{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:24:53Z","timestamp":1740122693090,"version":"3.37.3"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2022,11,28]],"date-time":"2022-11-28T00:00:00Z","timestamp":1669593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,11,28]],"date-time":"2022-11-28T00:00:00Z","timestamp":1669593600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61876138, 62272387"],"award-info":[{"award-number":["61876138, 62272387"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key R & D Project of Shaanxi Province","award":["2020GY-010"],"award-info":[{"award-number":["2020GY-010"]}]},{"name":"Key Industrial Chain Core Technology Research Project of Xi\u2019an","award":["2022JH-RGZN-0028"],"award-info":[{"award-number":["2022JH-RGZN-0028"]}]},{"name":"Special Fund for Key Discipline Construction of General Institutions of Higher Learning from Shaanxi Province","award":["CXJJLY202022"],"award-info":[{"award-number":["CXJJLY202022"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1007\/s10489-022-04323-4","type":"journal-article","created":{"date-parts":[[2022,11,28]],"date-time":"2022-11-28T08:04:11Z","timestamp":1669622651000},"page":"15787-15801","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["DeepMC: DNN test sample optimization method jointly guided by misclassification and coverage"],"prefix":"10.1007","volume":"53","author":[{"given":"Jiaze","family":"Sun","sequence":"first","affiliation":[]},{"given":"Juan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Sulei","family":"Wen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,28]]},"reference":[{"key":"4323_CR1","doi-asserted-by":"publisher","unstructured":"Wei K T, Ismail M, Husin Z, Yasruddin M L (2022) Automated tomato grading system using computer vision (CV) and deep neural network (DNN) algorithm. In: Proceedings of the 2022 IEEE 12th symposium on computer applications & industrial electronics (ISCAIE), pp 22\u201327. https:\/\/doi.org\/10.1109\/ISCAIE54458.2022.9794557","DOI":"10.1109\/ISCAIE54458.2022.9794557"},{"issue":"5","key":"4323_CR2","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1109\/TNNLS.2020.2997289","volume":"32","author":"H Tang","year":"2021","unstructured":"Tang H, Liu H, Xiao W, Sebe N (2021) When dictionary learning meets deep learning: deep dictionary learning and coding network for image recognition with limited data. IEEE Trans Neural Netw Learn Syst 32(5):2129\u20132141. https:\/\/doi.org\/10.1109\/TNNLS.2020.2997289","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"3","key":"4323_CR3","doi-asserted-by":"publisher","first-page":"100048","DOI":"10.1016\/j.neuri.2022.100048","volume":"2","author":"N Shelke","year":"2022","unstructured":"Shelke N, Chaudhury S, Chakrabarti S, Bangare SL, Yogapriya G, Pandey P (2022) An efficient way of text-based emotion analysis from social media using LRA-DNN. Neurosci Inf 2(3):100048. https:\/\/doi.org\/10.1016\/j.neuri.2022.100048","journal-title":"Neurosci Inf"},{"key":"4323_CR4","doi-asserted-by":"publisher","unstructured":"Kahn G, Villaflor A, Ding B, Abbeel P, Levine S (2018) Self-supervised deep reinforcement learning with generalized computation graphs for robot navigation. In: Proceeding of the 2018 IEEE international conference on robotics and automation, pp 5129\u20135136. https:\/\/doi.org\/10.1109\/ICRA.2018.8460655","DOI":"10.1109\/ICRA.2018.8460655"},{"key":"4323_CR5","doi-asserted-by":"publisher","unstructured":"Dhamija T, Gupta A, Gupta S, Anjum KR (2022) Semantic segmentation in medical images through transfused convolution and transformer networks. Appl Intell.\u00a0https:\/\/doi.org\/10.1007\/s10489-022-03642-w","DOI":"10.1007\/s10489-022-03642-w"},{"key":"4323_CR6","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s10489-020-01827-9","volume":"51","author":"DH Lee","year":"2021","unstructured":"Lee DH, Chen KL, Liou KH, Liu CH, Liu JL (2021) Deep learning and control algorithms of direct perception for autonomous driving. Appl Intell 51:237\u2013247. https:\/\/doi.org\/10.1007\/s10489-020-01827-9","journal-title":"Appl Intell"},{"key":"4323_CR7","doi-asserted-by":"publisher","unstructured":"Kadhim TA, Zghal NS, Hariri D, Aissa DB (2022) Face recognition in multiple variations using deep learning and convolutional neural networks. In: Proceeding of the 2022 IEEE 9th international conference on sciences of electronics, Technologies of Information and Telecommunications (SETIT), pp 305\u2013311. https:\/\/doi.org\/10.1109\/SETIT54465.2022.9875530","DOI":"10.1109\/SETIT54465.2022.9875530"},{"key":"4323_CR8","doi-asserted-by":"publisher","unstructured":"Golwalkar R, Mehendale N (2022) Masked-face recognition using deep metric learning and FaceMaskNet-21. Appl Intell.\u00a0https:\/\/doi.org\/10.1007\/s10489-021-03150-3","DOI":"10.1007\/s10489-021-03150-3"},{"key":"4323_CR9","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.dss.2018.10.009","volume":"116","author":"X Zhang","year":"2019","unstructured":"Zhang X, Mahadevan S (2019) Ensemble machine learning models for aviation incident risk prediction. Decis Support Syst 116:48\u201363. https:\/\/doi.org\/10.1016\/j.dss.2018.10.009","journal-title":"Decis Support Syst"},{"issue":"4","key":"4323_CR10","doi-asserted-by":"publisher","first-page":"571","DOI":"10.12000\/JR21048","volume":"10","author":"H Sun","year":"2021","unstructured":"Sun H, Chen J, Lei L, Ji K, Kuang G (2021) Adversarial robustness of deep convolutional neural network-based image recognition models: a review. J Radars 10(4):571\u2013594. https:\/\/doi.org\/10.12000\/JR21048","journal-title":"J Radars"},{"key":"4323_CR11","doi-asserted-by":"publisher","first-page":"23","DOI":"10.3389\/fdata.2020.00023","volume":"3","author":"C Berghoff","year":"2020","unstructured":"Berghoff C, Neu M, Twickel AV (2020) Vulnerabilities of connectionist AI applications: evaluation and defense. Frontiers Big Data 3:23. https:\/\/doi.org\/10.3389\/fdata.2020.00023","journal-title":"Frontiers Big Data"},{"key":"4323_CR12","doi-asserted-by":"publisher","unstructured":"Newaz AI, Haque NI, Sikder AK, Rahman MA, Uluagac AS (2020) Adversarial attacks to machine learning-based smart healthcare systems. In: Proceeding of the 2020\u20132020 IEEE Global Communications Conference, pp 1\u20136. https:\/\/doi.org\/10.1109\/GLOBECOM42002.2020.9322472","DOI":"10.1109\/GLOBECOM42002.2020.9322472"},{"key":"4323_CR13","doi-asserted-by":"publisher","first-page":"107440","DOI":"10.1016\/j.compeleceng.2021.107440","volume":"96","author":"K Kumar","year":"2021","unstructured":"Kumar K, Nair S, Roy DG, Rajalingam B, Kumar RS (2021) Security and privacy-aware artificial intrusion detection system using federated machine learning. Comput Electr Eng 96:107440. https:\/\/doi.org\/10.1016\/j.compeleceng.2021.107440","journal-title":"Comput Electr Eng"},{"key":"4323_CR14","doi-asserted-by":"publisher","unstructured":"Ramanagopal MS, Anderson C, Vasudevan R, Johnson-Roberson M (2018) Failing to learn: autonomously identifying perception failures for Selfdriving cars. IEEE Robot Autom Lett 3(4):3860\u20133867. https:\/\/doi.org\/10.1109\/LRA.2018.2857402","DOI":"10.1109\/LRA.2018.2857402"},{"key":"4323_CR15","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1016\/j.cose.2018.07.015","volume":"78","author":"K Hyun","year":"2018","unstructured":"Hyun K, Yongchul K, Ki-Woong P, Hyunsoo Y, Choi D (2018) Friend-SafeEvasion Attack: An Adversarial Example That is Correctly Recognized by A Friendly Classifier. Comput Secur 78:380\u2013397. https:\/\/doi.org\/10.1016\/j.cose.2018.07.015","journal-title":"Comput Secur"},{"issue":"5","key":"4323_CR16","doi-asserted-by":"publisher","first-page":"1255","DOI":"10.13328\/j.cnki.jos.005951","volume":"31","author":"Z Wang","year":"2020","unstructured":"Wang Z, Yan M, Liu S, Chen J, Zhang D, Wu Z et al (2020) Survey on Testing of Deep Neural Networks. J Softw 31(5):1255\u20131275. https:\/\/doi.org\/10.13328\/j.cnki.jos.005951","journal-title":"J Softw"},{"key":"4323_CR17","doi-asserted-by":"publisher","unstructured":"Wang S Y, Zhang Z H, Sun J Z (2020) Test case prioritization based on coverage compaction. Journal of Xi\u2019an University of Posts and Telecommunications 03:82\u201387. https:\/\/doi.org\/10.13682\/j.issn.2095-6533.2020.03.014","DOI":"10.13682\/j.issn.2095-6533.2020.03.014"},{"key":"4323_CR18","doi-asserted-by":"publisher","first-page":"102749","DOI":"10.1016\/j.cose.2022.102749","volume":"118","author":"Z Wang","year":"2022","unstructured":"Wang Z, Zheng Y, Hai Z, Chang Y, Chen T (2022) Transferable adversarial examples can efficiently fool topic models. Comput Secur 118:102749. https:\/\/doi.org\/10.1016\/j.cose.2022.102749","journal-title":"Comput Secur"},{"key":"4323_CR19","doi-asserted-by":"publisher","unstructured":"Ma L, Juefei-Xu F, Zhang F, Sun J, Xue M, Li B et al (2018) Deepgauge: multi-granularity testing criteria for deep learning systems. In: Proceeding of the 2018 33rd IEEE\/ACM international conference on automated software engineering, pp 120\u2013131. https:\/\/doi.org\/10.1145\/3238147.3238202","DOI":"10.1145\/3238147.3238202"},{"issue":"3","key":"4323_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3398394","volume":"53","author":"A Serban","year":"2020","unstructured":"Serban A, Poll E, Visser J (2020) Adversarial examples on object recognition: a comprehensive survey. ACM Comput Surv 53(3):1\u201338. https:\/\/doi.org\/10.1145\/3398394","journal-title":"ACM Comput Surv"},{"issue":"9","key":"4323_CR21","doi-asserted-by":"publisher","first-page":"2805","DOI":"10.1109\/TNNLS.2018.2886017","volume":"30","author":"X Yuan","year":"2019","unstructured":"Yuan X, He P, Zhu Q, Li X (2019) Adversarial examples: attacks and defenses for deep learning. IEEE Trans Neural Netw Learn Syst 30(9):2805\u20132824. https:\/\/doi.org\/10.1109\/TNNLS.2018.2886017","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"8","key":"4323_CR22","doi-asserted-by":"publisher","first-page":"1886","DOI":"10.11897\/SP.J.1016.2019.01886","volume":"2","author":"S Zhang","year":"2019","unstructured":"Zhang S, Zuo X, Liu J (2019) The problem of the adversarial examples in deep learning. Chin J Comput 2(8):1886\u20131904. https:\/\/doi.org\/10.11897\/SP.J.1016.2019.01886","journal-title":"Chin J Comput"},{"key":"4323_CR23","doi-asserted-by":"publisher","unstructured":"Zhang J, Qian W, Nie R, Cao J, Xu D (2022) Generate adversarial examples by adaptive moment iterative fast gradient sign method. Appl Intell. https:\/\/doi.org\/10.1007\/s10489-022-03437-z","DOI":"10.1007\/s10489-022-03437-z"},{"key":"4323_CR24","doi-asserted-by":"publisher","first-page":"205766","DOI":"10.1109\/ACCESS.2020.3037329","volume":"8","author":"J Liu","year":"2020","unstructured":"Liu J, Tian Y, Zhang R, Sun Y, Wang C (2020) A two-stage generative adversarial networks with semantic content constraints for adversarial example generation. IEEE 8:205766\u2013205777. https:\/\/doi.org\/10.1109\/ACCESS.2020.3037329","journal-title":"IEEE"},{"key":"4323_CR25","doi-asserted-by":"publisher","first-page":"1289","DOI":"10.1007\/s10489-022-03838-0","volume":"52","author":"Z He","year":"2022","unstructured":"He Z, Lan X, Yuan J, Wen C (2022) Multi-layer noise reshaping and perceptual optimization for effective adversarial attack of images. Appl Intell 52:1289\u20131305. https:\/\/doi.org\/10.1007\/s10489-022-03838-0","journal-title":"Appl Intell"},{"key":"4323_CR26","doi-asserted-by":"publisher","first-page":"1038","DOI":"10.1109\/TIFS.2022.3156809","volume":"17","author":"C Li","year":"2022","unstructured":"Li C, Zhang X, Yin F, Liu C (2022) Decision-based adversarial attack with frequency Mixup. EEE Trans Inf Forensic Secur 17:1038\u20131052. https:\/\/doi.org\/10.1109\/TIFS.2022.3156809","journal-title":"EEE Trans Inf Forensic Secur"},{"key":"4323_CR27","doi-asserted-by":"publisher","unstructured":"Hayes J, Danezis G (2018) Learning universal adversarial perturbations with generative models. In: Proceeding of the 2018 IEEE security and privacy workshops, pp 43\u201349. https:\/\/doi.org\/10.1109\/SPW.2018.00015","DOI":"10.1109\/SPW.2018.00015"},{"issue":"11","key":"4323_CR28","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1145\/3361566","volume":"62","author":"K Pei","year":"2019","unstructured":"Pei K, Cao Y, Yang J, Jana S (2019) Deepxplore: automated Whitebox testing of deep learning systems. Commun ACM 62(11):137\u2013145. https:\/\/doi.org\/10.1145\/3361566","journal-title":"Commun ACM"},{"key":"4323_CR29","doi-asserted-by":"publisher","unstructured":"Ma L, Juefei-Xu F, Xue M, Li B, Li L, Liu Y, et al (2019) Deepct: tomographic combinatorial testing for deep learning systems. In: Proceeding of the 2019 IEEE 26th international conference on software analysis, pp 614\u2212618. https:\/\/doi.org\/10.1109\/SANER.2019.8668044","DOI":"10.1109\/SANER.2019.8668044"},{"key":"4323_CR30","doi-asserted-by":"publisher","unstructured":"Tian Y, Pei K, Jana S, Ray B (2018) DeepTest: automated testing of deep-neural-network-driven autonomous cars. In: Proceeding of the 2018 IEEE\/ACM 40th international conference on software engineering, pp 303\u2013314. https:\/\/doi.org\/10.1145\/3180155.3180220","DOI":"10.1145\/3180155.3180220"},{"key":"#cr-split#-4323_CR31.1","unstructured":"SudKul (2018) Self-driving-car Datasets.[updated 17 May 2018"},{"key":"#cr-split#-4323_CR31.2","unstructured":"cited 10 February 2022]. Available from: https:\/\/github.com\/udacity\/self-driving-car\/tree\/master\/datasets. Accessed 12 Nov\u00a02021"},{"key":"4323_CR32","doi-asserted-by":"publisher","unstructured":"Guo J, Jiang Y, Zhao Y, Chen Q, Sun J (2018) DLFuzz: differential fuzzing testing of deep learning systems. In: Proceeding of the 2018 26th ACM joint meeting on European software engineering Conf. And Symp. On the foundations of software engineering, pp 739\u2212743. https:\/\/doi.org\/10.1145\/3236024.3264835","DOI":"10.1145\/3236024.3264835"},{"key":"#cr-split#-4323_CR33.1","unstructured":"Le Cun Y, Cortes C, Burges C J (2018) Handwritten Digital Image Dataset MNIST. [updated 9 February 2018"},{"key":"#cr-split#-4323_CR33.2","unstructured":"cited 10 February 2022]. Available from: http:\/\/yann.lecun.com\/exdb\/mnist. Accessed 12 Nov\u00a02021"},{"key":"4323_CR34","unstructured":"An LF Image Database ImageNet. [updated 11 March 2021; cited 10 February 2022]. Available from: http:\/\/www.image-net.org. Accessed 12 Nov\u00a02021"},{"key":"4323_CR35","doi-asserted-by":"publisher","unstructured":"Feng Y, Shi Q, Gao X, Wan J, Fang C, Chen Z (2020) Deepgini: prioritizing massive tests to enhance the robustness of deep neural networks. In proceeding of the 29th ACM Sigsoft international symposium on software testing and analysis, pp.177-188. https:\/\/doi.org\/10.1145\/3395363.3397357","DOI":"10.1145\/3395363.3397357"},{"key":"4323_CR36","doi-asserted-by":"publisher","unstructured":"Tan S, Tan Z (2019) Improved LeNet-5 model based on handwritten numeral recognition. In: Proceeding of the 2019 Chinese control and decision conference, pp 6396\u20136399. https:\/\/doi.org\/10.1109\/CCDC.2019.8833112","DOI":"10.1109\/CCDC.2019.8833112"},{"key":"4323_CR37","doi-asserted-by":"publisher","unstructured":"Zhang X (2021) The AlexNet, LeNet-5 and VGG NET applied to CIFAR-10. In: Proceeding of the 2021 2nd international conference on big Data & Artificial Intelligence & software engineering, pp 414\u2013419. https:\/\/doi.org\/10.1109\/ICBASE.53849.2021.00083","DOI":"10.1109\/ICBASE.53849.2021.00083"},{"key":"4323_CR38","doi-asserted-by":"publisher","unstructured":"Mascarenhas S, Agarwal M (2021) A comparison between VGG16, VGG19 and ResNet50 architecture frameworks for image classification. In: Proceeding of the 2021 international conference on disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON), pp 96\u201399. https:\/\/doi.org\/10.1109\/CENTCON52345.2021.9687944","DOI":"10.1109\/CENTCON52345.2021.9687944"},{"issue":"2","key":"4323_CR39","doi-asserted-by":"publisher","first-page":"933","DOI":"10.1109\/TNSE.2020.2997359","volume":"8","author":"J Guo","year":"2021","unstructured":"Guo J, Zhao Y, Jiang Y, Song H, Jiang Y (2021) Coverage guided differential adversarial testing of deep learning systems. IEEE Trans Netw Sci Eng 8(2):933\u2013942. https:\/\/doi.org\/10.1109\/TNSE.2020.2997359","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"4323_CR40","doi-asserted-by":"publisher","unstructured":"Huang S (2020) Influence of different convolutional neural network settings on the performance of MNIST handwritten digits recognition. In: Proceeding of the 2020 international conference on artificial intelligence and education (ICAIE), pp 1\u20136. https:\/\/doi.org\/10.1109\/ICAIE50891.2020.00008","DOI":"10.1109\/ICAIE50891.2020.00008"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-022-04323-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-022-04323-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-022-04323-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T04:04:39Z","timestamp":1685592279000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-022-04323-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,28]]},"references-count":42,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["4323"],"URL":"https:\/\/doi.org\/10.1007\/s10489-022-04323-4","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"type":"print","value":"0924-669X"},{"type":"electronic","value":"1573-7497"}],"subject":[],"published":{"date-parts":[[2022,11,28]]},"assertion":[{"value":"3 November 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 November 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}