{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T06:23:47Z","timestamp":1775543027673,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":76,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T00:00:00Z","timestamp":1726012800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Natural Science Foundation of China (NSFC)","award":["62102315, 62372373"],"award-info":[{"award-number":["62102315, 62372373"]}]},{"name":"the China Postdoc- toral Science Foundation Fellowship","award":["2022M712575"],"award-info":[{"award-number":["2022M712575"]}]},{"name":"the Shaanxi International Science and Technology Cooperation Program","award":["2023- GHZD-04"],"award-info":[{"award-number":["2023- GHZD-04"]}]},{"name":"the Shaanxi Province ?Engineers + Scientists? Team Building Program","award":["2023KXJ-055"],"award-info":[{"award-number":["2023KXJ-055"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,11]]},"DOI":"10.1145\/3650212.3652120","type":"proceedings-article","created":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T11:44:25Z","timestamp":1726055065000},"page":"186-198","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["UPBEAT: Test Input Checks of Q# Quantum Libraries"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-0647-9103","authenticated-orcid":false,"given":"Tianmin","family":"Hu","sequence":"first","affiliation":[{"name":"Northwest University, Xi'an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2074-4253","authenticated-orcid":false,"given":"Guixin","family":"Ye","sequence":"additional","affiliation":[{"name":"Northwest University, Xi'an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4333-2334","authenticated-orcid":false,"given":"Zhanyong","family":"Tang","sequence":"additional","affiliation":[{"name":"Northwest University, Xi'an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8633-3372","authenticated-orcid":false,"given":"Shin Hwei","family":"Tan","sequence":"additional","affiliation":[{"name":"Concordia University, Montreal, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0579-4295","authenticated-orcid":false,"given":"Huanting","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Leeds, Leeds, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3553-0813","authenticated-orcid":false,"given":"Meng","family":"Li","sequence":"additional","affiliation":[{"name":"Hefei University of Technology, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6157-0662","authenticated-orcid":false,"given":"Zheng","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Leeds, Leeds, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2024,9,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.13625004"},{"key":"e_1_3_2_1_2_1","volume-title":"An issue found in Qiskit. https:\/\/github.com\/Qiskit\/qiskit-terra\/issues\/8036 Accessed","year":"2023","unstructured":"[n.d.]. An issue found in Qiskit. https:\/\/github.com\/Qiskit\/qiskit-terra\/issues\/8036 Accessed: December, 2023."},{"key":"e_1_3_2_1_3_1","volume-title":"A Python library for symbolic mathematics. https:\/\/docs.sympy.org\/latest\/index.html Accessed","year":"2023","unstructured":"[n.d.]. A Python library for symbolic mathematics. https:\/\/docs.sympy.org\/latest\/index.html Accessed: December, 2023."},{"key":"e_1_3_2_1_4_1","volume-title":"Qiskit: An open-source framework for quantum computing. 16","author":"Aleksandrowicz Gadi","year":"2019","unstructured":"Gadi Aleksandrowicz, Thomas Alexander, Panagiotis Barkoutsos, Luciano Bello, Yael Ben-Haim, David Bucher, F Jose Cabrera-Hern\u00e1ndez, Jorge Carballo-Franquis, Adrian Chen, and Chun-Fu Chen. 2019. Qiskit: An open-source framework for quantum computing. 16 (2019)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST49551.2021.00014"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion58688.2023.00093"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23412"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3340456"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2372785"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213872"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.116.250501"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/Q-SE52541.2021.00013"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1792734.1792766"},{"key":"e_1_3_2_1_14_1","volume-title":"Lectures on quantum mechanics. 2","author":"Maurice Dirac Paul Adrien","unstructured":"Paul Adrien Maurice Dirac. 2001. Lectures on quantum mechanics. 2, Courier Corporation."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1055218.1055219"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510454.3528649"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.2419"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375607"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2019.00016"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23263"},{"key":"e_1_3_2_1_21_1","first-page":"95","volume-title":"Fuzzing with Code Fragments. In 21st USENIX Security Symposium (USENIX Security 12)","author":"Holler Christian","year":"2012","unstructured":"Christian Holler, Kim Herzig, and Andreas Zeller. 2012. Fuzzing with Code Fragments. In 21st USENIX Security Symposium (USENIX Security 12). USENIX Association, 445\u2013458. isbn:978-931971-95-9"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387940.3391459"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","unstructured":"Johnny Hooyberghs. 2022. Q# Language Overview and the Quantum Simulator. Apress 121\u2013167. isbn:978-1-4842-7246-6 https:\/\/doi.org\/10.1007\/978-1-4842-7246-6_6 10.1007\/978-1-4842-7246-6_6","DOI":"10.1007\/978-1-4842-7246-6_6"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.4230\/OASICS.PLATEAU.2018.4"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307650.3322213"},{"key":"e_1_3_2_1_26_1","volume-title":"FuzzGen: Automatic Fuzzer Generation. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Ispoglou Kyriakos","year":"2020","unstructured":"Kyriakos Ispoglou, Daniel Austin, Vishwath Mohan, and Mathias Payer. 2020. FuzzGen: Automatic Fuzzer Generation. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 2271\u20132287. isbn:978-1-939133-17-5"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491248"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678813"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24334"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2017.7927034"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1609\/aimag.v13i1.976"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3550488"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428218"},{"key":"e_1_3_2_1_34_1","unstructured":"Peixun Long and Jianjun Zhao. 2023. Testing Quantum Programs with Multiple Subroutines. arxiv:cs.SE\/2208.09206."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER53432.2022.00147"},{"key":"e_1_3_2_1_36_1","volume-title":"Quantum Computing Environments","author":"Maronese Marco","unstructured":"Marco Maronese, Lorenzo Moro, Lorenzo Rocutto, and Enrico Prati. 2022. Quantum compiling. In Quantum Computing Environments. Springer, 39\u201374."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2018.2884353"},{"key":"e_1_3_2_1_38_1","first-page":"100","article-title":"Differential Testing for Software","volume":"10","author":"Mckeeman W. M.","year":"1998","unstructured":"W. M. Mckeeman. 1998. Differential Testing for Software. Digital Technical Journal, 10, 1 (1998), 100\u2013107.","journal-title":"Digital Technical Journal"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678563"},{"key":"e_1_3_2_1_40_1","volume-title":"dotnet-coverage. https:\/\/learn.microsoft.com\/en-us\/dotnet\/core\/additional-tools\/dotnet-coverage Accessed","year":"2023","unstructured":"Microsoft. [n.d.]. dotnet-coverage. https:\/\/learn.microsoft.com\/en-us\/dotnet\/core\/additional-tools\/dotnet-coverage Accessed: December, 2023."},{"key":"e_1_3_2_1_41_1","volume-title":"Introduction page of QuantumSimulator. https:\/\/learn.microsoft.com\/en-us\/azure\/quantum\/machines\/full-state-simulator Accessed","year":"2023","unstructured":"Microsoft. [n.d.]. Introduction page of QuantumSimulator. https:\/\/learn.microsoft.com\/en-us\/azure\/quantum\/machines\/full-state-simulator Accessed: December, 2023."},{"key":"e_1_3_2_1_42_1","volume-title":"Introduction page of ToffoliSimulator. https:\/\/learn.microsoft.com\/en-us\/azure\/quantum\/machines\/toffoli-simulator Accessed","year":"2023","unstructured":"Microsoft. [n.d.]. Introduction page of ToffoliSimulator. https:\/\/learn.microsoft.com\/en-us\/azure\/quantum\/machines\/toffoli-simulator Accessed: December, 2023."},{"key":"e_1_3_2_1_43_1","volume-title":"https:\/\/learn.microsoft.com\/en-us\/qsharp\/api\/?view=qsharp-preview Accessed","author":"API","year":"2023","unstructured":"Microsoft. [n.d.]. Q# API reference. https:\/\/learn.microsoft.com\/en-us\/qsharp\/api\/?view=qsharp-preview Accessed: December, 2023."},{"key":"e_1_3_2_1_44_1","volume-title":"The Q# quantum programming language user guide. https:\/\/learn.microsoft.com\/en-us\/azure\/quantum\/user-guide\/?view=qsharp-preview Accessed","year":"2023","unstructured":"Microsoft. [n.d.]. The Q# quantum programming language user guide. https:\/\/learn.microsoft.com\/en-us\/azure\/quantum\/user-guide\/?view=qsharp-preview Accessed: December, 2023."},{"key":"e_1_3_2_1_45_1","volume-title":"The qsharp repository. https:\/\/github.com\/microsoft\/qsharp Accessed","year":"2024","unstructured":"Microsoft. [n.d.]. The qsharp repository. https:\/\/github.com\/microsoft\/qsharp Accessed: March, 2024."},{"key":"e_1_3_2_1_46_1","volume-title":"The qsharp-runtime repository. https:\/\/github.com\/microsoft\/qsharp-runtime Accessed","year":"2023","unstructured":"Microsoft. [n.d.]. The qsharp-runtime repository. https:\/\/github.com\/microsoft\/qsharp-runtime Accessed: December, 2023."},{"key":"e_1_3_2_1_47_1","volume-title":"The QuantumLibraries repository. https:\/\/github.com\/microsoft\/QuantumLibraries Accessed","year":"2023","unstructured":"Microsoft. [n.d.]. The QuantumLibraries repository. https:\/\/github.com\/microsoft\/QuantumLibraries Accessed: December, 2023."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/icse-nier.2019.00023"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"crossref","unstructured":"Asmar Muqeet Tao Yue Shaukat Ali and Paolo Arcaini. 2024. Mitigating Noise in Quantum Software Testing Using Machine Learning. arxiv:cs.SE\/2306.16992.","DOI":"10.1109\/TSE.2024.3462974"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.5555\/1972505"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330576"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3527330"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/icse48619.2023.00202"},{"key":"e_1_3_2_1_55_1","volume-title":"Proceedings of the 32nd USENIX Conference on Security Symposium (SEC\u201923)","author":"Peng Hui","year":"2023","unstructured":"Hui Peng, Zhihao Yao, Ardalan Amiri Sani, Dave (Jing) Tian, and Mathias Payer. 2023. GLeeFuzz: fuzzing WebGL through error message guided mutation. In Proceedings of the 32nd USENIX Conference on Security Symposium (SEC\u201923). USENIX Association, Article 106, 17 pages. isbn:978-1-939133-37-3"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3528230.3528395"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598088"},{"key":"e_1_3_2_1_58_1","volume-title":"On the estimation of the discrepancy between empirical curves of distribution for two independent samples. 2, 2","author":"Smirnoff N. W.","year":"1939","unstructured":"N. W. Smirnoff. 1939. On the estimation of the discrepancy between empirical curves of distribution for two independent samples. 2, 2 (1939), 3\u201314."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183895.3183901"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW55395.2022.00033"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.23"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST49551.2021.00061"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678792"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/QRS54544.2021.00029"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3520304.3534067"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.78"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1088\/2058-9565"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488512"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534220"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993532"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3453483.3454054"},{"key":"e_1_3_2_1_72_1","volume-title":"APICraft: Fuzz Driver Generation for Closed-source SDK Libraries. In 30th USENIX Security Symposium (USENIX Security 21)","author":"Zhang Cen","year":"2021","unstructured":"Cen Zhang, Xingwei Lin, Yuekang Li, Yinxing Xue, Jundong Xie, Hongxu Chen, Xinlei Ying, Jiashui Wang, and Yang Liu. 2021. APICraft: Fuzz Driver Generation for Closed-source SDK Libraries. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 2811\u20132828. isbn:978-1-939133-24-3"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/Q-SE52541.2021.00011"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678908"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510059"},{"key":"e_1_3_2_1_76_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Zong Peiyuan","year":"2020","unstructured":"Peiyuan Zong, Tao Lv, Dawei Wang, Zizhuang Deng, Ruigang Liang, and Kai Chen. 2020. FuzzGuard: Filtering out Unreachable Inputs in Directed Grey-box Fuzzing through Deep Learning. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 2255\u20132269. isbn:978-1-939133-17-5 https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/zong"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2018.2834427"}],"event":{"name":"ISSTA '24: 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Vienna Austria","acronym":"ISSTA '24","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","AITO"]},"container-title":["Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3650212.3652120","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3650212.3652120","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:50:06Z","timestamp":1750287006000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3650212.3652120"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,11]]},"references-count":76,"alternative-id":["10.1145\/3650212.3652120","10.1145\/3650212"],"URL":"https:\/\/doi.org\/10.1145\/3650212.3652120","relation":{},"subject":[],"published":{"date-parts":[[2024,9,11]]},"assertion":[{"value":"2024-09-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}