{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T01:30:07Z","timestamp":1768872607848,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,11]],"date-time":"2022-06-11T00:00:00Z","timestamp":1654905600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,11]]},"DOI":"10.1145\/3545258.3545286","type":"proceedings-article","created":{"date-parts":[[2022,9,15]],"date-time":"2022-09-15T16:09:39Z","timestamp":1663258179000},"page":"107-116","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Enhanced Evolutionary Automated Program Repair by Finer-Granularity Ingredients and Better Search Algorithms"],"prefix":"10.1145","author":[{"given":"Bo","family":"Wang","sequence":"first","affiliation":[{"name":"Beijing Jiaotong University, China"}]},{"given":"Guizhuang","family":"Liu","sequence":"additional","affiliation":[{"name":"Beijing Jiaotong University, China"}]},{"given":"Youfang","family":"Lin","sequence":"additional","affiliation":[{"name":"Beijing Jiaotong University, China"}]},{"given":"Shuang","family":"Ren","sequence":"additional","affiliation":[{"name":"Beijing Jiaotong University, China"}]},{"given":"Honghui","family":"Li","sequence":"additional","affiliation":[{"name":"Beijing Jiaotong University, China"}]},{"given":"Dalin","family":"Zhang","sequence":"additional","affiliation":[{"name":"Beijing Jiaotong University, China"}]}],"member":"320","published-online":{"date-parts":[[2022,9,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2006.18"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635898"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/APR52552.2021.00008"},{"key":"e_1_3_2_1_4_1","volume-title":"Reversible debugging software. Judge Bus. School","author":"Britton Tom","year":"2013","unstructured":"Tom Britton , Lisa Jeng , Graham Carver , Paul Cheak , and Tomer Katzenellenbogen . 2013. Reversible debugging software. Judge Bus. School , Univ. Cambridge , Cambridge, UK , Tech. Rep ( 2013 ), 1. Tom Britton, Lisa Jeng, Graham Carver, Paul Cheak, and Tomer Katzenellenbogen. 2013. Reversible debugging software. Judge Bus. School, Univ. Cambridge, Cambridge, UK, Tech. Rep (2013), 1."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115674"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the 3rd annual conference on genetic and evolutionary computation. 283\u2013290","author":"Corne W","year":"2001","unstructured":"David\u00a0 W Corne , Nick\u00a0 R Jerram , Joshua\u00a0 D Knowles , and Martin\u00a0 J Oates . 2001 . PESA-II: Region-based selection in evolutionary multiobjective optimization . In Proceedings of the 3rd annual conference on genetic and evolutionary computation. 283\u2013290 . David\u00a0W Corne, Nick\u00a0R Jerram, Joshua\u00a0D Knowles, and Martin\u00a0J Oates. 2001. PESA-II: Region-based selection in evolutionary multiobjective optimization. In Proceedings of the 3rd annual conference on genetic and evolutionary computation. 283\u2013290."},{"key":"e_1_3_2_1_7_1","volume-title":"A fast and elitist multiobjective genetic algorithm: NSGA-II","author":"Deb Kalyanmoy","year":"2002","unstructured":"Kalyanmoy Deb , Amrit Pratap , Sameer Agarwal , and TAMT Meyarivan . 2002. A fast and elitist multiobjective genetic algorithm: NSGA-II . IEEE transactions on evolutionary computation 6, 2( 2002 ), 182\u2013197. Kalyanmoy Deb, Amrit Pratap, Sameer Agarwal, and TAMT Meyarivan. 2002. A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE transactions on evolutionary computation 6, 2(2002), 182\u2013197."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330558"},{"key":"e_1_3_2_1_9_1","first-page":"1","article-title":"Beyond Tests: Program Vulnerability Repair via Crash Constraint Extraction","volume":"30","author":"Gao Xiang","year":"2021","unstructured":"Xiang Gao , Bo Wang , Gregory\u00a0 J Duck , Ruyi Ji , Yingfei Xiong , and Abhik Roychoudhury . 2021 . Beyond Tests: Program Vulnerability Repair via Crash Constraint Extraction . ACM Transactions on Software Engineering and Methodology 30 , 2(2021), 1 \u2013 27 . Xiang Gao, Bo Wang, Gregory\u00a0J Duck, Ruyi Ji, Yingfei Xiong, and Abhik Roychoudhury. 2021. Beyond Tests: Program Vulnerability Repair via Crash Constraint Extraction. ACM Transactions on Software Engineering and Methodology 30, 2(2021), 1\u201327.","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2755013"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318162"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v31i1.10742"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213871"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2628055"},{"key":"e_1_3_2_1_15_1","volume-title":"Multi-objective optimization using evolutionary algorithms","author":"Justesen Peter\u00a0Dueholm","year":"2009","unstructured":"Peter\u00a0Dueholm Justesen . 2009. Multi-objective optimization using evolutionary algorithms . University of Aarhus , Department of Computer Science, Denmark 33 ( 2009 ). Peter\u00a0Dueholm Justesen. 2009. Multi-objective optimization using evolutionary algorithms. University of Aarhus, Department of Computer Science, Denmark 33 (2009)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606626"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.76"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227211"},{"key":"e_1_3_2_1_19_1","volume-title":"Genprog: A generic method for automatic software repair","author":"Le\u00a0Goues Claire","year":"2011","unstructured":"Claire Le\u00a0Goues , ThanhVu Nguyen , Stephanie Forrest , and Westley Weimer . 2011 . Genprog: A generic method for automatic software repair . IEEE transactions on software engineering 38, 1 (2011), 54\u201372. Claire Le\u00a0Goues, ThanhVu Nguyen, Stephanie Forrest, and Westley Weimer. 2011. Genprog: A generic method for automatic software repair. IEEE transactions on software engineering 38, 1 (2011), 54\u201372."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380345"},{"key":"e_1_3_2_1_21_1","volume-title":"Mining fix patterns for findbugs violations","author":"Liu Kui","year":"2018","unstructured":"Kui Liu , Dongsun Kim , Tegawend\u00e9\u00a0 F Bissyand\u00e9 , Shin Yoo , and Yves Le\u00a0Traon . 2018. Mining fix patterns for findbugs violations . IEEE Transactions on Software Engineering( 2018 ). Kui Liu, Dongsun Kim, Tegawend\u00e9\u00a0F Bissyand\u00e9, Shin Yoo, and Yves Le\u00a0Traon. 2018. Mining fix patterns for findbugs violations. IEEE Transactions on Software Engineering(2018)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330577"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380338"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106253"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884872"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397369"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-016-9470-4"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2948705"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591114"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.63"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884807"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3105906"},{"key":"e_1_3_2_1_33_1","volume-title":"Quality of automated program repair on real-world defects","author":"Motwani Manish","year":"2020","unstructured":"Manish Motwani , Mauricio Soto , Yuriy Brun , Rene Just , and Claire Le\u00a0Goues . 2020. Quality of automated program repair on real-world defects . IEEE Transactions on Software Engineering( 2020 ). Manish Motwani, Mauricio Soto, Yuriy Brun, Rene Just, and Claire Le\u00a0Goues. 2020. Quality of automated program repair on real-world defects. IEEE Transactions on Software Engineering(2020)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606623"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568254"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771791"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115675"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00020"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950295"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693094"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070536"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180233"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115676"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3487570"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3194810.3194816"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.45"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2560811"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2874648"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3360004"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468544"},{"key":"e_1_3_2_1_51_1","unstructured":"Eckart Zitzler Marco Laumanns and Lothar Thiele. 2001. SPEA2: Improving the strength Pareto evolutionary algorithm. TIK-report 103(2001).  Eckart Zitzler Marco Laumanns and Lothar Thiele. 2001. SPEA2: Improving the strength Pareto evolutionary algorithm. TIK-report 103(2001)."}],"event":{"name":"Internetware 2022: 13th Asia-Pacific Symposium on Internetware","location":"Hohhot China","acronym":"Internetware 2022"},"container-title":["Proceedings of the 13th Asia-Pacific Symposium on Internetware"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545258.3545286","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3545258.3545286","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:45Z","timestamp":1750186965000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545258.3545286"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,11]]},"references-count":51,"alternative-id":["10.1145\/3545258.3545286","10.1145\/3545258"],"URL":"https:\/\/doi.org\/10.1145\/3545258.3545286","relation":{},"subject":[],"published":{"date-parts":[[2022,6,11]]},"assertion":[{"value":"2022-09-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}