{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:06:05Z","timestamp":1742925965183,"version":"3.40.3"},"publisher-location":"Cham","reference-count":46,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030642136"},{"type":"electronic","value":"9783030642143"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-64214-3_15","type":"book-chapter","created":{"date-parts":[[2020,12,18]],"date-time":"2020-12-18T06:03:46Z","timestamp":1608271426000},"page":"209-223","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Metamorphic Testing for Plant Identification Mobile Applications Based on Test Contexts"],"prefix":"10.1007","author":[{"given":"Hongjing","family":"Guo","sequence":"first","affiliation":[]},{"given":"Chuanqi","family":"Tao","sequence":"additional","affiliation":[]},{"given":"Zhiqiu","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,19]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Zhang, J., Harman, M., Ma, L., Liu, Y.: Machine learning testing: survey, landscapes and horizons. arXiv preprint arXiv:1906.10742 (2019)","DOI":"10.1109\/TSE.2019.2962027"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Amershi, S., et al.: Software engineering for machine learning: a case study. In: Proceedings of the 41st International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP), Montreal, QC, Canada, pp. 291\u2013300 (2019)","DOI":"10.1109\/ICSE-SEIP.2019.00042"},{"key":"15_CR3","doi-asserted-by":"publisher","first-page":"120164","DOI":"10.1109\/ACCESS.2019.2937107","volume":"7","author":"C Tao","year":"2019","unstructured":"Tao, C., Gao, J., Wang, T.: Testing and quality validation for AI software-perspectives, issues, and practices. IEEE Access 7, 120164\u2013120175 (2019)","journal-title":"IEEE Access"},{"key":"15_CR4","doi-asserted-by":"publisher","first-page":"62815","DOI":"10.1109\/ACCESS.2018.2877137","volume":"6","author":"Y Yin","year":"2018","unstructured":"Yin, Y., Chen, L., Xu, Y., Wan, J.: Location-aware service recommendation with enhanced probabilistic matrix factorization. IEEE Access 6, 62815\u201362825 (2018)","journal-title":"IEEE Access"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Gao, J., Tao, C., Jie, D., Lu, S.: Invited paper: what is AI software testing? and why. In: IEEE International Conference on Service-Oriented System Engineering (SOSE), San Francisco East Bay, CA, USA, pp. 27\u20132709 (2019)","DOI":"10.1109\/SOSE.2019.00015"},{"issue":"5","key":"15_CR6","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1109\/TSE.2014.2372785","volume":"41","author":"E Barr","year":"2015","unstructured":"Barr, E., Harman, M., McMinn, P., Shahbaz, M., Yoo, S.: The oracle problem in software testing: a survey. IEEE Trans. Softw. Eng. 41(5), 507\u2013525 (2015)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"1","key":"15_CR7","doi-asserted-by":"publisher","first-page":"4:1","DOI":"10.1145\/3143561","volume":"51","author":"TY Chen","year":"2018","unstructured":"Chen, T.Y., et al.: Metamorphic testing: a review of challenges and opportunities. ACM Comput. Surv. 51(1), 4:1\u20134:27 (2018)","journal-title":"ACM Comput. Surv."},{"key":"15_CR8","unstructured":"Chen, T.Y., Cheung, S., Yiu, S.: Metamorphic testing: a new approach for generating next test cases. Technical report HKUST-CS98-01. Department of Computer Science, Hong Kong University of Science and Technology, Hong Kong (1998)"},{"issue":"1","key":"15_CR9","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1109\/TSE.2010.23","volume":"37","author":"TY Chen","year":"2011","unstructured":"Chen, T.Y., Tse, T., Zhou, Z.: Semi-proving: an integrated method for program proving, testing, and debugging. IEEE Trans. Softw. Eng. 37(1), 109\u2013125 (2011)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Jin, H., Jiang, Y., Liu, N., Xu, C., Ma, X., Lu, J.: Concolic metamorphic debugging. In: Proceedings of the IEEE 39th Annual Computer Software and Applications Conference (COMPSAC), Los Alamitos, CA, pp. 232\u2013241 (2015)","DOI":"10.1109\/COMPSAC.2015.79"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Xie, X., Wong, W.E., Chen, T.Y., Xu, B.: Spectrum-based fault localization: testing oracles are no longer mandatory. In: Proceedings of the 11th International Conference on Quality Software (QSIC), Los Alamitos, CA, pp. 1\u201310 (2011)","DOI":"10.1109\/QSIC.2011.20"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Liu, H., Yusuf, I.I., Schmidt, H.W., Chen, T.Y.: Metamorphic fault tolerance: an automated and systematic methodology for fault tolerance in the absence of test oracle. In: Companion Proceedings of the 36th International Conference on Software Engineering (ICSE Companion), New York, NY, pp. 420\u2013423 (2014)","DOI":"10.1145\/2591062.2591109"},{"key":"15_CR13","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/j.jss.2016.04.002","volume":"126","author":"M Jiang","year":"2017","unstructured":"Jiang, M., Chen, T.Y., Kuo, F.C., Towey, D., Ding, Z.: A metamorphic testing approach for supporting program repair without the need for a test oracle. J. Syst. Softw. 126, 127\u2013140 (2017)","journal-title":"J. Syst. Softw."},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Tian, Y., Pei, K., Jana, S., Ray, B.: DeepTest: automated testing of deep-neural-network-driven autonomous cars. In: Proceedings of the 40th International Conference on Software Engineering (ICSE), Gothenburg, Sweden, pp. 303\u2013314 (2018)","DOI":"10.1145\/3180155.3180220"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Zhang, M., Zhang, Y., Zhang, L., Liu, C., Khurshid, S.: DeepRoad: GAN-based metamorphic testing and input validation framework for autonomous driving systems. In: Proceedings of the 33rd IEEE\/ACM International Conference on Automated Software Engineering (ASE), Montpellier, France, pp. 132\u2013142 (2018)","DOI":"10.1145\/3238147.3238187"},{"issue":"3","key":"15_CR16","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1145\/3241979","volume":"62","author":"Z Zhou","year":"2019","unstructured":"Zhou, Z., Sun, L.: Metamorphic testing of driverless cars. Commun. ACM 62(3), 61\u201367 (2019)","journal-title":"Commun. ACM"},{"key":"15_CR17","unstructured":"Murphy, C., Kaiser, G.E., Hu, L., Wu, L.: Properties of machine learning applications for use in metamorphic testing. In: Proceedings of the 20th International Conference on Software Engineering and Knowledge Engineering (SEKE), San Francisco, CA, USA, pp. 867\u2013872 (2008)"},{"issue":"4","key":"15_CR18","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1016\/j.jss.2010.11.920","volume":"84","author":"X Xie","year":"2011","unstructured":"Xie, X., Ho, J.W., Murphy, C., Kaiser, G., Xu, B., Chen, T.Y.: Testing and validating machine learning classifiers by metamorphic testing. J. Syst. Softw. 84(4), 544\u2013558 (2011)","journal-title":"J. Syst. Softw."},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Brown, J., Zhou, Z. Chow, Y.: Metamorphic testing of navigation software: a pilot study with google maps. In: 51st Hawaii International Conference on System Sciences (HICSS), Hilton Waikoloa Village, Hawaii, USA, pp. 1\u201310 (2018)","DOI":"10.24251\/HICSS.2018.713"},{"issue":"3","key":"15_CR20","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1109\/TSE.2015.2478001","volume":"42","author":"Z Zhou","year":"2016","unstructured":"Zhou, Z., Xiang, S., Chen, T.Y.: Metamorphic testing for software quality assessment: a study of search engines. IEEE Trans. Softw. Eng. 42(3), 264\u2013284 (2016)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Wang, S., Su, Z.: Metamorphic testing for object detection systems. arXiv preprint arXiv:1912.12162 (2019)","DOI":"10.1145\/3324884.3416584"},{"key":"15_CR22","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/j.jss.2015.07.037","volume":"116","author":"TY Chen","year":"2016","unstructured":"Chen, T.Y., Poon, P., Xie, X.: METRIC: METamorphic Relation Identification based on the Category-choice framework. J. Syst. Softw. 116, 177\u2013190 (2016)","journal-title":"J. Syst. Softw."},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Zhang, J., et al.: Search-based inference of polynomial metamorphic relations. In: Proceedings of the 29th ACM\/IEEE International Conference on Automated Software Engineering (ASE), New York, pp. 701\u2013712 (2014)","DOI":"10.1145\/2642937.2642994"},{"key":"15_CR24","doi-asserted-by":"crossref","unstructured":"Zhu, H.: A tool for automated Java unit testing based on data mutation and metamorphic testing methods. In: Proceedings of the 2nd International Conference on Trustworthy Systems and Their Applications (TSA), Los Alamitos, CA, pp. 8\u201315 (2015)","DOI":"10.1109\/TSA.2015.13"},{"key":"15_CR25","doi-asserted-by":"crossref","unstructured":"Zhu, H., Liu, D., Bayley, I., Harrison, R., Cuzzolin, F.: Datamorphic testing: a method for testing intelligent applications. In: IEEE International Conference On Artificial Intelligence Testing (AITest), Newark, CA, USA, pp. 149\u2013156 (2019)","DOI":"10.1109\/AITest.2019.00018"},{"key":"15_CR26","doi-asserted-by":"crossref","unstructured":"Pei, K., Cao, Y., Yang, J., Jana, S.: Deepxplore: Automated whitebox testing of deep learning systems. In: Proceedings of the 26th Symposium on Operating Systems Principles (SOSP), pp. 1\u201318. Shanghai, China (2017)","DOI":"10.1145\/3132747.3132785"},{"key":"15_CR27","doi-asserted-by":"crossref","unstructured":"Ma, L., et al.: DeepGauge: multi-granularity testing criteria for deep learning systems. In: Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering (ASE), Montpellier, France, pp. 120\u2013131 (2018)","DOI":"10.1145\/3238147.3238202"},{"key":"15_CR28","doi-asserted-by":"crossref","unstructured":"Sun, Y., Huang, X., Kroening, D.: Testing deep neural networks. arXiv preprint arXiv:1803.04792 (2019)","DOI":"10.1145\/3238147.3238172"},{"key":"15_CR29","doi-asserted-by":"crossref","unstructured":"Guo, J., Jiang, Y. Zhao, Y. Chen, Q. Sun, J.: DLFuzz: differential fuzzing testing of deep learning systems. In: Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC\/SIGSOFT), Lake Buena Vista, FL, USA, pp. 739\u2013743 (2018)","DOI":"10.1145\/3236024.3264835"},{"key":"15_CR30","unstructured":"Odena, A., Olsson, C., Andersen, D., Goodfellow, I.: TensorFuzz: debugging neural networks with coverage-guided fuzzing. In: Proceedings of the 36th International Conference on Machine Learning (ICML), Long Beach, California, USA, pp. 4901\u20134911 (2019)"},{"key":"15_CR31","doi-asserted-by":"crossref","unstructured":"Xie, X., Chen, H., Li, Y., Ma, L., Liu, Y., Zhao, J.: Coverage-guided fuzzing for feedforward neural networks. In: 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE), San Diego, CA, USA, pp. 1162\u20131165 (2019)","DOI":"10.1109\/ASE.2019.00127"},{"key":"15_CR32","doi-asserted-by":"crossref","unstructured":"Ma, L., et al.: DeepMutation: mutation testing of deep learning systems. In: Proceedings of the 29th IEEE International Symposium on Software Reliability Engineering (ISSRE), Memphis, TN, pp. 100\u2013111 (2018)","DOI":"10.1109\/ISSRE.2018.00021"},{"key":"15_CR33","doi-asserted-by":"crossref","unstructured":"Shen, W., Wan, J., Chen, Z.: MuNN: mutation analysis of neural networks. In: IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C), Lisbon, pp. 108\u2013115 (2018)","DOI":"10.1109\/QRS-C.2018.00032"},{"key":"15_CR34","doi-asserted-by":"crossref","unstructured":"Ding, J., Kang, X., Hu, X.: Validating a deep learning framework by metamorphic testing. In: 2017 IEEE\/ACM 2nd International Workshop on Metamorphic Testing (MET), Buenos Aires, pp. 28\u201334 (2017)","DOI":"10.1109\/MET.2017.2"},{"key":"15_CR35","doi-asserted-by":"crossref","unstructured":"Murphy, C., Shen, K., Kaiser, G.: Using JML runtime assertion checking to automate metamorphic testing in applications without test oracles. In: International Conference on Software Testing Verification and Validation (ICST), Denver, Colorado, USA, pp. 436\u2013445 (2009)","DOI":"10.1109\/ICST.2009.19"},{"key":"15_CR36","doi-asserted-by":"crossref","unstructured":"Sun, Y., Wu, M., Ruan, W., Huang, X., Kwiatkowska, M., Kroening, D.: Concolic testing for deep neural networks. In: 33rd IEEE\/ACM International Conference on Automated Software Engineering (ASE), Montpellier, France, pp. 109\u2013119 (2018)","DOI":"10.1145\/3238147.3238172"},{"key":"15_CR37","unstructured":"Gopinath, D., Wang, K., Zhang, M., Pasareanu, C., Khurshid, S.: Symbolic execution for deep neural networks. arXiv preprint arXiv:1807.10439 (2018)"},{"key":"15_CR38","doi-asserted-by":"crossref","unstructured":"Gopinath, D., Zhang, M., Wang, K., Kadron, B., Pasareanu, C., Khurshid, S.: Symbolic execution for importance analysis and adversarial generation in neural networks. In: IEEE 30th International Symposium on Software Reliability Engineering (ISSRE), Berlin, Germany, pp. 313\u2013322 (2019)","DOI":"10.1109\/ISSRE.2019.00039"},{"key":"15_CR39","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Xie, X.: On the investigation of essential diversities for deep learning testing criteria. In: IEEE 19th International Conference on Software Quality, Reliability and Security (QRS), Sofia, Bulgaria, pp. 394-405 (2019)","DOI":"10.1109\/QRS.2019.00056"},{"key":"15_CR40","unstructured":"Affine Transformation (2015). https:\/\/www.mathworks.com\/discovery\/affine-transformation.html"},{"key":"15_CR41","unstructured":"Open Source Computer Vision Library (2015). https:\/\/github.com\/itseez\/opencv"},{"key":"15_CR42","unstructured":"Removebg (2019). https:\/\/github.com\/remove-bg"},{"key":"15_CR43","unstructured":"iNaturalist 2018 Competition (2018). https:\/\/github.com\/visipedia\/inat_comp\/tree\/master\/2018"},{"key":"15_CR44","unstructured":"PlantSnap. https:\/\/play.google.com\/store\/apps\/details?id=com.fws.plantsnap2"},{"key":"15_CR45","unstructured":"PlantNet. https:\/\/play.google.com\/store\/apps\/details?id=org.plantnet"},{"key":"15_CR46","unstructured":"PictureThis. https:\/\/play.google.com\/store\/apps\/details?id=cn.danatech.xingseus"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Mobile Computing, Applications, and Services"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-64214-3_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,6]],"date-time":"2022-12-06T11:59:05Z","timestamp":1670327945000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-64214-3_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030642136","9783030642143"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-64214-3_15","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"19 December 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MobiCASE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Mobile Computing, Applications, and Services","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shanghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mobicase2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/mobicase.eai-conferences.org\/2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"confyplus.eai.eu","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"49","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}