{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T04:21:23Z","timestamp":1765772483790,"version":"3.40.3"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T00:00:00Z","timestamp":1741219200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T00:00:00Z","timestamp":1741219200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100004731","name":"Zhejiang Provincial Natural Science Foundation","doi-asserted-by":"crossref","award":["LDQ23F020001"],"award-info":[{"award-number":["LDQ23F020001"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100014717","name":"National Outstanding Youth Science Fund Project of National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072406","62103374"],"award-info":[{"award-number":["62072406","62103374"]}],"id":[{"id":"10.13039\/100014717","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100022963","name":"Key Research and Development Program of Zhejiang Province","doi-asserted-by":"publisher","award":["2022C01018"],"award-info":[{"award-number":["2022C01018"]}],"id":[{"id":"10.13039\/100022963","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Autom Softw Eng"],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1007\/s10515-025-00498-5","type":"journal-article","created":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T07:40:04Z","timestamp":1741246804000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["BallPri: test cases prioritization for deep neuron networks via tolerant ball in variable space"],"prefix":"10.1007","volume":"32","author":[{"given":"Chengyu","family":"Jia","sequence":"first","affiliation":[]},{"given":"Jinyin","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xiaohao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Haibin","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Luxin","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,6]]},"reference":[{"key":"498_CR1","doi-asserted-by":"crossref","unstructured":"Al-Qadasi, H., Wu, C., Falcone, Y., Bensalem, S.: Deepabstraction: 2-level prioritization for unlabeled test inputs in deep neural networks. In: 2022 IEEE International Conference On Artificial Intelligence Testing (AITest), pp. 64\u201371. IEEE (2022)","DOI":"10.1109\/AITest55621.2022.00018"},{"key":"498_CR2","doi-asserted-by":"publisher","unstructured":"Benz, P., Zhang, C., Imtiaz, T., Kweon, I.S.: Double targeted universal adversarial perturbations. In: Ishikawa, H., Liu, C., Pajdla, T., Shi, J. (eds.) Computer Vision - ACCV 2020\u201415th Asian Conference on Computer Vision, Kyoto, Japan, November 30\u2013December 4, 2020, Revised Selected Papers, Part IV. Lecture Notes in Computer Science, vol. 12625, pp. 284\u2013300. Springer, Kyoto, Japan (2020). https:\/\/doi.org\/10.1007\/978-3-030-69538-5_18","DOI":"10.1007\/978-3-030-69538-5_18"},{"key":"498_CR3","doi-asserted-by":"crossref","unstructured":"Byun, T., Sharma, V., Vijayakumar, A., Rayadurgam, S., Cofer, D.: Input prioritization for testing neural networks. In: 2019 IEEE International Conference On Artificial Intelligence Testing (AITest), pp. 63\u201370. IEEE (2019)","DOI":"10.1109\/AITest.2019.000-6"},{"key":"498_CR4","doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D.: Towards evaluating the robustness of neural networks. In: 2017 IEEE Symposium on Security and Privacy (SP). IEEE (2017)","DOI":"10.1109\/SP.2017.49"},{"issue":"2","key":"498_CR5","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/s10515-023-00396-8","volume":"30","author":"J Chen","year":"2023","unstructured":"Chen, J., Ge, J., Zheng, H.: Actgraph: prioritization of test cases based on deep neural network activation graph. Autom. Softw. Eng. 30(2), 28 (2023)","journal-title":"Autom. Softw. Eng."},{"key":"498_CR6","doi-asserted-by":"crossref","unstructured":"Dong, Y., Liao, F., Pang, T., Su, H., Zhu, J., Hu, X., Li, J.: Boosting adversarial attacks with momentum. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 9185\u20139193 (2018)","DOI":"10.1109\/CVPR.2018.00957"},{"issue":"2","key":"498_CR7","first-page":"1","volume":"4","author":"D Duarte","year":"2018","unstructured":"Duarte, D., Nex, F., Kerle, N., Vosselman, G.: Satellite image classification of building damages using airborne and satellite image samples in a deep learning approach. ISPRS Ann. Photogramm. Remote Sens. Spat. Inf. Sci. 4(2), 1\u20139 (2018)","journal-title":"ISPRS Ann. Photogramm. Remote Sens. Spat. Inf. Sci."},{"key":"498_CR8","doi-asserted-by":"crossref","unstructured":"Feng, Y., Shi, Q., Gao, X., Wan, J., Fang, C., Chen, Z.: Deepgini: prioritizing massive tests to enhance the robustness of deep neural networks. In: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 177\u2013188 (2020)","DOI":"10.1145\/3395363.3397357"},{"key":"498_CR9","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. In: Bengio, Y., LeCun, Y. (eds.) 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, May 7\u20139, 2015, Conference Track Proceedings, pp. 7\u20139 (2015). arxiv: 1412.6572"},{"key":"498_CR10","doi-asserted-by":"crossref","unstructured":"Guo, J., Jiang, Y., Zhao, Y., Chen, Q., Sun, J.: Dlfuzz: differential fuzzing testing of deep learning systems. In: Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 739\u2013743 (2018)","DOI":"10.1145\/3236024.3264835"},{"key":"498_CR11","doi-asserted-by":"crossref","unstructured":"Harel-Canada, F., Wang, L., Gulzar, M.A., Gu, Q., Kim, M.: Is neuron coverage a meaningful measure for testing deep neural networks? In: Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 851\u2013862 (2020)","DOI":"10.1145\/3368089.3409754"},{"key":"498_CR12","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"issue":"18","key":"498_CR13","doi-asserted-by":"publisher","first-page":"1768","DOI":"10.1080\/10447318.2020.1785693","volume":"36","author":"J Hong","year":"2020","unstructured":"Hong, J.: Why is artificial intelligence blamed more? Analysis of faulting artificial intelligence for self-driving car accidents in experimental settings. Int. J. Hum. Comput. Interact. 36(18), 1768\u20131774 (2020). https:\/\/doi.org\/10.1080\/10447318.2020.1785693","journal-title":"Int. J. Hum. Comput. Interact."},{"key":"498_CR14","doi-asserted-by":"crossref","unstructured":"Kim, J., Feldt, R., Yoo, S.: Guiding deep learning system testing using surprise adequacy. In: 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE), pp. 1039\u20131049. IEEE (2019)","DOI":"10.1109\/ICSE.2019.00108"},{"issue":"6","key":"498_CR15","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/3065386","volume":"60","author":"A Krizhevsky","year":"2017","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. Commun. ACM 60(6), 84\u201390 (2017). https:\/\/doi.org\/10.1145\/3065386","journal-title":"Commun. ACM"},{"key":"498_CR16","unstructured":"Kurakin, A., Goodfellow, I.J., Bengio, S.: Adversarial examples in the physical world. In: 5th International Conference on Learning Representations, ICLR 2017, Toulon, France, April 24\u201326, 2017, Workshop Track Proceedings. OpenReview.net, Toulon, France (2017). https:\/\/openreview.net\/forum?id=HJGU3Rodl"},{"issue":"11","key":"498_CR17","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y LeCun","year":"1998","unstructured":"LeCun, Y., Bottou, L., Bengio, Y., Haffner, P.: Gradient-based learning applied to document recognition. Proc. IEEE 86(11), 2278\u20132324 (1998). https:\/\/doi.org\/10.1109\/5.726791","journal-title":"Proc. IEEE"},{"key":"498_CR18","doi-asserted-by":"crossref","unstructured":"Lee, S., Cha, S., Lee, D., Oh, H.: Effective white-box testing of deep neural networks with adaptive neuron-selection strategy. In: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 165\u2013176 (2020)","DOI":"10.1145\/3395363.3397346"},{"key":"498_CR19","unstructured":"Li, C., Ma, X., Jiang, B., Li, X., Zhang, X., Liu, X., Cao, Y., Kannan, A., Zhu, Z.: Deep speaker: an end-to-end neural speaker embedding system, pp. 1\u20138 (2017). CoRR arxiv: 1705.02304"},{"key":"498_CR20","first-page":"20874","volume":"34","author":"Y Li","year":"2021","unstructured":"Li, Y., Li, M., Lai, Q., Liu, Y., Xu, Q.: Testrank: Bringing order into unlabeled test instances for deep learning tasks. Adv. Neural Inf. Process. Syst. 34, 20874\u201320886 (2021)","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"498_CR21","doi-asserted-by":"crossref","unstructured":"Ma, L., Juefei-Xu, F., Zhang, F., Sun, J., Xue, M., Li, B., Chen, C., Su, T., Li, L., Liu, Y., et al.: Deepgauge: multi-granularity testing criteria for deep learning systems. In: Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering, pp. 120\u2013131 (2018)","DOI":"10.1145\/3238147.3238202"},{"issue":"2","key":"498_CR22","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1145\/3417330","volume":"30","author":"W Ma","year":"2021","unstructured":"Ma, W., Papadakis, M., Tsakmalis, A., Cordy, M., Traon, Y.L.: Test selection for deep learning systems. ACM Trans. Softw. Eng. Methodol. 30(2), 13\u201311322 (2021). https:\/\/doi.org\/10.1145\/3417330","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"498_CR23","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. In: International Conference on Learning Representations (2018)"},{"key":"498_CR24","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli, S.-M., Fawzi, A., Frossard, P.: Deepfool: a simple and accurate method to fool deep neural networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2574\u20132582 (2016)","DOI":"10.1109\/CVPR.2016.282"},{"issue":"10","key":"498_CR25","doi-asserted-by":"publisher","first-page":"3683","DOI":"10.3390\/s22103683","volume":"22","author":"A Mukhamadiyev","year":"2022","unstructured":"Mukhamadiyev, A., Khujayarov, I., Djuraev, O., Cho, J.: Automatic speech recognition method based on deep learning approaches for Uzbek language. Sensors 22(10), 3683 (2022). https:\/\/doi.org\/10.3390\/s22103683","journal-title":"Sensors"},{"key":"498_CR26","unstructured":"Nasery, A., Thakur, S., Piratla, V., De, A., Sarawagi, S.: Training for the future: a simple gradient interpolation loss to generalize along time. In: Ranzato, M., Beygelzimer, A., Dauphin, Y.N., Liang, P., Vaughan, J.W. (eds.) Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, NeurIPS 2021, December 6-14, 2021, Virtual, pp. 19198\u201319209 (2021). https:\/\/proceedings.neurips.cc\/paper\/2021\/hash\/a02ef8389f6d40f84b50504613117f88-Abstract.html"},{"key":"498_CR27","unstructured":"Odena, A., Olsson, C., Andersen, D., Goodfellow, I.: Tensorfuzz: debugging neural networks with coverage-guided fuzzing. In: International Conference on Machine Learning, pp. 4901\u20134911. PMLR (2019)"},{"key":"498_CR28","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P., Jha, S., Fredrikson, M., Celik, Z.B., Swami, A.: The limitations of deep learning in adversarial settings. In: 2016 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 372\u2013387. IEEE (2016)","DOI":"10.1109\/EuroSP.2016.36"},{"key":"498_CR29","doi-asserted-by":"crossref","unstructured":"Pavlitskaya, S., Y\u0131km\u0131\u015f, \u015e., Z\u00f6llner, J.M.: Is neuron coverage needed to make person detection more robust? In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 2889\u20132897 (2022)","DOI":"10.1109\/CVPRW56347.2022.00326"},{"issue":"11","key":"498_CR30","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1145\/3361566","volume":"62","author":"K Pei","year":"2019","unstructured":"Pei, K., Cao, Y., Yang, J., Jana, S.: Deepxplore: automated whitebox testing of deep learning systems. Commun. ACM 62(11), 137\u2013145 (2019). https:\/\/doi.org\/10.1145\/3361566","journal-title":"Commun. ACM"},{"key":"498_CR31","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. In: Bengio, Y., LeCun, Y. (eds.) 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, May 7\u20139, 2015, Conference Track Proceedings (2015). arxiv: 1409.1556"},{"issue":"6","key":"498_CR32","doi-asserted-by":"publisher","first-page":"2335","DOI":"10.1007\/s00530-022-00960-4","volume":"28","author":"Q Teng","year":"2022","unstructured":"Teng, Q., Liu, Z., Song, Y., Han, K., Lu, Y.: A survey on the interpretability of deep learning in medical diagnosis. Multimed. Syst. 28(6), 2335\u20132355 (2022). https:\/\/doi.org\/10.1007\/s00530-022-00960-4","journal-title":"Multimed. Syst."},{"key":"498_CR33","doi-asserted-by":"crossref","unstructured":"Tian, Y., Pei, K., Jana, S., Ray, B.: Deeptest: automated testing of deep-neural-network-driven autonomous cars. In: Proceedings of the 40th International Conference on Software Engineering, pp. 303\u2013314 (2018)","DOI":"10.1145\/3180155.3180220"},{"issue":"11","key":"498_CR34","first-page":"1","volume":"9","author":"L Van der Maaten","year":"2008","unstructured":"Van der Maaten, L., Hinton, G.: Visualizing data using t-sne. J. Mach. Learn. Res. 9(11), 1\u201327 (2008)","journal-title":"J. Mach. Learn. Res."},{"key":"498_CR35","doi-asserted-by":"crossref","unstructured":"Wang, Z., You, H., Chen, J., Zhang, Y., Dong, X., Zhang, W.: Prioritizing test inputs for deep neural networks via mutation analysis. In: 2021 IEEE\/ACM 43rd International Conference on Software Engineering (ICSE), pp. 397\u2013409. IEEE (2021)","DOI":"10.1109\/ICSE43902.2021.00046"},{"key":"498_CR36","doi-asserted-by":"crossref","unstructured":"Wei, Z., Wang, H., Ashraf, I., Chan, W.: Predictive mutation analysis of test case prioritization for deep neural networks. In: 2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS), pp. 682\u2013693. IEEE (2022)","DOI":"10.1109\/QRS57517.2022.00074"},{"key":"498_CR37","doi-asserted-by":"crossref","unstructured":"Weiss, M., Tonella, P.: Simple techniques work surprisingly well for neural network test prioritization and active learning (replicability study). In: Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 139\u2013150 (2022)","DOI":"10.1145\/3533767.3534375"},{"key":"498_CR38","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.neucom.2021.08.155","volume":"489","author":"L Wen","year":"2022","unstructured":"Wen, L., Jo, K.: Deep learning-based perception systems for autonomous driving: a comprehensive survey. Neurocomputing 489, 255\u2013270 (2022). https:\/\/doi.org\/10.1016\/j.neucom.2021.08.155","journal-title":"Neurocomputing"},{"key":"498_CR39","doi-asserted-by":"crossref","unstructured":"Wicker, M., Huang, X., Kwiatkowska, M.: Feature-guided black-box safety testing of deep neural networks. In: Tools and Algorithms for the Construction and Analysis of Systems: 24th International Conference, TACAS 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14\u201320, 2018, Proceedings, Part I 24, pp. 408\u2013426. Springer (2018)","DOI":"10.1007\/978-3-319-89960-2_22"},{"key":"498_CR40","doi-asserted-by":"crossref","unstructured":"Xie, X., Ma, L., Juefei-Xu, F., Xue, M., Chen, H., Liu, Y., Zhao, J., Li, B., Yin, J., See, S.: Deephunter: a coverage-guided fuzz testing framework for deep neural networks. In: Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 146\u2013157 (2019)","DOI":"10.1145\/3293882.3330579"},{"key":"498_CR41","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2021.102761","volume":"215","author":"R Yan","year":"2022","unstructured":"Yan, R., Chen, Y., Gao, H., Yan, J.: Test case prioritization with neuron valuation based pattern. Sci. Comput. Program. 215, 102761 (2022)","journal-title":"Sci. Comput. Program."},{"issue":"6","key":"498_CR42","doi-asserted-by":"publisher","first-page":"4980","DOI":"10.1109\/JIOT.2020.3034899","volume":"8","author":"X Yang","year":"2021","unstructured":"Yang, X., Liu, W., Zhang, S., Liu, W., Tao, D.: Targeted attention attack on deep learning models in road sign recognition. IEEE Internet Things J. 8(6), 4980\u20134990 (2021). https:\/\/doi.org\/10.1109\/JIOT.2020.3034899","journal-title":"IEEE Internet Things J."},{"key":"498_CR43","doi-asserted-by":"crossref","unstructured":"You, H., Wang, Z., Chen, J., Liu, S., Li, S.: Regression fuzzing for deep learning systems. In: 2023 IEEE\/ACM 45th International Conference on Software Engineering (ICSE), pp. 82\u201394. IEEE (2023)","DOI":"10.1109\/ICSE48619.2023.00019"},{"key":"498_CR44","doi-asserted-by":"crossref","unstructured":"Zhang, F., Hu, X., Ma, L., Zhao, J.: Deeprover: A query-efficient blackbox attack for deep neural networks. In: Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 1384\u20131394 (2023)","DOI":"10.1145\/3611643.3616370"},{"key":"498_CR45","doi-asserted-by":"crossref","unstructured":"Zheng, H., Chen, J., Jin, H.: Certpri: certifiable prioritization for deep neural networks via movement cost in feature space. In: 2023 38th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 1\u201313. IEEE (2023)","DOI":"10.1109\/ASE56229.2023.00126"}],"container-title":["Automated Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-025-00498-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10515-025-00498-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-025-00498-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T01:38:24Z","timestamp":1743903504000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10515-025-00498-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,6]]},"references-count":45,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,5]]}},"alternative-id":["498"],"URL":"https:\/\/doi.org\/10.1007\/s10515-025-00498-5","relation":{},"ISSN":["0928-8910","1573-7535"],"issn-type":[{"type":"print","value":"0928-8910"},{"type":"electronic","value":"1573-7535"}],"subject":[],"published":{"date-parts":[[2025,3,6]]},"assertion":[{"value":"29 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 February 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 March 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration"}},{"value":"The authors declare no competing interests","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"29"}}