{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T22:38:42Z","timestamp":1778279922405,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,12]],"date-time":"2023-07-12T00:00:00Z","timestamp":1689120000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62161146003"],"award-info":[{"award-number":["62161146003"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100018537","name":"National Science and Technology Major Project","doi-asserted-by":"publisher","award":["2020AAA0109401"],"award-info":[{"award-number":["2020AAA0109401"]}],"id":[{"id":"10.13039\/501100018537","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,12]]},"DOI":"10.1145\/3597926.3598046","type":"proceedings-article","created":{"date-parts":[[2023,7,13]],"date-time":"2023-07-13T20:12:53Z","timestamp":1689279173000},"page":"163-174","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["GDsmith: Detecting Bugs in Cypher Graph Database Engines"],"prefix":"10.1145","author":[{"given":"Ziyue","family":"Hua","sequence":"first","affiliation":[{"name":"Peking University, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wei","family":"Lin","sequence":"additional","affiliation":[{"name":"Peking University, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Luyao","family":"Ren","sequence":"additional","affiliation":[{"name":"Peking University, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zongyang","family":"Li","sequence":"additional","affiliation":[{"name":"Peking University, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Peking University, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wenpin","family":"Jiao","sequence":"additional","affiliation":[{"name":"Peking University, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tao","family":"Xie","sequence":"additional","affiliation":[{"name":"Peking University, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2023,7,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2017.59"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884878"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/320434.320440"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395032.3395322"},{"key":"e_1_3_2_1_6_1","unstructured":"The Apache Software Foundation. 2022. Cypher for Gremlin. https:\/\/github.com\/opencypher\/cypher-for-gremlin\/tree\/master\/tinkerpop\/cypher-gremlin-server-client \t\t\t\t  The Apache Software Foundation. 2022. Cypher for Gremlin. https:\/\/github.com\/opencypher\/cypher-for-gremlin\/tree\/master\/tinkerpop\/cypher-gremlin-server-client"},{"key":"e_1_3_2_1_7_1","unstructured":"The Apache Software Foundation. 2022. Gremlin Query Language. https:\/\/tinkerpop.apache.org\/gremlin.html \t\t\t\t  The Apache Software Foundation. 2022. Gremlin Query Language. https:\/\/tinkerpop.apache.org\/gremlin.html"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Nadime Francis Alastair Green Paolo Guagliardo Leonid Libkin Tobias Lindaaker Victor Marsault Stefan Plantikow Mats Rydberg Martin Schuster Petra Selmer and Andr\u00e9s Taylor. 2018. Formal Semantics of the Language Cypher. arXiv preprint arXiv:1802.09984 arxiv:1802.09984 \t\t\t\t  Nadime Francis Alastair Green Paolo Guagliardo Leonid Libkin Tobias Lindaaker Victor Marsault Stefan Plantikow Mats Rydberg Martin Schuster Petra Selmer and Andr\u00e9s Taylor. 2018. Formal Semantics of the Language Cypher. arXiv preprint arXiv:1802.09984 arxiv:1802.09984","DOI":"10.1145\/3183713.3190657"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3190657"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395032.3395327"},{"key":"e_1_3_2_1_11_1","unstructured":"Lior Kogan. 2017. V1: A Visual Query Language for Property Graphs. arXiv preprint arXiv:1710.04470 arxiv:1710.04470 \t\t\t\t  Lior Kogan. 2017. V1: A Visual Query Language for Property Graphs. arXiv preprint arXiv:1710.04470 arxiv:1710.04470"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC.2017.8397433"},{"key":"e_1_3_2_1_13_1","unstructured":"William M. McKeeman. 1998. Differential Testing for Software. Digital Technical Journal 100\u2013107. http:\/\/www.hpl.hp.com\/hpjournal\/dtj\/vol10num1\/vol10num1art9.pdf \t\t\t\t  William M. McKeeman. 1998. Differential Testing for Software. Digital Technical Journal 100\u2013107. http:\/\/www.hpl.hp.com\/hpjournal\/dtj\/vol10num1\/vol10num1art9.pdf"},{"key":"e_1_3_2_1_14_1","volume-title":"Memgraph: Frictionless, Innovative, Graph Applications. https:\/\/memgraph.com\/","year":"2022","unstructured":"Memgraph. 2022 . Memgraph: Frictionless, Innovative, Graph Applications. https:\/\/memgraph.com\/ Memgraph. 2022. Memgraph: Frictionless, Innovative, Graph Applications. https:\/\/memgraph.com\/"},{"key":"e_1_3_2_1_15_1","unstructured":"Neo4j. 2022. The Fastest Path To Graph Productivity: Neo4j Graph Database. https:\/\/neo4j.com\/product\/neo4j-graph-database\/ \t\t\t\t  Neo4j. 2022. The Fastest Path To Graph Productivity: Neo4j Graph Database. https:\/\/neo4j.com\/product\/neo4j-graph-database\/"},{"key":"e_1_3_2_1_16_1","unstructured":"The openCypher Implementers Group. 2022. Cypher Query Language Reference Version 9. https:\/\/s3.amazonaws.com\/artifacts.opencypher.org\/openCypher9.pdf \t\t\t\t  The openCypher Implementers Group. 2022. Cypher Query Language Reference Version 9. https:\/\/s3.amazonaws.com\/artifacts.opencypher.org\/openCypher9.pdf"},{"key":"e_1_3_2_1_17_1","unstructured":"RedisGraph. 2022. RedisGraph - a Graph Database Module for Redis. https:\/\/oss.redis.com\/redisgraph\/ \t\t\t\t  RedisGraph. 2022. RedisGraph - a Graph Database Module for Redis. https:\/\/oss.redis.com\/redisgraph\/"},{"key":"e_1_3_2_1_18_1","unstructured":"Manuel Rigger. 2022. SQLancer: Detecting Logic Bugs in DBMS. https:\/\/github.com\/sqlancer\/sqlancer \t\t\t\t  Manuel Rigger. 2022. SQLancer: Detecting Logic Bugs in DBMS. https:\/\/github.com\/sqlancer\/sqlancer"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409710"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428279"},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation. 667\u2013682","author":"Rigger Manuel","year":"2020","unstructured":"Manuel Rigger and Zhendong Su . 2020 . Testing Database Engines via Pivoted Query Synthesis . In Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation. 667\u2013682 . https:\/\/www.usenix.org\/conference\/osdi20\/presentation\/rigger Manuel Rigger and Zhendong Su. 2020. Testing Database Engines via Pivoted Query Synthesis. In Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation. 667\u2013682. https:\/\/www.usenix.org\/conference\/osdi20\/presentation\/rigger"},{"key":"e_1_3_2_1_22_1","unstructured":"Andreas Seltenreich. 2022. Bug Squashing with SQLsmith. https:\/\/github.com\/anse1\/sqlsmith \t\t\t\t  Andreas Seltenreich. 2022. Bug Squashing with SQLsmith. https:\/\/github.com\/anse1\/sqlsmith"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-021-00460-8"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/645924.671199"},{"key":"e_1_3_2_1_25_1","unstructured":"solid IT gmbh. 2022. DB-Engines Ranking of Graph DBMS. https:\/\/db-engines.com\/en\/ranking\/graph+dbms \t\t\t\t  solid IT gmbh. 2022. DB-Engines Ranking of Graph DBMS. https:\/\/db-engines.com\/en\/ranking\/graph+dbms"},{"key":"e_1_3_2_1_26_1","volume-title":"2020 American Medical Informatics Association Annual Symposium. 1258\u20131267","author":"Wang Jian","year":"2020","unstructured":"Jian Wang , Ke Wang , Jing Li , Jianmin Jiang , Yanfei Wang , Jing Mei , and Shaochun Li . 2020 . Accelerating Epidemiological Investigation Analysis by Using NLP and Knowledge Reasoning: A Case Study on COVID-19 . In 2020 American Medical Informatics Association Annual Symposium. 1258\u20131267 . https:\/\/knowledge.amia.org\/72332-amia-1.4602255\/t003-1.4606204\/t003-1.4606205\/3417206-1.4606266\/3415131-1.4606263 Jian Wang, Ke Wang, Jing Li, Jianmin Jiang, Yanfei Wang, Jing Mei, and Shaochun Li. 2020. Accelerating Epidemiological Investigation Analysis by Using NLP and Knowledge Reasoning: A Case Study on COVID-19. In 2020 American Medical Informatics Association Annual Symposium. 1258\u20131267. https:\/\/knowledge.amia.org\/72332-amia-1.4602255\/t003-1.4606204\/t003-1.4606205\/3417206-1.4606266\/3415131-1.4606263"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP52600.2021.00042"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Ran Wang Zhengyi Yang Wenjie Zhang and Xuemin Lin. 2020. An Empirical Study on Recent Graph Database Systems. In Knowledge Science Engineering and Management. 328\u2013340. \t\t\t\t  Ran Wang Zhengyi Yang Wenjie Zhang and Xuemin Lin. 2020. An Empirical Study on Recent Graph Database Systems. In Knowledge Science Engineering and Management. 328\u2013340.","DOI":"10.1007\/978-3-030-55130-8_29"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion58688.2023.00041"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993532"},{"key":"e_1_3_2_1_31_1","unstructured":"Michal Zalewski. 2022. American Fuzzy Lop (2.52b). https:\/\/lcamtuf.coredump.cx\/afl\/ \t\t\t\t  Michal Zalewski. 2022. American Fuzzy Lop (2.52b). https:\/\/lcamtuf.coredump.cx\/afl\/"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534409"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417260"}],"event":{"name":"ISSTA '23: 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Seattle WA USA","acronym":"ISSTA '23","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","AITO"]},"container-title":["Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597926.3598046","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3597926.3598046","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:41Z","timestamp":1750182521000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597926.3598046"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,12]]},"references-count":32,"alternative-id":["10.1145\/3597926.3598046","10.1145\/3597926"],"URL":"https:\/\/doi.org\/10.1145\/3597926.3598046","relation":{},"subject":[],"published":{"date-parts":[[2023,7,12]]},"assertion":[{"value":"2023-07-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}