{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T11:08:22Z","timestamp":1777633702596,"version":"3.51.4"},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,8,21]],"date-time":"2022-08-21T00:00:00Z","timestamp":1661040000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,8,21]],"date-time":"2022-08-21T00:00:00Z","timestamp":1661040000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,8,21]]},"DOI":"10.1109\/cog51982.2022.9893630","type":"proceedings-article","created":{"date-parts":[[2022,9,20]],"date-time":"2022-09-20T19:33:31Z","timestamp":1663702411000},"page":"237-244","source":"Crossref","is-referenced-by-count":12,"title":["Inspector: Pixel-Based Automated Game Testing via Exploration, Detection, and Investigation"],"prefix":"10.1109","author":[{"given":"Guoqing","family":"Liu","sequence":"first","affiliation":[{"name":"Microsoft Research Asia"}]},{"given":"Mengzhang","family":"Cai","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China"}]},{"given":"Li","family":"Zhao","sequence":"additional","affiliation":[{"name":"Microsoft Research Asia"}]},{"given":"Tao","family":"Qin","sequence":"additional","affiliation":[{"name":"Microsoft Research Asia"}]},{"given":"Adrian","family":"Brown","sequence":"additional","affiliation":[{"name":"Xbox Studios Quality"}]},{"given":"Jimmy","family":"Bischoff","sequence":"additional","affiliation":[{"name":"Xbox Studios Quality"}]},{"given":"Tie-Yan","family":"Liu","sequence":"additional","affiliation":[{"name":"Microsoft Research Asia"}]}],"member":"263","reference":[{"key":"ref39","year":"0"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.106"},{"key":"ref33","article-title":"Frustratingly Simple Few-Shot Object Detection","author":"wang","year":"2020","journal-title":"International Conference on Machine Learning (ICML)"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CoG52621.2021.9619146"},{"key":"ref31","article-title":"You May Not Need Ratio Clipping in PPO","volume":"abs 2202 79","author":"sun","year":"2022","journal-title":"CoRR"},{"key":"ref30","article-title":"Proximal policy optimization algorithms","volume":"abs 1707 6347","author":"schulman","year":"2017","journal-title":"CoRR"},{"key":"ref37","article-title":"Adam: A Method for Stochastic optimization","author":"kingma","year":"2015","journal-title":"3rd International Conference for Learning Representations"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1991.3.1.88"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref34","article-title":"Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks","volume":"28","author":"ren","year":"2015","journal-title":"Advances in neural information processing systems"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TG.2019.2947597"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1609\/aiide.v16i1.7409","article-title":"Using Deep Convolutional Neural Networks to Detect Rendered Glitches in Video Games","volume":"16","author":"ling","year":"2020","journal-title":"Proceedings of the AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CoG47356.2020.9231670"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CIG.2019.8848057"},{"key":"ref13","first-page":"1111","article-title":"Automatic computer game balancing: a reinforcement learning approach","author":"gustavo","year":"2005"},{"key":"ref14","first-page":"693","article-title":"Towards Adaptive Deep Reinforcement Game Balancing","author":"ashey","year":"2019"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CIG.2018.8490417"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TG.2020.2990865"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CoG52621.2021.9619053"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3130859.3131439"},{"key":"ref19","first-page":"26","article-title":"Taking the scenic route: Automatic exploration for videogames","volume":"2313","author":"zhan","year":"2019","journal-title":"KEG AAAI ser CEUR Workshop Proceedings"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CIG.2018.8490422"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3239235.3268923"},{"key":"ref27","article-title":"A Survey of Deep Reinforcement Learning in Video Games","volume":"abs 1912 10944","author":"shao","year":"2019","journal-title":"CoRR"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-016-1673-z"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.7603\/s40601-013-0010-4"},{"key":"ref29","article-title":"Exploration by random network distillation","author":"burda","year":"2019","journal-title":"International Conference on Learning Representations (ICLR)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC.2010.54"},{"key":"ref8","article-title":"An approach to automated videogame beta testing","volume":"18","author":"hern\u00e1ndez b\u00e9cares","year":"2016","journal-title":"Entertainment Computing"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MODELS.2015.7338274"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/AST52587.2021.00018"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TG.2018.2808198"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-016-9480-2"},{"key":"ref20","first-page":"600","article-title":"Augmenting automated game testing with deep reinforcement learning","author":"bergdahl","year":"2020","journal-title":"IEEE Conference on Games (COG)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CoG52621.2021.9619048"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00077"},{"key":"ref24","article-title":"A survey on intrinsic motivation in reinforcement learning","volume":"abs 1908 6976","author":"aubret","year":"2019","journal-title":"CoRR"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TCIAIG.2012.2186810"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CIG.2019.8848091"},{"key":"ref26","article-title":"Reinforcement Learning: An Introduction","author":"sutton","year":"2018"},{"key":"ref25","first-page":"1471","article-title":"Unifying count-based exploration and intrinsic motivation","volume":"29","author":"bellemare","year":"2016","journal-title":"Advances in neural information processing systems"}],"event":{"name":"2022 IEEE Conference on Games (CoG)","location":"Beijing, China","start":{"date-parts":[[2022,8,21]]},"end":{"date-parts":[[2022,8,24]]}},"container-title":["2022 IEEE Conference on Games (CoG)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9893561\/9893544\/09893630.pdf?arnumber=9893630","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,27]],"date-time":"2023-11-27T07:56:16Z","timestamp":1701071776000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9893630\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,21]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/cog51982.2022.9893630","relation":{},"subject":[],"published":{"date-parts":[[2022,8,21]]}}}