{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T09:03:50Z","timestamp":1769504630849,"version":"3.49.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T00:00:00Z","timestamp":1729036800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T00:00:00Z","timestamp":1729036800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,16]]},"DOI":"10.1109\/ccci61916.2024.10736467","type":"proceedings-article","created":{"date-parts":[[2024,11,5]],"date-time":"2024-11-05T18:29:37Z","timestamp":1730831377000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["Boundary Scenario Generation Method of the Intelligence System Based on Adaptive Poisson Disk Sampling"],"prefix":"10.1109","author":[{"given":"Xirui","family":"Wang","sequence":"first","affiliation":[{"name":"School of Electronic and Information Engineering, Beihang University,Beijing,China"}]},{"given":"Hui","family":"Lu","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Beihang University,Beijing,China"}]},{"given":"Shiqi","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Beihang University,Beijing,China"}]},{"given":"Zhu","family":"Zheng","sequence":"additional","affiliation":[{"name":"Systems Engineering Research Institute of CSSC,Beijing,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.10.031"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3023668"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s00158-017-1739-8"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.mlwa.2022.100373"},{"key":"ref5","article-title":"Variable radii poisson-disk sampling","volume-title":"Canadian Conference on Computational Geometry, Canadian Conference on Computational Geometry","author":"Mitchell","year":"2012"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2022.3196396"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10514-007-9060-9"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.aap.2023.107279"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2018.8500400"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2016.7795751"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE5003.2020.00012"},{"key":"ref12","article-title":"Deeproad: Gan-based metamorphic autonomous driving system testing","author":"Zhang","year":"2018","journal-title":"Software Engineering"},{"key":"ref13","article-title":"Testing dnn-based autonomous driving systems under critical environmental conditions","volume-title":"International Conference on Machine Learning. International Conference on Machine Learning","author":"Li"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3191088"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3068784"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s00158-013-0918-5"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/aic.15362"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2012.02.067"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s00158-019-02404-6"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1115\/1.4031905"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1115\/1.4027161"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1137\/090761811"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/7529.8927"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/RT.2007.4342600"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1360612.1360619"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.cad.2013.08.016"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1964921.1964944"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1111\/cgf.14606"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2516971.2516973"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2024.111808"}],"event":{"name":"2024 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","location":"Beijing, China","start":{"date-parts":[[2024,10,16]]},"end":{"date-parts":[[2024,10,18]]}},"container-title":["2024 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10736449\/10736450\/10736467.pdf?arnumber=10736467","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T13:24:05Z","timestamp":1732713845000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10736467\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,16]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/ccci61916.2024.10736467","relation":{},"subject":[],"published":{"date-parts":[[2024,10,16]]}}}