{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T05:01:46Z","timestamp":1769749306024,"version":"3.49.0"},"reference-count":80,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11]]},"DOI":"10.1109\/ase51524.2021.9678672","type":"proceedings-article","created":{"date-parts":[[2022,1,20]],"date-time":"2022-01-20T20:33:49Z","timestamp":1642710829000},"page":"917-929","source":"Crossref","is-referenced-by-count":17,"title":["Towards Exploring the Limitations of Active Learning: An Empirical Study"],"prefix":"10.1109","author":[{"given":"Qiang","family":"Hu","sequence":"first","affiliation":[]},{"given":"Yuejun","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Maxime","family":"Cordy","sequence":"additional","affiliation":[]},{"given":"Xiaofei","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Mike","family":"Papadakis","sequence":"additional","affiliation":[]},{"given":"Yves Le","family":"Traon","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.05.105"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-016-0469-7"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00038"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00046"},{"key":"ref76","first-page":"505","article-title":"An empirical study of active learning with support vector machines forjapanese word segmentation","author":"sassano","year":"2002","journal-title":"Proceedings of the 40th Annual Meeting on Association for Computational Linguistics - ACL '02"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00080"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.3115\/1220835.1220851"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01252-6_13"},{"key":"ref38","article-title":"Secure deep learning engineering: A software quality assurance perspective","author":"ma","year":"2018","journal-title":"arXiv preprint arXiv 1810 04805"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2019.00020"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409759"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P19-1103"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref30","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2015"},{"key":"ref37","article-title":"Network trimming: a data-driven neuron pruning approach towards efficient deep architectures","author":"hu","year":"2016","journal-title":"arXiv preprint arXiv 1607 03250"},{"key":"ref36","first-page":"1135","article-title":"Learning both weights and connections for efficient neural network","volume":"28","author":"han","year":"2015","journal-title":"Advances in neural information processing systems"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00016"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-90-481-8847-5_10"},{"key":"ref60","article-title":"Tensorflow: Large-scale machine learning on heterogeneous systems","author":"abadi","year":"2015","journal-title":"software available from tensorflow org"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9587-0"},{"key":"ref61","doi-asserted-by":"crossref","first-page":"13261","DOI":"10.1609\/aaai.v35i15.17566","article-title":"Act: an attentive convolutional transformer for efficient text classification","volume":"35","author":"li","year":"2021","journal-title":"Proceedings of the AAAI Conference on Artificial Intelligence"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.256941"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2005.151"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-010-0069-5"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/2365324.2365335"},{"key":"ref65","article-title":"A survey of deep active learning","author":"ren","year":"2020","journal-title":"arXiv preprint arXiv 2009 02026"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.eng.2019.12.012"},{"key":"ref66","article-title":"Deep active learning for dialogue generation","author":"asghar","year":"2016","journal-title":"arXiv preprint arXiv 1612 03929"},{"key":"ref67","article-title":"Deep active learning over the long tail","author":"geifman","year":"2017","journal-title":"arXiv preprint arXiv 1711 00540"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D17-1063"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00065"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557119"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3417330"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66179-7_46"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380415"},{"key":"ref24","article-title":"Evaluating the robustness of neural networks: an extreme value theory approach","author":"weng","year":"2018","journal-title":"International Conference on Learning Representations"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313591"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25964-2_3"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1002\/stv.430"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D18-1318"},{"key":"ref51","first-page":"4901","article-title":"Tensorfuzz: debugging neural networks with coverage-guided fuzzing","volume":"97","author":"odena","year":"2019","journal-title":"Proceedings of the 36th International Conference on Machine Learning"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-4297-1"},{"key":"ref58","article-title":"There is limited correlation between coverage and robustness for deep neural networks","author":"dong","year":"2019","journal-title":"arXiv preprint arXiv 1911 12945"},{"key":"ref57","article-title":"Art: adversarial robustness toolbox v1.2.0","author":"nicolae","year":"2018","journal-title":"CoRR"},{"key":"ref56","article-title":"Foolbox: a python toolbox to benchmark the robustness of machine learning models","author":"rauber","year":"2017","journal-title":"arXiv preprint arXiv 1707 04555"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00976"},{"key":"ref54","first-page":"265","article-title":"Tensorflow: a system for large-scale machine learning","author":"abadi","year":"2016","journal-title":"12th USENIX Symposium on Operating Systems Design and Implementation ( OSDI 16)"},{"key":"ref53","article-title":"Keras","author":"chollet","year":"2015"},{"key":"ref52","first-page":"2574","article-title":"Deepfool: a simple and accurate method to fool deep neural networks","author":"moosavi-dezfooli","year":"2016","journal-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition"},{"key":"ref10","article-title":"Active learning for convolutional neural networks: A core-set approach","author":"sener","year":"2018","journal-title":"International Conference on Learning Representations"},{"key":"ref11","article-title":"Adversarial active learning for deep networks: a margin based approach","author":"ducoffe","year":"2018","journal-title":"arXiv preprint arXiv 1802 09085"},{"key":"ref40","article-title":"Learning multiple layers of features from tiny images","author":"krizhevsky","year":"2009","journal-title":"University of Toronto Toronto ON Tech Rep"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1145\/3293882.3330579","article-title":"Deephunter: a coverage-guided fuzz testing framework for deep neural networks","author":"xie","year":"2019","journal-title":"Proc of ACM SIGSOFT international symposium on Software testing and analysis"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/800"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338954"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238202"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132785"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00108"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1145\/3324884.3416621","article-title":"Multiple-Boundary Clustering and Prioritization to Promote Neural Network Retraining","author":"shen","year":"2020","journal-title":"IEEE\/ACM Int Conference on Automated Software Engineering (ASE)"},{"key":"ref19","first-page":"177","article-title":"Deepgini: prioritizing massive tests to enhance the robustness of deep neural betworks","author":"feng","year":"0"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380368"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1177\/0278364913495721"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180220"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2946162"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2014.6889457"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.2200\/S00429ED1V01Y201207AIM018"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.3115\/1613715.1613855"},{"key":"ref9","first-page":"1183","article-title":"Deep bayesian active learning with image data","author":"gal","year":"2017","journal-title":"International Conference on Machine Learning"},{"key":"ref46","article-title":"Very deep convolutional networks for large-scale image recognition","author":"simonyan","year":"2015","journal-title":"International Conference on Learning Representations"},{"key":"ref45","article-title":"Network in network","author":"lin","year":"2013","journal-title":"arXiv preprint arXiv 1312 4400"},{"key":"ref48","article-title":"Active learning empirical study homepage","year":"2021"},{"key":"ref47","article-title":"Keras code examples","author":"chollet","year":"2020"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28997-2_32"},{"key":"ref41","first-page":"142","article-title":"Learning word vectors for sentiment analysis","author":"maas","year":"2011","journal-title":"Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics Human Language Technologies"},{"key":"ref44","first-page":"14","article-title":"Lenet-5, convolutional neural networks","volume":"20","author":"lecun","year":"2015"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367587"}],"event":{"name":"2021 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE)","location":"Melbourne, Australia","start":{"date-parts":[[2021,11,15]]},"end":{"date-parts":[[2021,11,19]]}},"container-title":["2021 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9678507\/9678392\/09678672.pdf?arnumber=9678672","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,23]],"date-time":"2023-01-23T22:49:25Z","timestamp":1674514165000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9678672\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11]]},"references-count":80,"URL":"https:\/\/doi.org\/10.1109\/ase51524.2021.9678672","relation":{},"subject":[],"published":{"date-parts":[[2021,11]]}}}