{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T19:03:34Z","timestamp":1771009414156,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,27]],"date-time":"2024-10-27T00:00:00Z","timestamp":1729987200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Chongqing Technology Innovation and Application Development Special Project","award":["CSTB2023TIAD-STX0029"],"award-info":[{"award-number":["CSTB2023TIAD-STX0029"]}]},{"name":"Major Key Project of PCL","award":["PCL2021A06"],"award-info":[{"award-number":["PCL2021A06"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272072"],"award-info":[{"award-number":["62272072"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,27]]},"DOI":"10.1145\/3691620.3695542","type":"proceedings-article","created":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T15:39:19Z","timestamp":1729265959000},"page":"1770-1782","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Combining Coverage and Expert Features with Semantic Representation for Coincidental Correctness Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5265-0051","authenticated-orcid":false,"given":"Huan","family":"Xie","sequence":"first","affiliation":[{"name":"Chongqing University, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4504-6806","authenticated-orcid":false,"given":"Yan","family":"Lei","sequence":"additional","affiliation":[{"name":"Chongqing University, Chongqing, China"},{"name":"Peng Cheng Laboratory, ShenZhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4117-8430","authenticated-orcid":false,"given":"Maojin","family":"Li","sequence":"additional","affiliation":[{"name":"Chongqing University, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9538-9121","authenticated-orcid":false,"given":"Meng","family":"Yan","sequence":"additional","affiliation":[{"name":"Chongqing University, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-9807-8275","authenticated-orcid":false,"given":"Sheng","family":"Zhang","sequence":"additional","affiliation":[{"name":"Chongqing University, Chongqing, China"}]}],"member":"320","published-online":{"date-parts":[[2024,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. Defects4J dataset. https:\/\/github.com\/rjust\/defects4j"},{"key":"e_1_3_2_1_2_1","unstructured":"[n. d.]. tree-sitter. ([n. d.]). http:\/\/tree-sitter.github.io\/tree-sitter\/"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1762"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1696"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2006.18"},{"key":"e_1_3_2_1_6_1","unstructured":"Anonymous. [n. d.]. Our artifact. https:\/\/anonymous.4open.science\/r\/ASE2024CODE-9409"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351752"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.3115\/1072017.1072026"},{"key":"e_1_3_2_1_9_1","volume-title":"Ensemble Random Forests Classifier for Detecting Coincidentally Correct Test Cases. In 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","author":"Dass Shuvalaxmi","unstructured":"Shuvalaxmi Dass, Xiaozhen Xue, and Akbar Siami Namin. 2020. Ensemble Random Forests Classifier for Detecting Coincidentally Correct Test Cases. In 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC). IEEE, 1326--1331."},{"key":"e_1_3_2_1_10_1","volume-title":"Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805","author":"Devlin Jacob","year":"2018","unstructured":"Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2018. Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018)."},{"key":"e_1_3_2_1_11_1","volume-title":"Encyclopedia of distances","author":"Deza Michel Marie","unstructured":"Michel Marie Deza and Elena Deza. 2009. Encyclopedia of distances. In Encyclopedia of distances. Springer, 1--583."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-020-09859-y"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-018-0591-z"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.acl-long.499"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-016-6112-3"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2685614"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-014-0145-3"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","unstructured":"Jiajun Jiang Yingfei Xiong Hongyu Zhang Qing Gao and Xiangqun Chen. 2018. Shaping Program Repair Space with Existing Patches and Similar Code (ISSTA). 10.1145\/3213846.3213871","DOI":"10.1145\/3213846.3213871"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-019-09780-z"},{"key":"e_1_3_2_1_20_1","volume-title":"Contrastive Coincidental Correctness Representation Learning. In 2023 IEEE 34th International Symposium on Software Reliability Engineering (ISSRE). IEEE, 252--263","author":"Li Maojin","year":"2023","unstructured":"Maojin Li, Yan Lei, Huan Xie, Jiaguo Wang, Chunyan Liu, and Zhengxiong Deng. 2023. Contrastive Coincidental Correctness Representation Learning. In 2023 IEEE 34th International Symposium on Software Reliability Engineering (ISSRE). IEEE, 252--263."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330574"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00067"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2019.8667970"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330577"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.01.056"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468580"},{"key":"e_1_3_2_1_27_1","volume-title":"Cleansing test suites from coincidental correctness to enhance fault-localization. In 2010 third international conference on software testing, verification and validation","author":"Masri Wes","unstructured":"Wes Masri and Rawad Abou Assi. 2010. Cleansing test suites from coincidental correctness to enhance fault-localization. In 2010 third international conference on software testing, verification and validation. IEEE, 165--174."},{"key":"e_1_3_2_1_28_1","volume-title":"Prevalence of coincidental correctness and mitigation of its impact on fault localization. ACM transactions on software engineering and methodology (TOSEM) 23, 1","author":"Masri Wes","year":"2014","unstructured":"Wes Masri and Rawad Abou Assi. 2014. Prevalence of coincidental correctness and mitigation of its impact on fault localization. ACM transactions on software engineering and methodology (TOSEM) 23, 1 (2014), 1--28."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510147"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194013500186"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2014.28"},{"key":"e_1_3_2_1_32_1","volume-title":"Hua Jie Lee, and Kotagiri Ramamohanarao","author":"Naish Lee","year":"2011","unstructured":"Lee Naish, Hua Jie Lee, and Kotagiri Ramamohanarao. 2011. A model for spectra-based software diagnosis. ACM Transactions on software engineering and methodology (TOSEM) 20, 3 (2011), 1--32."},{"key":"e_1_3_2_1_33_1","volume-title":"Detecting Coincidental Correctness and Mitigating Its Impacts on Localizing Variability Faults. In 2022 14th International Conference on Knowledge and Systems Engineering (KSE). IEEE, 1--6.","author":"Nguyen Thu-Trang","year":"2022","unstructured":"Thu-Trang Nguyen and Hieu Dinh Vo. 2022. Detecting Coincidental Correctness and Mitigating Its Impacts on Localizing Variability Faults. In 2022 14th International Conference on Knowledge and Systems Engineering (KSE). IEEE, 1--6."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.08.077"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110635"},{"key":"e_1_3_2_1_36_1","volume-title":"2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE). IEEE, 13--24","author":"Seemanta","unstructured":"Seemanta Saha et al. 2019. Harnessing evolution for multi-hunk program repair. In 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE). IEEE, 13--24."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3092703.3092717"},{"key":"e_1_3_2_1_38_1","volume-title":"NeuralCCD: Integrating Multiple Features for Neural Coincidental Correctness Detection. In 2023 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER). IEEE, 85--96","author":"Tao Zhou","year":"2023","unstructured":"Zhou Tao, Yan Lei, Huan Xie, and Jian Hu. 2023. NeuralCCD: Integrating Multiple Features for Neural Coincidental Correctness Detection. In 2023 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER). IEEE, 85--96."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3524842.3528009"},{"key":"e_1_3_2_1_40_1","first-page":"314","article-title":"ContractGuard: Defend ethereum smart contracts with embedded intrusion detection","volume":"13","author":"Wang Xinming","year":"2019","unstructured":"Xinming Wang, Jiahao He, Zhijian Xie, Gansen Zhao, and Shing-Chi Cheung. 2019. ContractGuard: Defend ethereum smart contracts with embedded intrusion detection. IEEE Transactions on Services Computing 13, 2 (2019), 314--328.","journal-title":"IEEE Transactions on Services Computing"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070507"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180233"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2013.2285319"},{"key":"e_1_3_2_1_44_1","volume-title":"Identifying Coincidental Correct Test Cases with Multiple Features Extraction for Fault Localization. In 2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","author":"Wu Yonghao","unstructured":"Yonghao Wu, Shuaihua Tian, Zezhong Yang, Zheng Li, Yong Liu, and Xiang Chen. 2023. Identifying Coincidental Correct Test Cases with Multiple Features Extraction for Fault Localization. In 2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC). IEEE, 800--809."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2021.106653"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510136"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115676"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.41"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2014.32"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3556893"},{"key":"e_1_3_2_1_51_1","volume-title":"Context-based Cluster Fault Localization. In 2022 IEEE\/ACM 30th International Conference on Program Comprehension (ICPC). IEEE, 482--493","author":"Yu Junji","year":"2022","unstructured":"Junji Yu, Yan Lei, Huan Xie, Lingfeng Fu, and Chunyan Liu. 2022. Context-based Cluster Fault Localization. In 2022 IEEE\/ACM 30th International Conference on Program Comprehension (ICPC). IEEE, 482--493."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213866"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2020.106486"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME58846.2023.00032"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2013.6688889"}],"event":{"name":"ASE '24: 39th IEEE\/ACM International Conference on Automated Software Engineering","location":"Sacramento CA USA","acronym":"ASE '24","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 39th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3691620.3695542","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3691620.3695542","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:09:39Z","timestamp":1750295379000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3691620.3695542"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,27]]},"references-count":55,"alternative-id":["10.1145\/3691620.3695542","10.1145\/3691620"],"URL":"https:\/\/doi.org\/10.1145\/3691620.3695542","relation":{},"subject":[],"published":{"date-parts":[[2024,10,27]]},"assertion":[{"value":"2024-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}