC\/FSE \u201918 November 4\u20139 2018 Lake Buena Vista FL USA P. Bian B. Liang W. Shi J. Huang and Y. Cai  Bug report list for OpenSSL. March 2018. https:\/\/github.com\/openssl\/openssl\/ issues. ESEC\/FSE \u201918 November 4\u20139 2018 Lake Buena Vista FL USA P. Bian B. Liang W. Shi J. Huang and Y. Cai"},{"key":"e_1_3_2_1_42_1","unstructured":"Bug report mailing list for PostgreSQL. March 2018. https:\/\/www.postgresql.org\/ list\/pgsql-bugs.  Bug report mailing list for PostgreSQL. March 2018. https:\/\/www.postgresql.org\/ list\/pgsql-bugs."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001434"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/645483.656205"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337360"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2007.180"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294276"},{"volume-title":"Proceedings of the 17th USENIX Security Symposium","year":"2008","author":"Tan Lin","key":"e_1_3_2_1_48_1"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985796"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.72"},{"volume-title":"Proceedings of the 2nd Summit on Advances in Programming Languages, SNAPL 2017","year":"2017","author":"Toman John","key":"e_1_3_2_1_51_1"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2007.07.034"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970341"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-011-0084-1"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287632"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31980-1_30"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1010614.1010616"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.54"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516665"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/1189256.1189259"},{"volume-title":"Proceedings of the 25th USENIX Security Symposium, USENIX Security 16","year":"2016","author":"Yun Insu","key":"e_1_3_2_1_61_1"}],"event":{"name":"ESEC\/FSE '18: 26th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Lake Buena Vista FL USA","acronym":"ESEC\/FSE '18"},"container-title":["Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3236024.3236032","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3236024.3236032","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:25Z","timestamp":1750208245000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3236024.3236032"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,26]]},"references-count":61,"alternative-id":["10.1145\/3236024.3236032","10.1145\/3236024"],"URL":"https:\/\/doi.org\/10.1145\/3236024.3236032","relation":{},"subject":[],"published":{"date-parts":[[2018,10,26]]},"assertion":[{"value":"2018-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}