{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,16]],"date-time":"2025-09-16T21:18:27Z","timestamp":1758057507325,"version":"3.44.0"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032051875","type":"print"},{"value":"9783032051882","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,9,16]],"date-time":"2025-09-16T00:00:00Z","timestamp":1757980800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,16]],"date-time":"2025-09-16T00:00:00Z","timestamp":1757980800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-05188-2_23","type":"book-chapter","created":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T21:52:40Z","timestamp":1757973160000},"page":"349-364","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["New Convex-Based Metamorphic Relations and\u00a0Large-Scale Machine Learning Model Evaluation"],"prefix":"10.1007","author":[{"given":"Jessy","family":"Colonval","sequence":"first","affiliation":[]},{"given":"Fabrice","family":"Bouquet","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,16]]},"reference":[{"key":"23_CR1","unstructured":"April, A., Laporte, C.Y.: L\u2019assurance Qualit\u00e9 Logicielle 1. Lavoisier (2011)"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Davis, M.D., Weyuker, E.J.: Pseudo-oracles for non-testable programs. In: Proceedings of the ACM \u201981 Conference, pp.\u00a0254\u2013257. ACM (1981)","DOI":"10.1145\/800175.809889"},{"key":"23_CR3","unstructured":"Chen, T.Y., Cheung, S.C., Yiu, S.M.: Metamorphic testing: a new approach for generating next test cases (1998)"},{"key":"23_CR4","doi-asserted-by":"crossref","first-page":"544","DOI":"10.1016\/j.jss.2010.11.920","volume":"84","author":"X Xie","year":"2011","unstructured":"Xie, X., Ho, J.W.K., Murphy, C., Kaiser, G., Xu, B., Chen, T.Y.: Testing and validating machine learning classifiers by metamorphic testing. J. Syst. Softw. 84, 544\u2013558 (2011)","journal-title":"J. Syst. Softw."},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Saha, P.,\u00a0Kanewala, U.: Fault detection effectiveness of metamorphic relations developed for testing supervised classifiers. In: 2019 IEEE International Conference On Artificial Intelligence Testing (AITest), pp.\u00a0157\u2013164 (2019)","DOI":"10.1109\/AITest.2019.00019"},{"key":"23_CR6","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1145\/3241979","volume":"62","author":"ZQ Zhou","year":"2019","unstructured":"Zhou, Z.Q., Sun, L.: Metamorphic testing of driverless cars. Commun. ACM 62, 61\u201367 (2019)","journal-title":"Commun. ACM"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Aggarwal, C.C.: Outlier Analysis, 2\u00a0edn. Springer, Cham (2017)","DOI":"10.1007\/978-3-319-47578-3"},{"key":"23_CR8","unstructured":"Guyon, I.: Design of experiments for the NIPS 2003 variable selection benchmark (2003)"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Dwarakanath, A., et al.: Identifying implementation bugs in machine learning based image classifiers using metamorphic testing. In: Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 2018, New York, NY, USA, pp.\u00a0118\u2013128. Association for Computing Machinery (2018)","DOI":"10.1145\/3213846.3213858"},{"key":"23_CR10","doi-asserted-by":"crossref","first-page":"616","DOI":"10.1080\/00029890.1971.11992815","volume":"78","author":"V Klee","year":"1971","unstructured":"Klee, V.: What is a convex set? Am. Math. Mon. 78, 616\u2013631 (1971)","journal-title":"Am. Math. Mon."},{"key":"23_CR11","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1145\/235815.235821","volume":"22","author":"CB Barber","year":"1996","unstructured":"Barber, C.B., Dobkin, D.P., Huhdanpaa, H.: The quickhull algorithm for convex hulls. ACM Trans. Math. Softw. 22, 469\u2013483 (1996)","journal-title":"ACM Trans. Math. Softw."},{"key":"23_CR12","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1145\/360767.360802","volume":"17","author":"IE Sutherland","year":"1974","unstructured":"Sutherland, I.E., Hodgman, G.W.: Reentrant polygon clipping. Commun. ACM 17, 32\u201342 (1974)","journal-title":"Commun. ACM"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Colonval, J.,\u00a0Bouquet, F.: Multidimensional adaptative kNN over\u00a0tracking outliers (makoto). In: Yang, X., et al. (eds.) Advanced Data Mining and Applications, pp.\u00a0535\u2013550. Springer, Cham (2023)","DOI":"10.1007\/978-3-031-46661-8_36"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Colonval, J.,\u00a0Bouquet, F.: Hunting inside n-quantiles of outliers (hino). In: Wu, X., et al. (eds.) Data Science: Foundations and Applications, pp.\u00a0420\u2013431. Springer, Singapore (2025)","DOI":"10.1007\/978-981-96-8295-9_31"},{"key":"23_CR15","unstructured":"Li, K.-L., Huang, H.-K., Tian, S.-F.,\u00a0Xu, W.: Improving one-class SVM for anomaly detection. In: Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693), vol.\u00a05, pp.\u00a03077\u20133081 (2003)"},{"key":"23_CR16","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1145\/335191.335388","volume":"29","author":"M Breunig","year":"2000","unstructured":"Breunig, M., Kriegel, H.-P., Ng, R., Sander, J.: LOF: identifying density-based local outliers. ACM SIGMOD Rec. 29, 93\u2013104 (2000)","journal-title":"ACM SIGMOD Rec."},{"key":"23_CR17","doi-asserted-by":"crossref","first-page":"1635","DOI":"10.1016\/j.compchemeng.2004.01.009","volume":"28","author":"H Liu","year":"2004","unstructured":"Liu, H., Shah, S., Jiang, W.: On-line outlier detection and data cleaning. Comput. Chem. Eng. 28, 1635\u20131647 (2004)","journal-title":"Comput. Chem. Eng."},{"key":"23_CR18","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1023\/A:1022643204877","volume":"1","author":"JR Quinlan","year":"1986","unstructured":"Quinlan, J.R.: Induction of decision trees. Mach. Learn. 1, 81\u2013106 (1986)","journal-title":"Mach. Learn."},{"key":"23_CR19","unstructured":"Quinlan, J.R.: C4.5: Programs for Machine Learning. Morgan Kaufmann Publishers Inc., San Francisco (1993)"},{"key":"23_CR20","first-page":"235","volume":"16","author":"SL Salzberg","year":"1994","unstructured":"Salzberg, S.L.: C4.5: programs for machine learning by J. Ross Quinlan. Morgan Kaufmann Publishers Inc, 1993. Mach. Learn. 16, 235\u2013240 (1994)","journal-title":"Mach. Learn."},{"key":"23_CR21","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1613\/jair.279","volume":"4","author":"JR Quinlan","year":"1996","unstructured":"Quinlan, J.R.: Improved use of continuous attributes in C4.5. J. Artif. Intell. Res. 4, 77\u201390 (1996)","journal-title":"J. Artif. Intell. Res."},{"key":"23_CR22","doi-asserted-by":"crossref","unstructured":"Gordon, A.D.,\u00a0Breiman, L., Friedman, J.H., Olshen, R.A., Stone, C.J.: Classification and regression trees. In: Biometrics, vol.\u00a040, p.\u00a0874, Sept. 1984","DOI":"10.2307\/2530946"},{"key":"23_CR23","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s10994-006-6226-1","volume":"63","author":"P Geurts","year":"2006","unstructured":"Geurts, P., Ernst, D., Wehenkel, L.: Extremely randomized trees. Mach. Learn. 63, 3\u201342 (2006)","journal-title":"Mach. Learn."},{"key":"23_CR24","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45, 5\u201332 (2001)","journal-title":"Mach. Learn."},{"key":"23_CR25","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1016\/S0167-9473(01)00065-2","volume":"38","author":"JH Friedman","year":"2002","unstructured":"Friedman, J.H.: Stochastic gradient boosting. Comput. Stat. Data Anal. 38, 367\u2013378 (2002)","journal-title":"Comput. Stat. Data Anal."},{"key":"23_CR26","doi-asserted-by":"crossref","unstructured":"Amer, M.,\u00a0Goldstein, M.,\u00a0Abdennadher, S.: Enhancing one-class support vector machines for unsupervised anomaly detection. In: Proceedings of the ACM SIGKDD Workshop on Outlier Detection and Description, ODD \u201913, New York, NY, USA, pp.\u00a08\u201315. Association for Computing Machinery (2013)","DOI":"10.1145\/2500853.2500857"},{"key":"23_CR27","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1037\/h0042519","volume":"65","author":"F Rosenblatt","year":"1958","unstructured":"Rosenblatt, F.: The perceptron: a probabilistic model for information storage and organization in the brain. Psychol. Rev. 65, 386\u2013408 (1958)","journal-title":"Psychol. Rev."},{"key":"23_CR28","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1016\/j.patcog.2016.03.028","volume":"58","author":"SM Erfani","year":"2016","unstructured":"Erfani, S.M., Rajasegarar, S., Karunasekera, S., Leckie, C.: High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning. Pattern Recogn. 58, 121\u2013134 (2016)","journal-title":"Pattern Recogn."},{"key":"23_CR29","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/TIT.1967.1053964","volume":"13","author":"T Cover","year":"1967","unstructured":"Cover, T., Hart, P.: Nearest neighbor pattern classification. IEEE Trans. Inf. Theory 13, 21\u201327 (1967)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"23_CR30","unstructured":"Wettschereck, D., Dietterich, T.G.: Locally adaptive nearest neighbor algorithms. In: Proceedings of the 6th International Conference on Neural Information Processing Systems, NIPS\u201993, San Francisco, CA, USA, pp.\u00a0184\u2013191. Morgan Kaufmann Publishers Inc. (1993)"},{"key":"23_CR31","doi-asserted-by":"crossref","first-page":"6567","DOI":"10.1073\/pnas.082099299","volume":"99","author":"R Tibshirani","year":"2002","unstructured":"Tibshirani, R., Hastie, T., Narasimhan, B., Chu, G.: Diagnosis of multiple cancer types by shrunken centroids of gene expression. Proc. Natl. Acad. Sci. U.S.A. 99, 6567\u20136572 (2002)","journal-title":"Proc. Natl. Acad. Sci. U.S.A."}],"container-title":["Lecture Notes in Computer Science","Testing Software and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-05188-2_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T21:52:47Z","timestamp":1757973167000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-05188-2_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,16]]},"ISBN":["9783032051875","9783032051882"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-05188-2_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,16]]},"assertion":[{"value":"16 September 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICTSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Testing Software and Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Limassol","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cyprus","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"37","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pts2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/conf.researchr.org\/home\/ictss-2025","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}