{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T21:04:24Z","timestamp":1773522264128,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":68,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,7,18]]},"DOI":"10.1145\/3533767.3534224","type":"proceedings-article","created":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T14:28:50Z","timestamp":1657895330000},"page":"314-326","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["RegMiner: towards constructing a large regression dataset from code evolution history"],"prefix":"10.1145","author":[{"given":"Xuezhi","family":"Song","sequence":"first","affiliation":[{"name":"Fudan University, China"}]},{"given":"Yun","family":"Lin","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, China \/ National University of Singapore, Singapore"}]},{"given":"Siang Hwee","family":"Ng","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore"}]},{"given":"Yijian","family":"Wu","sequence":"additional","affiliation":[{"name":"Fudan University, China"}]},{"given":"Xin","family":"Peng","sequence":"additional","affiliation":[{"name":"Fudan University, China"}]},{"given":"Jin Song","family":"Dong","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore"}]},{"given":"Hong","family":"Mei","sequence":"additional","affiliation":[{"name":"Peking University, China"}]}],"member":"320","published-online":{"date-parts":[[2022,7,18]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. Git-bisect Webiste. https:\/\/git-scm.com\/docs\/git-bisect Accessed: 2022-01-28. \t\t\t\t\t  [n. d.]. Git-bisect Webiste. https:\/\/git-scm.com\/docs\/git-bisect Accessed: 2022-01-28."},{"key":"e_1_3_2_1_2_1","unstructured":"[n. d.]. RegMiner Webiste. https:\/\/sites.google.com\/view\/regminer\/home Accessed: 2022-01-28. \t\t\t\t\t  [n. d.]. RegMiner Webiste. https:\/\/sites.google.com\/view\/regminer\/home Accessed: 2022-01-28."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/3220904.3221145"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380369"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2628058"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106255"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/566171.566191"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1670412.1670413"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005.. 342\u2013351","author":"Cleve Holger","year":"2005","unstructured":"Holger Cleve and Andreas Zeller . 2005 . Locating causes of program failures . In Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005.. 342\u2013351 . Holger Cleve and Andreas Zeller. 2005. Locating causes of program failures. In Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005.. 342\u2013351."},{"key":"e_1_3_2_1_10_1","unstructured":"Dekel Cohen and Amiram Yehudai. 2015. Localization of real world regression Bugs using single execution. arXiv preprint arXiv:1505.01286. \t\t\t\t\t  Dekel Cohen and Amiram Yehudai. 2015. Localization of real world regression Bugs using single execution. arXiv preprint arXiv:1505.01286."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321702"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-005-3861-2"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1569901.1570031"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397374"},{"key":"e_1_3_2_1_15_1","volume-title":"Graphcodebert: Pre-training code representations with data flow. arXiv preprint arXiv:2009.08366.","author":"Guo Daya","year":"2020","unstructured":"Daya Guo , Shuo Ren , Shuai Lu , Zhangyin Feng , Duyu Tang , Shujie Liu , Long Zhou , Nan Duan , Alexey Svyatkovskiy , and Shengyu Fu . 2020 . Graphcodebert: Pre-training code representations with data flow. arXiv preprint arXiv:2009.08366. Daya Guo, Shuo Ren, Shuai Lu, Zhangyin Feng, Duyu Tang, Shujie Liu, Long Zhou, Nan Duan, Alexey Svyatkovskiy, and Shengyu Fu. 2020. Graphcodebert: Pre-training code representations with data flow. arXiv preprint arXiv:2009.08366."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101948"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2019.00019"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.71"},{"key":"e_1_3_2_1_19_1","volume-title":"Jerffeson Teixeira De Souza, and Shin Yoo","author":"Harman Mark","year":"2010","unstructured":"Mark Harman , Phil McMinn , Jerffeson Teixeira De Souza, and Shin Yoo . 2010 . Search based software engineering: Techniques, taxonomy, tutorial. In Empirical software engineering and verification. Springer , 1\u201359. Mark Harman, Phil McMinn, Jerffeson Teixeira De Souza, and Shin Yoo. 2010. Search based software engineering: Techniques, taxonomy, tutorial. In Empirical software engineering and verification. Springer, 1\u201359."},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the 7th International Workshop on Automating Test Case Design, Selection, and Evaluation. 31\u201337","author":"Ren\u00e1ta","unstructured":"Ren\u00e1ta Hodov\u00e1n and \u00c1kos Kiss. 2016. Modernizing hierarchical delta debugging . In Proceedings of the 7th International Workshop on Automating Test Case Design, Selection, and Evaluation. 31\u201337 . Ren\u00e1ta Hodov\u00e1n and \u00c1kos Kiss. 2016. Modernizing hierarchical delta debugging. In Proceedings of the 7th International Workshop on Automating Test Case Design, Selection, and Evaluation. 31\u201337."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2017.26"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/257734.257766"},{"key":"e_1_3_2_1_23_1","volume-title":"Lingxiao Jiang, and David Lo.","author":"Jayasundara Vinoj","year":"2019","unstructured":"Vinoj Jayasundara , Nghi Duy Quoc Bui , Lingxiao Jiang, and David Lo. 2019 . TreeCaps: Tree- Structured Capsule Networks for Program Source Code Processing . arXiv preprint arXiv:1910.12306. Vinoj Jayasundara, Nghi Duy Quoc Bui, Lingxiao Jiang, and David Lo. 2019. TreeCaps: Tree-Structured Capsule Networks for Program Source Code Processing. arXiv preprint arXiv:1910.12306."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00069"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00069"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2628055"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.114503"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278186.3278189"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368130"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106288"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.76"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2454513"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Yunkai Liang Yun Lin Xuezhi Song Jun Sun Zhiyong Feng and Jin Song Dong. 2022. gDefect4DL: A Dataset of General Real-World Deep Learning Program Defects. \t\t\t\t\t  Yunkai Liang Yun Lin Xuezhi Song Jun Sun Zhiyong Feng and Jin Song Dong. 2022. gDefect4DL: A Dataset of General Real-World Deep Learning Program Defects.","DOI":"10.1109\/ICSE-Companion55297.2022.9793829"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3135932.3135941"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468619"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397358"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238163"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.43"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00026"},{"key":"e_1_3_2_1_40_1","volume-title":"Workshop on the evaluation of software defect detection tools. 5.","author":"Lu Shan","year":"2005","unstructured":"Shan Lu , Zhenmin Li , Feng Qin , Lin Tan , Pin Zhou , and Yuanyuan Zhou . 2005 . Bugbench: Benchmarks for evaluating bug detection tools . In Workshop on the evaluation of software defect detection tools. 5. Shan Lu, Zhenmin Li, Feng Qin, Lin Tan, Pin Zhou, and Yuanyuan Zhou. 2005. Bugbench: Benchmarks for evaluating bug detection tools. In Workshop on the evaluation of software defect detection tools. 5."},{"key":"e_1_3_2_1_41_1","volume-title":"International Conference on Tools and Algorithms for the Construction and Analysis of Systems. 442\u2013459","author":"Luckow Kasper","year":"2016","unstructured":"Kasper Luckow , Marko Dimja\u0161evi\u0107 , Dimitra Giannakopoulou , Falk Howar , Malte Isberner , Temesghen Kahsai , Zvonimir Rakamari\u0107 , and Vishwanath Raman . 2016 . JD art: a dynamic symbolic analysis framework . In International Conference on Tools and Algorithms for the Construction and Analysis of Systems. 442\u2013459 . Kasper Luckow, Marko Dimja\u0161evi\u0107, Dimitra Giannakopoulou, Falk Howar, Malte Isberner, Temesghen Kahsai, Zvonimir Rakamari\u0107, and Vishwanath Raman. 2016. JD art: a dynamic symbolic analysis framework. In International Conference on Tools and Algorithms for the Construction and Analysis of Systems. 442\u2013459."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2019.8667991"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.294"},{"key":"e_1_3_2_1_44_1","volume-title":"32nd European Conference on Object-Oriented Programming (ECOOP","author":"Mezzetti Gianluca","year":"2018","unstructured":"Gianluca Mezzetti , Anders M\u00f8ller , and Martin Toldam Torp . 2018 . Type regression testing to detect breaking changes in Node. js libraries . In 32nd European Conference on Object-Oriented Programming (ECOOP 2018). Gianluca Mezzetti, Anders M\u00f8ller, and Martin Toldam Torp. 2018. Type regression testing to detect breaking changes in Node. js libraries. In 32nd European Conference on Object-Oriented Programming (ECOOP 2018)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134307"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606623"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380334"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606711"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196398.3196473"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00052"},{"key":"e_1_3_2_1_51_1","first-page":"8917","article-title":"Improving neural program synthesis with inferred execution traces","volume":"31","author":"Shin Eui Chul","year":"2018","unstructured":"Eui Chul Shin , Illia Polosukhin , and Dawn Song . 2018 . Improving neural program synthesis with inferred execution traces . Advances in Neural Information Processing Systems , 31 (2018), 8917 \u2013 8926 . Eui Chul Shin, Illia Polosukhin, and Dawn Song. 2018. Improving neural program synthesis with inferred execution traces. Advances in Neural Information Processing Systems, 31 (2018), 8917\u20138926.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330203"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1083142.1083149"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.65"},{"key":"e_1_3_2_1_55_1","volume-title":"2017 IEEE\/ACM 39th International Conference on Software Engineering Companion (ICSE-C). 180\u2013182","author":"Tan Shin Hwei","year":"2017","unstructured":"Shin Hwei Tan , Jooyong Yi , Sergey Mechtaev , and Abhik Roychoudhury . 2017 . Codeflaws: a programming competition benchmark for evaluating automated program repair tools . In 2017 IEEE\/ACM 39th International Conference on Software Engineering Companion (ICSE-C). 180\u2013182 . Shin Hwei Tan, Jooyong Yi, Sergey Mechtaev, and Abhik Roychoudhury. 2017. Codeflaws: a programming competition benchmark for evaluating automated program repair tools. In 2017 IEEE\/ACM 39th International Conference on Software Engineering Companion (ICSE-C). 180\u2013182."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00048"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468625"},{"key":"e_1_3_2_1_58_1","article-title":"Explaining regressions via alignment slicing and mending","author":"Wang Haijun","year":"2019","unstructured":"Haijun Wang , Yun Lin , Zijiang Yang , Jun Sun , Yang Liu , Jin Song Dong , Qinghua Zheng , and Ting Liu . 2019 . Explaining regressions via alignment slicing and mending . IEEE Transactions on Software Engineering. Haijun Wang, Yun Lin, Zijiang Yang, Jun Sun, Yang Liu, Jin Song Dong, Qinghua Zheng, and Ting Liu. 2019. Explaining regressions via alignment slicing and mending. IEEE Transactions on Software Engineering.","journal-title":"IEEE Transactions on Software Engineering."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101919"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.46"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.132"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351681"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.10.016"},{"key":"e_1_3_2_1_64_1","volume-title":"my program worked. Today, it does not. Why? ACM SIGSOFT Software engineering notes, 24, 6","author":"Zeller Andreas","year":"1999","unstructured":"Andreas Zeller . 1999. Yesterday , my program worked. Today, it does not. Why? ACM SIGSOFT Software engineering notes, 24, 6 ( 1999 ), 253\u2013267. Andreas Zeller. 1999. Yesterday, my program worked. Today, it does not. Why? ACM SIGSOFT Software engineering notes, 24, 6 (1999), 253\u2013267."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/605466.605468"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393642"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2022.3168373"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22888-0_8"}],"event":{"name":"ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Virtual South Korea","acronym":"ISSTA '22","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3533767.3534224","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3533767.3534224","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T18:43:40Z","timestamp":1750272220000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3533767.3534224"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,18]]},"references-count":68,"alternative-id":["10.1145\/3533767.3534224","10.1145\/3533767"],"URL":"https:\/\/doi.org\/10.1145\/3533767.3534224","relation":{},"subject":[],"published":{"date-parts":[[2022,7,18]]},"assertion":[{"value":"2022-07-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}