{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T15:12:38Z","timestamp":1767021158443,"version":"3.48.0"},"reference-count":79,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T00:00:00Z","timestamp":1766966400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T00:00:00Z","timestamp":1766966400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100008463","name":"Universitas Airlangga","doi-asserted-by":"publisher","award":["316\/UN3.LPPM\/PT.01.03\/2024"],"award-info":[{"award-number":["316\/UN3.LPPM\/PT.01.03\/2024"]}],"id":[{"id":"10.13039\/501100008463","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008463","name":"Universitas Airlangga","doi-asserted-by":"publisher","award":["316\/UN3.LPPM\/PT.01.03\/2024"],"award-info":[{"award-number":["316\/UN3.LPPM\/PT.01.03\/2024"]}],"id":[{"id":"10.13039\/501100008463","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008463","name":"Universitas Airlangga","doi-asserted-by":"publisher","award":["316\/UN3.LPPM\/PT.01.03\/2024"],"award-info":[{"award-number":["316\/UN3.LPPM\/PT.01.03\/2024"]}],"id":[{"id":"10.13039\/501100008463","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Artif Intell"],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>The integration of artificial intelligence (AI) and machine learning (ML) has improved the efficiency and accuracy of testing processes. Deep learning (DL) is increasingly used in software testing to improve accuracy, automation, and efficiency, especially in complex testing tasks. No comprehensive review has examined the use of deep learning in software testing. This study presents a bibliometric analysis to examine has examined the use of deep learning in software testing and to map the current research landscape in this field. This bibliometric review highlights how DL contributes to process innovation in software testing and highlights directions for future research. The search strategy was used to obtain relevant papers from the Scopus database; 737 relevant documents were retrieved based on defined inclusion and exclusion criteria, with the search conducted on July 27, 2024. The analysis focuses on publication trends, prolific authors, co-occurrence of keywords, collaboration networks, and thematic evolution. The results show an increasing trend in publications since 2017, dominated by themes such as fault prediction, code analysis, and automated testing frameworks. Two main research directions emerged: applying DL to support testing activities and testing DL-based systems. However, areas such as model-based testing, exploratory testing, and testing under extreme conditions remain underexplored. This study offers an overview of how DL contributes in software testing. The study also highlights collaboration patterns and thematic developments, offering valuable insights for researchers and practitioners. The findings serve as a roadmap for future research to enhance software quality through deep learning.<\/jats:p>","DOI":"10.1007\/s44163-025-00596-z","type":"journal-article","created":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T15:07:37Z","timestamp":1767020857000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Mapping the landscape of deep learning in software testing: a bibliometric analysis"],"prefix":"10.1007","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0622-3374","authenticated-orcid":false,"given":"Indra Kharisma","family":"Raharjana","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0002-6681-0236","authenticated-orcid":false,"given":"Oktavia Intifada","family":"Husna","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0411-4940","authenticated-orcid":false,"given":"Eva","family":"Hariyanti","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4333-7853","authenticated-orcid":false,"given":"Shukor Sanim Mohd","family":"Fauzi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,29]]},"reference":[{"key":"596_CR1","unstructured":"Hambling B, Morgan P, Samaroo A, Thompson G, Williams P. Software testing: an ISTQB-BCS certified tester foundation guide, 3rd ed (2015)."},{"key":"596_CR2","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.infsof.2016.09.002","volume":"80","author":"V Garousi","year":"2016","unstructured":"Garousi V, M\u00e4ntyl\u00e4 MV. A systematic literature review of literature reviews in software testing. Inf Softw Technol. 2016;80:195\u2013216. https:\/\/doi.org\/10.1016\/j.infsof.2016.09.002.","journal-title":"Inf Softw Technol"},{"key":"596_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2020.106321","volume":"126","author":"V Garousi","year":"2020","unstructured":"Garousi V, Bauer S, Felderer M. Nlp-assisted software testing: a systematic mapping of the literature. Inf Softw Technol. 2020;126:106321. https:\/\/doi.org\/10.1016\/j.infsof.2020.106321.","journal-title":"Inf Softw Technol"},{"key":"596_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2023.107325","volume":"164","author":"A Abo-eleneen","year":"2023","unstructured":"Abo-eleneen A, Palliyali A, Catal C. The role of reinforcement learning in software testing. Inf Softw Technol. 2023;164:107325. https:\/\/doi.org\/10.1016\/j.infsof.2023.107325.","journal-title":"Inf Softw Technol"},{"key":"596_CR5","doi-asserted-by":"publisher","DOI":"10.1145\/3505243","author":"Y Yang","year":"2022","unstructured":"Yang Y, Xia X, Lo D, Grundy J. A survey on deep learning for software engineering. ACM Comput Surv. 2022. https:\/\/doi.org\/10.1145\/3505243.","journal-title":"ACM Comput Surv"},{"key":"596_CR6","doi-asserted-by":"publisher","unstructured":"Ferreira F, Silva LL, Valente MT. Software engineering meets deep learning: a mapping study. In: Proceedings of the ACM symposium on applied computing; 2021. p. 1542\u20139. https:\/\/doi.org\/10.1145\/3412841.3442029.","DOI":"10.1145\/3412841.3442029"},{"key":"596_CR7","doi-asserted-by":"publisher","DOI":"10.1145\/3485275","author":"C Watson","year":"2022","unstructured":"Watson C, Cooper N, Palacio DN, Moran K, Poshyvanyk D. A systematic literature review on the use of deep learning in software engineering research. ACM Trans Softw Eng Methodol. 2022. https:\/\/doi.org\/10.1145\/3485275.","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"596_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-022-00344-y","author":"M Mahdieh","year":"2022","unstructured":"Mahdieh M, Mirian-Hosseinabadi SH, Mahdieh M. Test case prioritization using test case diversification and fault-proneness estimations. Autom Softw Eng. 2022. https:\/\/doi.org\/10.1007\/s10515-022-00344-y.","journal-title":"Autom Softw Eng"},{"key":"596_CR9","doi-asserted-by":"publisher","first-page":"78658","DOI":"10.1109\/ACCESS.2021.3083060","volume":"9","author":"AB Nassif","year":"2021","unstructured":"Nassif AB, Talib MA, Nasir Q, Dakalbab FM. Machine learning for anomaly detection: a systematic review. IEEE Access. 2021;9:78658\u2013700. https:\/\/doi.org\/10.1109\/ACCESS.2021.3083060.","journal-title":"IEEE Access"},{"key":"596_CR10","doi-asserted-by":"publisher","unstructured":"Zhang X, Xie X, Ma L, Du X, Hu Q, Liu Y, et al. Towards characterizing adversarial defects of deep learning software from the lens of uncertainty. In: Proceedings\u2014international conference on software engineering; 2020. p. 739\u201351. https:\/\/doi.org\/10.1145\/3377811.3380368.","DOI":"10.1145\/3377811.3380368"},{"key":"596_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103009","volume":"179","author":"H Hanif","year":"2021","unstructured":"Hanif H, Md Nasir MHN, Ab Razak MF, Firdaus A, Anuar NB. The rise of software vulnerability: taxonomy of software vulnerabilities detection and machine learning approaches. J Netw Comput Appl. 2021;179:103009. https:\/\/doi.org\/10.1016\/j.jnca.2021.103009.","journal-title":"J Netw Comput Appl"},{"key":"596_CR12","doi-asserted-by":"publisher","unstructured":"Moghadam MH, Saadatmand M, Borg M, Bohlin M, Lisper B. Poster: performance testing driven by reinforcement learning. In: 2020 IEEE 13th international conference on software testing, validation and verification (ICST). IEEE; 2020. pp. 402\u20135. https:\/\/doi.org\/10.1109\/ICST46399.2020.00048.","DOI":"10.1109\/ICST46399.2020.00048"},{"key":"596_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2023.107195","volume":"158","author":"D Siahaan","year":"2023","unstructured":"Siahaan D, Raharjana IK, Fatichah C. User story extraction from natural language for requirements elicitation: identify software-related information from online news. Inf Softw Technol. 2023;158:107195. https:\/\/doi.org\/10.1016\/j.infsof.2023.107195.","journal-title":"Inf Softw Technol"},{"key":"596_CR14","doi-asserted-by":"publisher","unstructured":"Islam M, Khan F, Alam S, Hasan M. Artificial Intelligence in software testing: a systematic review. In: TENCON 2023\u20142023 IEEE region 10 conference (TENCON); 2023. p. 524\u20139. https:\/\/doi.org\/10.1109\/TENCON58879.2023.10322349.","DOI":"10.1109\/TENCON58879.2023.10322349"},{"key":"596_CR15","doi-asserted-by":"publisher","DOI":"10.3390\/math10173120","author":"A Abdu","year":"2022","unstructured":"Abdu A, Zhai Z, Algabri R, Abdo HA, Hamad K, Al-antari MA. Deep learning-based software defect prediction via semantic key features of source code\u2014systematic survey. Mathematics. 2022. https:\/\/doi.org\/10.3390\/math10173120.","journal-title":"Mathematics"},{"key":"596_CR16","doi-asserted-by":"publisher","DOI":"10.3390\/jlpea12030037","author":"F Barchi","year":"2022","unstructured":"Barchi F, Parisi E, Bartolini A, Acquaviva A. Deep learning approaches to source code analysis for optimization of heterogeneous systems: recent results, challenges and opportunities. J Low Power Electron Appl. 2022. https:\/\/doi.org\/10.3390\/jlpea12030037.","journal-title":"J Low Power Electron Appl"},{"key":"596_CR17","doi-asserted-by":"publisher","first-page":"731","DOI":"10.1007\/978-3-030-28005-5_57","volume-title":"Systems, software and services process improvement","author":"S Cunningham","year":"2019","unstructured":"Cunningham S, Gambo J, Lawless A, Moore D, Yilmaz M, Clarke PM, et al. Software testing: a changing career. In: Walker A, O\u2019Connor RV, Messnarz R, editors., et al., Systems, software and services process improvement. Cham: Springer International Publishing; 2019. p. 731\u201342."},{"key":"596_CR18","doi-asserted-by":"publisher","first-page":"246","DOI":"10.3991\/ijim.v14i11.13269","volume":"14","author":"S Alsaqqa","year":"2020","unstructured":"Alsaqqa S, Sawalha S, Abdel-Nabi H. Agile software development: methodologies and trends. Int J Interact Mob Technol (IJIM). 2020;14:246\u201370. https:\/\/doi.org\/10.3991\/ijim.v14i11.13269.","journal-title":"Int J Interact Mob Technol (IJIM)"},{"key":"596_CR19","doi-asserted-by":"publisher","DOI":"10.1145\/3452383.3452388","author":"MN Zafar","year":"2021","unstructured":"Zafar MN, Afzal W, Enoiu E, Stratis A, Arrieta A, Sagardui G. Model-based testing in practice: an industrial case study using GraphWalker. ACM Int Conf Proc Ser. 2021. https:\/\/doi.org\/10.1145\/3452383.3452388.","journal-title":"ACM Int Conf Proc Ser"},{"key":"596_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2021.111032","volume":"180","author":"V Garousi","year":"2021","unstructured":"Garousi V, Kele\u015f AB, Balaman Y, G\u00fcler Z\u00d6, Arcuri A. Model-based testing in practice: an experience report from the web applications domain. J Syst Softw. 2021;180:111032. https:\/\/doi.org\/10.1016\/j.jss.2021.111032.","journal-title":"J Syst Softw"},{"key":"596_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100379","volume":"40","author":"S Dong","year":"2021","unstructured":"Dong S, Wang P, Abbas K. A survey on deep learning and its applications. Comput Sci Rev. 2021;40:100379. https:\/\/doi.org\/10.1016\/j.cosrev.2021.100379.","journal-title":"Comput Sci Rev"},{"key":"596_CR22","unstructured":"Mohanta SK, Mohapatra AG, Mohanty A, Nayak S. Deep learning is a state-of-the-art approach to artificial intelligence. Deep learning concepts in operations research. 1st Edition. New York: Auerbach Publications; 2024."},{"key":"596_CR23","doi-asserted-by":"publisher","DOI":"10.3390\/a15020071","author":"H Abdel-Jaber","year":"2022","unstructured":"Abdel-Jaber H, Devassy D, Al Salam A, Hidaytallah L, EL-Amir M. A review of deep learning algorithms and their applications in healthcare. Algorithms. 2022. https:\/\/doi.org\/10.3390\/a15020071.","journal-title":"Algorithms"},{"key":"596_CR24","doi-asserted-by":"publisher","unstructured":"Mahapatra S, Mishra S. Usage of machine learning in software testing. In: Automated software engineering: a deep learning-based approach. Cham: Springer; 2020. p. 39\u201354. https:\/\/doi.org\/10.1007\/978-3-030-38006-9_3.","DOI":"10.1007\/978-3-030-38006-9_3"},{"key":"596_CR25","doi-asserted-by":"publisher","unstructured":"Velankar MR, Mahalle PN, Shinde GR. Rethinking machine learning and deep learning. In: Cognitive computing for machine thinking. Singapore: Springer; 2024. p. 25\u201341. https:\/\/doi.org\/10.1007\/978-981-97-0452-1_3.","DOI":"10.1007\/978-981-97-0452-1_3"},{"key":"596_CR26","doi-asserted-by":"publisher","unstructured":"Pramod A, Naicker HS, Tyagi AK. Machine learning and deep learning: open issues and future research directions for the next 10 years. In: Computational analysis and deep learning for medical care. John Wiley & Sons, Ltd; 2021. p. 463\u201390. https:\/\/doi.org\/10.1002\/9781119785750.ch18.","DOI":"10.1002\/9781119785750.ch18"},{"key":"596_CR27","doi-asserted-by":"publisher","unstructured":"Rebou\u00e7as Serpa Y, Augusto Pires L, Formico Rodrigues MA. Milestones and new frontiers in deep learning. In: 2019 32nd SIBGRAPI conference on graphics, patterns and images tutorials (SIBGRAPI-T); 2019. p. 22\u201335. https:\/\/doi.org\/10.1109\/SIBGRAPI-T.2019.00008.","DOI":"10.1109\/SIBGRAPI-T.2019.00008"},{"key":"596_CR28","first-page":"113","volume":"3","author":"A Mumuni","year":"2025","unstructured":"Mumuni A, Mumuni F. Automated data processing and feature engineering for deep learning and big data applications: a survey. J Inf Intell. 2025;3:113\u201353.","journal-title":"J Inf Intell"},{"key":"596_CR29","doi-asserted-by":"publisher","unstructured":"Dai E, Shu K, Sun Y, Wang S. Labeled data generation with inexact supervision. In: Proceedings of the ACM SIGKDD international conference on knowledge discovery and data mining; 2021. p. 218\u201326. https:\/\/doi.org\/10.1145\/3447548.3467306.","DOI":"10.1145\/3447548.3467306"},{"key":"596_CR30","doi-asserted-by":"publisher","DOI":"10.1145\/3578938","author":"G Menghani","year":"2023","unstructured":"Menghani G. Efficient deep learning: a survey on making deep learning models smaller, faster, and better. ACM Comput Surv. 2023. https:\/\/doi.org\/10.1145\/3578938.","journal-title":"ACM Comput Surv"},{"key":"596_CR31","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-021-00492-0","author":"C Shorten","year":"2021","unstructured":"Shorten C, Khoshgoftaar TM, Furht B. Text data augmentation for deep learning. J Big Data. 2021. https:\/\/doi.org\/10.1186\/s40537-021-00492-0.","journal-title":"J Big Data"},{"key":"596_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.122666","volume":"241","author":"S Islam","year":"2024","unstructured":"Islam S, Elmekki H, Elsebai A, Bentahar J, Drawel N, Rjoub G, et al. A comprehensive survey on applications of transformers for deep learning tasks. Expert Syst Appl. 2024;241:122666.","journal-title":"Expert Syst Appl"},{"key":"596_CR33","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1007\/s42979-021-00815-1","volume":"2","author":"IH Sarker","year":"2021","unstructured":"Sarker IH. Deep learning: a comprehensive overview on techniques, taxonomy, applications and research directions. SN Comput Sci. 2021;2:420. https:\/\/doi.org\/10.1007\/s42979-021-00815-1.","journal-title":"SN Comput Sci"},{"key":"596_CR34","doi-asserted-by":"publisher","first-page":"36538","DOI":"10.1109\/ACCESS.2022.3163384","volume":"10","author":"AA Abdullah","year":"2022","unstructured":"Abdullah AA, Hassan MM, Mustafa YT. A review on Bayesian deep learning in healthcare: applications and challenges. IEEE Access. 2022;10:36538\u201362. https:\/\/doi.org\/10.1109\/ACCESS.2022.3163384.","journal-title":"IEEE Access"},{"key":"596_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2024.128740","volume":"613","author":"Q Xia","year":"2025","unstructured":"Xia Q, Zheng H, Zou H, Luo D, Tang H, Li L, et al. A comprehensive review of deep learning for medical image segmentation. Neurocomputing. 2025;613:128740.","journal-title":"Neurocomputing"},{"key":"596_CR36","doi-asserted-by":"publisher","DOI":"10.3390\/app131810521","author":"H Zhang","year":"2023","unstructured":"Zhang H, Qie Y. Applying deep learning to medical imaging: a review. Appl Sci. 2023. https:\/\/doi.org\/10.3390\/app131810521.","journal-title":"Appl Sci"},{"key":"596_CR37","doi-asserted-by":"publisher","first-page":"5893","DOI":"10.1007\/s11042-023-15805-z","volume":"83","author":"SA Ajagbe","year":"2024","unstructured":"Ajagbe SA, Adigun MO. Deep learning techniques for detection and prediction of pandemic diseases: a systematic literature review. Multimed Tools Appl. 2024;83:5893\u2013927. https:\/\/doi.org\/10.1007\/s11042-023-15805-z.","journal-title":"Multimed Tools Appl"},{"key":"596_CR38","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12194119","author":"Y Yue","year":"2023","unstructured":"Yue Y, Peng Y, Wang D. Deep learning short text sentiment analysis based on improved particle swarm optimization. Electronics. 2023. https:\/\/doi.org\/10.3390\/electronics12194119.","journal-title":"Electronics"},{"key":"596_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2024.108231","volume":"133","author":"D Tsirmpas","year":"2024","unstructured":"Tsirmpas D, Gkionis I, Papadopoulos GTh, Mademlis I. Neural natural language processing for long texts: a survey on classification and summarization. Eng Appl Artif Intell. 2024;133:108231.","journal-title":"Eng Appl Artif Intell"},{"key":"596_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2024.100686","volume":"54","author":"AK Dogra","year":"2024","unstructured":"Dogra AK, Sharma V, Sohal H. A survey of deep learning techniques for detecting and recognizing objects in complex environments. Comput Sci Rev. 2024;54:100686.","journal-title":"Comput Sci Rev"},{"key":"596_CR41","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2024.128102","volume":"598","author":"Z Li","year":"2024","unstructured":"Li Z, Dong Y, Shen L, Liu Y, Pei Y, Yang H, et al. Development and challenges of object detection: a survey. Neurocomputing. 2024;598:128102.","journal-title":"Neurocomputing"},{"key":"596_CR42","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1109\/TASLP.2023.3328283","volume":"32","author":"R Prabhavalkar","year":"2024","unstructured":"Prabhavalkar R, Hori T, Sainath TN, Schl\u00fcter R, Watanabe S. End-to-end speech recognition: a survey. IEEE ACM Trans Audio Speech Lang Process. 2024;32:325\u201351. https:\/\/doi.org\/10.1109\/TASLP.2023.3328283.","journal-title":"IEEE ACM Trans Audio Speech Lang Process"},{"key":"596_CR43","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2023.101869","volume":"99","author":"A Mehrish","year":"2023","unstructured":"Mehrish A, Majumder N, Bharadwaj R, Mihalcea R, Poria S. A review of deep learning techniques for speech processing. Inf Fusion. 2023;99:101869.","journal-title":"Inf Fusion"},{"key":"596_CR44","doi-asserted-by":"publisher","first-page":"2066","DOI":"10.3390\/ai5040101","volume":"5","author":"E Mienye","year":"2024","unstructured":"Mienye E, Jere N, Obaido G, Mienye ID, Aruleba K. Deep learning in finance: a survey of applications and techniques. AI. 2024;5:2066\u201391. https:\/\/doi.org\/10.3390\/ai5040101.","journal-title":"AI"},{"key":"596_CR45","first-page":"2394","volume":"12","author":"M Sadiku","year":"2025","unstructured":"Sadiku M, Ajayi A, Sadiku J. Artificial Intelligence in finance. Int J Trend Res Dev. 2025;12:2394\u20139333.","journal-title":"Int J Trend Res Dev"},{"key":"596_CR46","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-023-4127-5","volume":"68","author":"X Chen","year":"2024","unstructured":"Chen X, Hu X, Huang Y, Jiang H, Ji W, Jiang Y, et al. Deep learning-based software engineering: progress, challenges, and opportunities. Sci China Inf Sci. 2024;68:111102. https:\/\/doi.org\/10.1007\/s11432-023-4127-5.","journal-title":"Sci China Inf Sci"},{"key":"596_CR47","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3488904","author":"UK Durrani","year":"2024","unstructured":"Durrani UK, Akpinar M, Adak MF, Kabakus AT, Ozturk MM, Saleh M. A decade of progress: a systematic literature review on the integration of AI in software engineering phases and activities (2013\u20132023). IEEE Access. 2024. https:\/\/doi.org\/10.1109\/ACCESS.2024.3488904.","journal-title":"IEEE Access"},{"key":"596_CR48","doi-asserted-by":"publisher","first-page":"379","DOI":"10.17762\/ijritcc.v11i6s.6944","volume":"11","author":"SP Shankar","year":"2023","unstructured":"Shankar SP, Chaudhari SS. Framework for the automation of SDLC phases using artificial intelligence and machine learning techniques. Int J Recent Innov Trends Comput Commun. 2023;11:379\u201390. https:\/\/doi.org\/10.17762\/ijritcc.v11i6s.6944.","journal-title":"Int J Recent Innov Trends Comput Commun"},{"key":"596_CR49","doi-asserted-by":"publisher","unstructured":"Verma I, Kumar D, Goel R. Implementation and comparison of artificial intelligence techniques in software testing. In: 2023 6th international conference on information systems and computer networks (ISCON); 2023. p. 1\u20139. https:\/\/doi.org\/10.1109\/ISCON57294.2023.10112041.","DOI":"10.1109\/ISCON57294.2023.10112041"},{"key":"596_CR50","doi-asserted-by":"publisher","first-page":"69863","DOI":"10.1007\/s11042-024-18323-8","volume":"83","author":"RA Khan","year":"2024","unstructured":"Khan RA. Survey on identification and prediction of security threats using various deep learning models on software testing. Multimed Tools Appl. 2024;83:69863\u201374. https:\/\/doi.org\/10.1007\/s11042-024-18323-8.","journal-title":"Multimed Tools Appl."},{"key":"596_CR51","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110542","volume":"164","author":"HB Braiek","year":"2020","unstructured":"Braiek HB, Khomh F. On testing machine learning programs. J Syst Softw. 2020;164:110542. https:\/\/doi.org\/10.1016\/j.jss.2020.110542.","journal-title":"J Syst Softw"},{"key":"596_CR52","doi-asserted-by":"publisher","first-page":"200749","DOI":"10.1109\/ACCESS.2020.3033045","volume":"8","author":"A Kukkar","year":"2020","unstructured":"Kukkar A, Mohana R, Kumar Y, Nayyar A, Bilal M, Kwak K-S. Duplicate bug report detection and classification system based on deep learning technique. IEEE Access. 2020;8:200749\u201363. https:\/\/doi.org\/10.1109\/ACCESS.2020.3033045.","journal-title":"IEEE Access"},{"key":"596_CR53","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2022.111537","volume":"195","author":"G Giray","year":"2023","unstructured":"Giray G, Bennin KE, K\u00f6ksal \u00d6, Babur \u00d6, Tekinerdogan B. On the use of deep learning in software defect prediction. J Syst Softw. 2023;195:111537. https:\/\/doi.org\/10.1016\/j.jss.2022.111537.","journal-title":"J Syst Softw"},{"key":"596_CR54","doi-asserted-by":"publisher","unstructured":"Li R. Software quality testing framework based on machine learning analysis. In: 2024 5th international conference on mobile computing and sustainable informatics (ICMCSI); 2024. p. 396\u2013401. https:\/\/doi.org\/10.1109\/ICMCSI61536.2024.00063.","DOI":"10.1109\/ICMCSI61536.2024.00063"},{"key":"596_CR55","doi-asserted-by":"publisher","unstructured":"Akila V, Vasuki A, Christaline JA, Sathiya R, Rishi P, Edward AS. Enhancing software testing with machine learning techniques. In: 2023 international conference on sustainable computing and data communication systems (ICSCDS); 2023. p. 329\u201333. https:\/\/doi.org\/10.1109\/ICSCDS56580.2023.10105028.","DOI":"10.1109\/ICSCDS56580.2023.10105028"},{"key":"596_CR56","doi-asserted-by":"publisher","first-page":"4890","DOI":"10.1038\/s41598-024-55483-x","volume":"14","author":"K Cao","year":"2024","unstructured":"Cao K, Zhang T, Huang J. Advanced hybrid LSTM-transformer architecture for real-time multi-task prediction in engineering systems. Sci Rep. 2024;14:4890. https:\/\/doi.org\/10.1038\/s41598-024-55483-x.","journal-title":"Sci Rep"},{"key":"596_CR57","doi-asserted-by":"publisher","unstructured":"Steenhoek B, Tufano M, Sundaresan N, Svyatkovskiy A. Reinforcement learning from automatic feedback for high-quality unit test generation. In: 2025 IEEE\/ACM international workshop on deep learning for testing and testing for deep learning (DeepTest). Los Alamitos: IEEE Computer Society; 2025. p. 37\u201344. https:\/\/doi.org\/10.1109\/DeepTest66595.2025.00011.","DOI":"10.1109\/DeepTest66595.2025.00011"},{"key":"596_CR58","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2022.111537","volume":"195","author":"G Giray","year":"2023","unstructured":"Giray G, Bennin KE, K\u00f6ksal \u00d6, Babur \u00d6, Tekinerdogan B. On the use of deep learning in software defect prediction. J Syst Softw. 2023;195:111537.","journal-title":"J Syst Softw"},{"key":"596_CR59","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8858010","author":"Z Shen","year":"2020","unstructured":"Shen Z, Chen S, Coppolino L. A survey of automatic software vulnerability detection, program repair, and defect prediction techniques. Sec Commun Netw. 2020. https:\/\/doi.org\/10.1155\/2020\/8858010.","journal-title":"Sec Commun Netw"},{"key":"596_CR60","doi-asserted-by":"publisher","first-page":"123924","DOI":"10.1109\/ACCESS.2023.3329732","volume":"11","author":"R Bocu","year":"2023","unstructured":"Bocu R, Baicoianu A, Kerestely A. An extended survey concerning the significance of artificial intelligence and machine learning techniques for bug triage and management. IEEE Access. 2023;11:123924\u201337. https:\/\/doi.org\/10.1109\/ACCESS.2023.3329732.","journal-title":"IEEE Access"},{"key":"596_CR61","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2023.107175","volume":"158","author":"ZM Zain","year":"2023","unstructured":"Zain ZM, Sakri S, Ismail NHA. Application of deep learning in software defect prediction: systematic literature review and meta-analysis. Inf Softw Technol. 2023;158:107175. https:\/\/doi.org\/10.1016\/j.infsof.2023.107175.","journal-title":"Inf Softw Technol"},{"key":"596_CR62","doi-asserted-by":"publisher","first-page":"95","DOI":"10.20473\/jisebi.9.1.95-107","volume":"9","author":"HW Awalurahman","year":"2023","unstructured":"Awalurahman HW, Witsqa IH, Raharjana IK, Basori AH. Security aspect in software testing perspective: a systematic literature review. J Inf Syst Eng Bus Intell. 2023;9:95\u2013107. https:\/\/doi.org\/10.20473\/jisebi.9.1.95-107.","journal-title":"J Inf Syst Eng Bus Intell"},{"key":"596_CR63","doi-asserted-by":"publisher","first-page":"250","DOI":"10.20473\/jisebi.10.2.250-269","volume":"10","author":"D Herawatie","year":"2024","unstructured":"Herawatie D, Siswanto N, Erwin W. Motorcycle taxi in shared mobility and informal transportation: a bibliometric analysis. J Inf Syst Eng Bus Intell. 2024;10:250\u201369. https:\/\/doi.org\/10.20473\/jisebi.10.2.250-269.","journal-title":"J Inf Syst Eng Bus Intell"},{"key":"596_CR64","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.122006","volume":"238","author":"C Wang","year":"2024","unstructured":"Wang C, Cui X, Zhao S, Guo K, Wang Y, Song Y. The application of deep learning in stereo matching and disparity estimation: a bibliometric review. Expert Syst Appl. 2024;238:122006.","journal-title":"Expert Syst Appl"},{"key":"596_CR65","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/electronics12092109","volume":"12","author":"M Boukhlif","year":"2023","unstructured":"Boukhlif M, Hanine M, Kharmoum N. A decade of intelligent software testing research: a bibliometric analysis. Electronics. 2023;12:1\u201329. https:\/\/doi.org\/10.3390\/electronics12092109.","journal-title":"Electronics"},{"key":"596_CR66","doi-asserted-by":"publisher","DOI":"10.3390\/healthcare10010010","author":"SSM Khairi","year":"2022","unstructured":"Khairi SSM, Bakar MAA, Alias MA, Bakar SA, Liong CY, Rosli N, et al. Deep learning on histopathology images for breast cancer classification: a bibliometric analysis. Healthcare. 2022. https:\/\/doi.org\/10.3390\/healthcare10010010.","journal-title":"Healthcare"},{"key":"596_CR67","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12112382","volume":"12","author":"S-G Nam","year":"2023","unstructured":"Nam S-G, Seo Y-S. GUI component detection-based automated software crash diagnosis. Electronics. 2023;12:2382. https:\/\/doi.org\/10.3390\/electronics12112382.","journal-title":"Electronics"},{"key":"596_CR68","doi-asserted-by":"publisher","first-page":"373","DOI":"10.3390\/fi15120373","volume":"15","author":"K Saminathan","year":"2023","unstructured":"Saminathan K, Mulka STR, Damodharan S, Maheswar R, Lorincz J. An artificial neural network autoencoder for insider cyber security threat detection. Future Internet. 2023;15:373. https:\/\/doi.org\/10.3390\/fi15120373.","journal-title":"Future Internet"},{"key":"596_CR69","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1109\/TSE.2023.3347898","volume":"50","author":"Y Yang","year":"2024","unstructured":"Yang Y, Hu X, Gao Z, Chen J, Ni C, Xia X, et al. Federated learning for software engineering: a case study of code clone detection and defect prediction. IEEE Trans Software Eng. 2024;50:296\u2013321. https:\/\/doi.org\/10.1109\/TSE.2023.3347898.","journal-title":"IEEE Trans Software Eng"},{"key":"596_CR70","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-023-10400-0","volume":"29","author":"MM Morovati","year":"2024","unstructured":"Morovati MM, Nikanjam A, Tambon F, Khomh F, Jiang ZM. Bug characterization in machine learning-based systems. Empir Softw Eng. 2024;29:14. https:\/\/doi.org\/10.1007\/s10664-023-10400-0.","journal-title":"Empir Softw Eng"},{"key":"596_CR71","doi-asserted-by":"publisher","unstructured":"Usman M, Sun Y, Gopinath D, P\u0103s\u0103reanu CS. Rule-based testing of neural networks. In: Proceedings of the 1st international workshop on dependability and trustworthiness of safety-critical systems with machine learned components. New York: ACM; 2023. p. 1\u20135. https:\/\/doi.org\/10.1145\/3617574.3622747.","DOI":"10.1145\/3617574.3622747"},{"key":"596_CR72","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2023.111681","volume":"201","author":"Y Zou","year":"2023","unstructured":"Zou Y, Sun H, Fang C, Liu J, Zhang Z. Deep learning framework testing via hierarchical and heuristic model generation. J Syst Softw. 2023;201:111681. https:\/\/doi.org\/10.1016\/j.jss.2023.111681.","journal-title":"J Syst Softw"},{"key":"596_CR73","doi-asserted-by":"publisher","first-page":"9185","DOI":"10.1109\/TNNLS.2022.3156620","volume":"34","author":"J Yu","year":"2023","unstructured":"Yu J, Duan S, Ye X. A white-box testing for deep neural networks based on neuron coverage. IEEE Trans Neural Netw Learn Syst. 2023;34:9185\u201397. https:\/\/doi.org\/10.1109\/TNNLS.2022.3156620.","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"596_CR74","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1007\/s10619-020-07291-1","volume":"38","author":"L Xiao","year":"2020","unstructured":"Xiao L, Miao H, Shi T, Hong Y. LSTM-based deep learning for spatial\u2013temporal software testing. Distrib Parallel Databases. 2020;38:687\u2013712. https:\/\/doi.org\/10.1007\/s10619-020-07291-1.","journal-title":"Distrib Parallel Databases"},{"key":"596_CR75","doi-asserted-by":"publisher","first-page":"195000","DOI":"10.1109\/ACCESS.2020.3033888","volume":"8","author":"T Ahmad","year":"2020","unstructured":"Ahmad T, Ashraf A, Truscan D, Domi A, Porres I. Using deep reinforcement learning for exploratory performance testing of software systems with multi-dimensional input spaces. IEEE Access. 2020;8:195000\u201320. https:\/\/doi.org\/10.1109\/ACCESS.2020.3033888.","journal-title":"IEEE Access"},{"key":"596_CR76","doi-asserted-by":"publisher","unstructured":"Matcha W, Tour\u00e9 F, Badri M, Badri L. Using deep learning classifiers to identify candidate classes for unit testing in object-oriented systems. In: Proceedings of the international conference on software engineering and knowledge engineering, SEKE, vol. PartF16244. 2020. p. 353\u20138. https:\/\/doi.org\/10.18293\/SEKE2020-147.","DOI":"10.18293\/SEKE2020-147"},{"key":"596_CR77","doi-asserted-by":"publisher","unstructured":"Lee S, Cha S, Lee D, Oh H. Effective white-box testing of deep neural networks with adaptive neuron-selection strategy. In: ISSTA 2020\u2014proceedings of the 29th ACM SIGSOFT international symposium on software testing and analysis; 2020. p. 165\u201376. https:\/\/doi.org\/10.1145\/3395363.3397346.","DOI":"10.1145\/3395363.3397346"},{"key":"596_CR78","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/3617946.3617953","volume":"48","author":"M Biagiola","year":"2023","unstructured":"Biagiola M, Cardozo N, Shin D, Khomh F, Stocco A, Riccio V. Summary of the fourth international workshop on deep learning for testing and testing for deep learning (DeepTest 2023). SIGSOFT Softw Eng Notes. 2023;48:39\u201340. https:\/\/doi.org\/10.1145\/3617946.3617953.","journal-title":"SIGSOFT Softw Eng Notes"},{"key":"596_CR79","doi-asserted-by":"publisher","first-page":"1743","DOI":"10.3390\/ai5040086","volume":"5","author":"W Albattah","year":"2024","unstructured":"Albattah W, Alzahrani M. Software defect prediction based on machine learning and deep learning techniques: an empirical approach. AI. 2024;5:1743\u201358. https:\/\/doi.org\/10.3390\/ai5040086.","journal-title":"AI"}],"container-title":["Discover Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44163-025-00596-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44163-025-00596-z","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44163-025-00596-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T15:07:39Z","timestamp":1767020859000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44163-025-00596-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,29]]},"references-count":79,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["596"],"URL":"https:\/\/doi.org\/10.1007\/s44163-025-00596-z","relation":{},"ISSN":["2731-0809"],"issn-type":[{"value":"2731-0809","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,29]]},"assertion":[{"value":"3 June 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"402"}}