{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T06:55:03Z","timestamp":1768028103742,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":61,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,27]],"date-time":"2024-10-27T00:00:00Z","timestamp":1729987200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key R&D Program of China","award":["2022YFB4501903"],"award-info":[{"award-number":["2022YFB4501903"]}]},{"name":"NSFC","award":["62172429"],"award-info":[{"award-number":["62172429"]}]},{"name":"NSFC","award":["62032024"],"award-info":[{"award-number":["62032024"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,27]]},"DOI":"10.1145\/3691620.3695525","type":"proceedings-article","created":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T15:39:19Z","timestamp":1729265959000},"page":"1557-1569","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Hybrid Regression Test Selection by Integrating File and Method Dependences"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-2359-9687","authenticated-orcid":false,"given":"Guofeng","family":"Zhang","sequence":"first","affiliation":[{"name":"College of Computer, National University of Defense Technology, Changsha, Hunan, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-7845-590X","authenticated-orcid":false,"given":"Luyao","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Computer, National University of Defense Technology, Changsha, Hunan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4066-7892","authenticated-orcid":false,"given":"Zhenbang","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Computer, National University of Defense Technology, Changsha, Hunan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0637-8744","authenticated-orcid":false,"given":"Ji","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Computer, National University of Defense Technology, Changsha, Hunan, China"}]}],"member":"320","published-online":{"date-parts":[[2024,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/J.ENTCS.2005.12.014"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2372785"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.69"},{"key":"e_1_3_2_1_4_1","volume-title":"DeFlaker: Automatically Detecting Flaky Tests. 2018 IEEE\/ACM 40th International Conference on Software Engineering (ICSE)","author":"Bell Jonathan","year":"2018","unstructured":"Jonathan Bell, Owolabi Legunsen, Michael C Hilton, Lamyaa Eloussi, Tifany Yung, and Darko Marinov. 2018. DeFlaker: Automatically Detecting Flaky Tests. 2018 IEEE\/ACM 40th International Conference on Software Engineering (ICSE) (2018), 433--444."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/367008.367015"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/367008.367015"},{"key":"e_1_3_2_1_7_1","first-page":"289","article-title":"Regression Test Selection Techniques: A Survey","volume":"35","author":"Biswas Swarnendu","year":"2011","unstructured":"Swarnendu Biswas, Rajib Mall, Manoranjan Satpathy, and Srihari Sukumaran. 2011. Regression Test Selection Techniques: A Survey. Informatica (Slovenia) 35 (2011), 289--321.","journal-title":"Informatica (Slovenia)"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-016-9328-4"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985827"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of 16th International Conference on Software Engineering","author":"Robin Chen Yih-Farn","year":"1994","unstructured":"Yih-Farn Robin Chen, David S. Rosenblum, and Kiem-Phong Vo. 1994. TESTTUBE: a system for selective regression testing. Proceedings of 16th International Conference on Software Engineering (1994), 211--220."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332496"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635910"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2009.07.001"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1414004.1414011"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889222"},{"key":"e_1_3_2_1_16_1","volume-title":"Ekstazi: Lightweight Test Selection. In 37th IEEE\/ACM International Conference on Software Engineering, ICSE 2015","volume":"2","author":"Gligoric Milos","year":"2015","unstructured":"Milos Gligoric, Lamyaa Eloussi, and Darko Marinov. 2015. Ekstazi: Lightweight Test Selection. In 37th IEEE\/ACM International Conference on Software Engineering, ICSE 2015, Florence, Italy, May 16--24, 2015, Volume 2, Antonia Bertolino, Gerardo Canfora, and Sebastian G. Elbaum (Eds.). IEEE Computer Society, 713--716."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771784"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/367008.367020"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.4230\/LIPICS.ECOOP.2018"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2018.00022"},{"key":"e_1_3_2_1_21_1","volume-title":"2018 IEEE 18th International Working Conference on Source Code Analysis and Manipulation (SCAM)","author":"Harman Mark","year":"2018","unstructured":"Mark Harman and Peter W. O'Hearn. 2018. From Start-ups to Scale-ups: Opportunities and Open Problems for Static and Dynamic Program Analysis. 2018 IEEE 18th International Working Conference on Source Code Analysis and Manipulation (SCAM) (2018), 1--23."},{"key":"e_1_3_2_1_22_1","volume-title":"Conference on Object-Oriented Programming Systems, Languages, and Applications.","author":"Harrold Mary Jean","unstructured":"Mary Jean Harrold, James A. Jones, Tong Li, Donglin Liang, Alessandro Orso, Maikel Pennings, Saurabh Sinha, Steven Alexander Spoon, and Ashish M. Gujarathi. 2001. Regression test selection for Java software. In Conference on Object-Oriented Programming Systems, Languages, and Applications."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/RCoSE.2015.11"},{"key":"e_1_3_2_1_24_1","first-page":"51","article-title":"Class Firewall, Test Order, and Regression Testing of Object-Oriented Programs","volume":"8","author":"Kung David Chenho","year":"1995","unstructured":"David Chenho Kung, Jerry Zeyu Gao, Pei Hsia, Jeremy Lin, and Yasufumi Toyoshima. 1995. Class Firewall, Test Order, and Regression Testing of Object-Oriented Programs. J. Object Oriented Program. 8 (1995), 51--65.","journal-title":"J. Object Oriented Program."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950361"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115710"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings. Conference on Software Maintenance - 1989","author":"Hareton K.","year":"1989","unstructured":"Hareton K. N. Leung and Lee J. White. 1989. Insights into regression testing (software testing). Proceedings. Conference on Software Maintenance - 1989 (1989), 60--69."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931044"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970277"},{"key":"e_1_3_2_1_30_1","volume-title":"Method-Level Test Selection for Continuous Integration with Static Dependencies and Dynamic Execution Rules. 2019 IEEE 19th International Conference on Software Quality, Reliability and Security (QRS)","author":"Li Yingling","year":"2019","unstructured":"Yingling Li, Junjie Wang, Yun Yang, and Qing Wang. 2019. Method-Level Test Selection for Continuous Integration with Static Dependencies and Dynamic Execution Rules. 2019 IEEE 19th International Conference on Software Quality, Reliability and Security (QRS) (2019), 350--361."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110614"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598086"},{"key":"e_1_3_2_1_33_1","volume-title":"Predictive Test Selection. 2019 IEEE\/ACM 41st International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP)","author":"Machalica Mateusz","year":"2018","unstructured":"Mateusz Machalica, Alex Samylkin, Meredith Porth, and Satish Chandra. 2018. Predictive Test Selection. 2019 IEEE\/ACM 41st International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP) (2018), 91--100."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3473916"},{"key":"e_1_3_2_1_35_1","volume-title":"Taming Google-Scale Continuous Testing. 2017 IEEE\/ACM 39th International Conference on Software Engineering: Software Engineering in Practice Track (ICSE-SEIP)","author":"Memon Atif M.","year":"2017","unstructured":"Atif M. Memon, Zebao Gao, Bao-Ngoc Nguyen, Sanjeev Dhanda, Eric Nickell, Rob Siemborski, and John Micco. 2017. Taming Google-Scale Continuous Testing. 2017 IEEE\/ACM 39th International Conference on Software Engineering: Software Engineering in Practice Track (ICSE-SEIP) (2017), 233--242."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029894.1029928"},{"key":"e_1_3_2_1_37_1","volume-title":"Considering Polymorphism in Change-Based Test Suite Reduction. In XP Workshops.","author":"Parsai Ali","year":"2014","unstructured":"Ali Parsai, Quinten David Soetens, Alessandro Murgia, and Serge Demeyer. 2014. Considering Polymorphism in Change-Based Test Suite Reduction. In XP Workshops."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028976.1029012"},{"key":"e_1_3_2_1_39_1","volume-title":"d.]. Empirical Studies of a Safe Regression Test Selection Technique","author":"Rothermel Gregg","unstructured":"Gregg Rothermel and Mary Jean Harrold. [n. d.]. Empirical Studies of a Safe Regression Test Selection Technique. IEEE Trans. Software Eng. 24 ([n. d.])."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1993.366926"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.536955"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/248233.248262"},{"key":"e_1_3_2_1_43_1","volume-title":"Proceedings IEEE International Conference on Software Maintenance - 1999","author":"Rothermel Gregg","year":"1999","unstructured":"Gregg Rothermel, Roland H. Untch, Chengyun Chu, and Mary Jean Harrold. 1999. Test case prioritization: an empirical study. Proceedings IEEE International Conference on Software Maintenance - 1999. (1999), 179--188."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3360613"},{"key":"e_1_3_2_1_45_1","volume-title":"Optimizing Test Placement for Module-Level Regression Testing. 2017 IEEE\/ACM 39th International Conference on Software Engineering (ICSE)","author":"Shi August","year":"2017","unstructured":"August Shi, Suresh Thummalapenta, Shuvendu K. Lahiri, Nikolaj S. Bj\u00f8rner, and Jacek Czerwonka. 2017. Optimizing Test Placement for Module-Level Regression Testing. 2017 IEEE\/ACM 39th International Conference on Software Engineering (ICSE) (2017), 689--699."},{"key":"e_1_3_2_1_46_1","volume-title":"Understanding and Improving Regression Test Selection in Continuous Integration. 2019 IEEE 30th International Symposium on Software Reliability Engineering (ISSRE)","author":"Shi August","year":"2019","unstructured":"August Shi, Peiyuan Zhao, and Darko Marinov. 2019. Understanding and Improving Regression Test Selection in Continuous Integration. 2019 IEEE 30th International Symposium on Software Reliability Engineering (ISSRE) (2019), 228--238."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2021.111174"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISESE.2005.1541816"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26529-2_26"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9405-5"},{"key":"e_1_3_2_1_51_1","unstructured":"JaCoCo Team. [n. d.]. Java Code Coverage Library."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3117763"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2005.15"},{"key":"e_1_3_2_1_54_1","volume-title":"21st IEEE International Conference on Software Maintenance","author":"Willmor David","year":"2005","unstructured":"David Willmor and Suzanne M. Embury. 2005. A safe regression test selection technique for database-driven applications. 21st IEEE International Conference on Software Maintenance (2005), 421--430."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1002\/stv.430"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3524481.3527230"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180198"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2011.6080769"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115619"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00056"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106297"}],"event":{"name":"ASE '24: 39th IEEE\/ACM International Conference on Automated Software Engineering","location":"Sacramento CA USA","acronym":"ASE '24","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 39th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3691620.3695525","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3691620.3695525","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:09:39Z","timestamp":1750295379000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3691620.3695525"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,27]]},"references-count":61,"alternative-id":["10.1145\/3691620.3695525","10.1145\/3691620"],"URL":"https:\/\/doi.org\/10.1145\/3691620.3695525","relation":{},"subject":[],"published":{"date-parts":[[2024,10,27]]},"assertion":[{"value":"2024-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}