{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T06:50:18Z","timestamp":1770792618070,"version":"3.50.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,8]],"date-time":"2023-07-08T00:00:00Z","timestamp":1688774400000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100009024","name":"ERATO HASUO Metamathematics for Systems Design Project","doi-asserted-by":"publisher","award":["ERATO"],"award-info":[{"award-number":["ERATO"]}],"id":[{"id":"10.13039\/501100009024","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"The Netional Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No.61872182"],"award-info":[{"award-number":["No.61872182"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Research Corporation for Science Advancement Council of Norway","award":["Project#299827"],"award-info":[{"award-number":["Project#299827"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,7,8]]},"DOI":"10.1145\/3512290.3528869","type":"proceedings-article","created":{"date-parts":[[2022,7,26]],"date-time":"2022-07-26T09:02:15Z","timestamp":1658826135000},"page":"1345-1353","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":30,"title":["Mutation-based test generation for quantum programs with multi-objective search"],"prefix":"10.1145","author":[{"given":"Xinyi","family":"Wang","sequence":"first","affiliation":[{"name":"Nanjing University of Aeronautics and Astronautics, Nanjing, China"}]},{"given":"Tongxuan","family":"Yu","sequence":"additional","affiliation":[{"name":"Nanjing University of Aeronautics and Astronautics, Nanjing, China"}]},{"given":"Paolo","family":"Arcaini","sequence":"additional","affiliation":[{"name":"National Institute of Informatics, Tokyo, Japan"}]},{"given":"Tao","family":"Yue","sequence":"additional","affiliation":[{"name":"Nanjing University of Aeronautics and Astronautics"}]},{"given":"Shaukat","family":"Ali","sequence":"additional","affiliation":[{"name":"Simula Research Laboratory, Oslo, Norway"}]}],"member":"320","published-online":{"date-parts":[[2022,7,8]]},"reference":[{"key":"e_1_3_2_3_1_1","volume-title":"An introduction to categorical data analysis (3 ed.)","author":"Agresti Alan","unstructured":"Alan Agresti. 2019. An introduction to categorical data analysis (3 ed.). Wiley-Blackwell."},{"key":"e_1_3_2_3_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST49551.2021.00014"},{"key":"e_1_3_2_3_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985795"},{"key":"e_1_3_2_3_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-013-9249-9"},{"key":"e_1_3_2_3_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.swevo.2019.100598"},{"key":"e_1_3_2_3_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/167088.167097"},{"key":"e_1_3_2_3_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.61"},{"key":"e_1_3_2_3_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44857-1_1"},{"key":"e_1_3_2_3_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-013-9299-z"},{"key":"e_1_3_2_3_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.93"},{"key":"e_1_3_2_3_11_1","unstructured":"M. Gimeno-Segovia N. Harrigan and E.R. Johnston. 2019. Programming Quantum Computers: Essential Algorithms and Code Samples. O'Reilly Media Incorporated."},{"key":"e_1_3_2_3_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025144"},{"key":"e_1_3_2_3_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387940.3391459"},{"key":"e_1_3_2_3_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-42092-9_44"},{"key":"e_1_3_2_3_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.62"},{"key":"e_1_3_2_3_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2739482.2768417"},{"key":"e_1_3_2_3_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3300148"},{"key":"e_1_3_2_3_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3266003.3266013"},{"key":"e_1_3_2_3_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.44"},{"key":"e_1_3_2_3_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678563"},{"key":"e_1_3_2_3_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-NIER.2019.00023"},{"key":"e_1_3_2_3_22_1","volume-title":"Advanced Computational Methods for Knowledge Engineering","author":"Nguyen Quang Vu","unstructured":"Quang Vu Nguyen and Lech Madeyski. 2015. Searching for strongly subsuming higher order mutants by applying multi-objective optimization algorithm. In Advanced Computational Methods for Knowledge Engineering. Springer, 391--402."},{"key":"e_1_3_2_3_23_1","doi-asserted-by":"publisher","DOI":"10.1080\/01969722.2016.1128763"},{"key":"e_1_3_2_3_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49381-6_23"},{"key":"e_1_3_2_3_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/bs.adcom.2018.03.015"},{"key":"e_1_3_2_3_26_1","doi-asserted-by":"publisher","DOI":"10.1186\/2193-1801-2-121"},{"key":"e_1_3_2_3_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1808266.1808283"},{"key":"e_1_3_2_3_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180183"},{"key":"e_1_3_2_3_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCE.2015.145"},{"key":"e_1_3_2_3_30_1","first-page":"11","article-title":"Genetic algorithm for automatic generation of representative test suite for mutation testing","volume":"15","author":"Prakasa Rao C","year":"2015","unstructured":"C Prakasa Rao and P Govindarajulu. 2015. Genetic algorithm for automatic generation of representative test suite for mutation testing. International Journal of Computer Science and Network Security (IJCSNS) 15, 2 (2015), 11.","journal-title":"International Journal of Computer Science and Network Security (IJCSNS)"},{"key":"e_1_3_2_3_31_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.256"},{"key":"e_1_3_2_3_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2020.3013290"},{"key":"e_1_3_2_3_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897010.2897012"},{"key":"e_1_3_2_3_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST49551.2021.00061"},{"key":"e_1_3_2_3_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88106-1_2"},{"key":"e_1_3_2_3_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678798"},{"key":"e_1_3_2_3_37_1","doi-asserted-by":"crossref","unstructured":"Xinyi Wang Tongxuan Yu Paolo Arcaini Tao Yue and Shaukat Ali. 2022. Mutation-Based Test Generation for Quantum Programs with Multi-Objective Search - Supplementary material. https:\/\/github.com\/Simula-COMPLEX\/MutTG-paper.","DOI":"10.1145\/3512290.3528869"},{"key":"e_1_3_2_3_38_1","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8715261"},{"key":"e_1_3_2_3_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47106-8_2"},{"key":"e_1_3_2_3_40_1","article-title":"Quantum Software Testing: Challenges, Early Achievements, and Opportunities","volume":"2022","author":"Yue Tao","year":"2022","unstructured":"Tao Yue, Paolo Arcaini, and Shaukat Ali. 2022. Quantum Software Testing: Challenges, Early Achievements, and Opportunities. ERCIM News 2022, 128 (2022). https:\/\/ercim-news.ercim.eu\/en128\/special\/quantum-software-testing-challenges-early-achievements-and-opportunities","journal-title":"ERCIM News"},{"key":"e_1_3_2_3_41_1","volume-title":"Quantum Software Engineering: Landscapes and Horizons. CoRR abs\/2007.07047","author":"Zhao Jianjun","year":"2020","unstructured":"Jianjun Zhao. 2020. Quantum Software Engineering: Landscapes and Horizons. CoRR abs\/2007.07047 (2020). arXiv:2007.07047"}],"event":{"name":"GECCO '22: Genetic and Evolutionary Computation Conference","location":"Boston Massachusetts","acronym":"GECCO '22","sponsor":["SIGEVO ACM Special Interest Group on Genetic and Evolutionary Computation"]},"container-title":["Proceedings of the Genetic and Evolutionary Computation Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3512290.3528869","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3512290.3528869","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3512290.3528869","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T00:45:08Z","timestamp":1756169108000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3512290.3528869"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,8]]},"references-count":41,"alternative-id":["10.1145\/3512290.3528869","10.1145\/3512290"],"URL":"https:\/\/doi.org\/10.1145\/3512290.3528869","relation":{},"subject":[],"published":{"date-parts":[[2022,7,8]]},"assertion":[{"value":"2022-07-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}