{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:41:45Z","timestamp":1759333305455,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,22]],"date-time":"2022-06-22T00:00:00Z","timestamp":1655856000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,22]],"date-time":"2022-06-22T00:00:00Z","timestamp":1655856000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,22]]},"DOI":"10.1109\/dsc54232.2022.9888825","type":"proceedings-article","created":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T21:10:18Z","timestamp":1664226618000},"page":"1-8","source":"Crossref","is-referenced-by-count":10,"title":["Reliability Models and Analysis for Triple-model with Triple-input Machine Learning Systems"],"prefix":"10.1109","author":[{"given":"Qiang","family":"Wen","sequence":"first","affiliation":[{"name":"University of Tsukuba,Department of Computer Science,Tsukuba,Japan"}]},{"given":"Fumio","family":"Machida","sequence":"additional","affiliation":[{"name":"University of Tsukuba,Department of Computer Science,Tsukuba,Japan"}]}],"member":"263","reference":[{"key":"ref10","first-page":"1929","article-title":"Dropout: A simple way to prevent neural networks from overfitting","volume":"15","author":"srivastava","year":"2014","journal-title":"The Journal of Machine Learning Research"},{"key":"ref11","first-page":"3","article-title":"N-version programming: A fault-tolerance approach to reliability of software operation","author":"chen","year":"0","journal-title":"Proc of 8th IEEE Int Symp on Fault-Tolerant Computing (FTCS-8)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW51248.2020.00086"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W.2019.00017"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1147\/rd.62.0200","article-title":"The use of triple-modular redundancy to improve computer reliability","volume":"6","author":"robert","year":"1962","journal-title":"IBM Journal of Research and Development"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/EURMIC.2001.952452"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48063.2020.00029"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W52860.2021.00033"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC47002.2019.00058"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W.2019.00016"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2009.26"},{"journal-title":"Metamorphic Testing A New Approach for Generating next Test Cases","year":"1998","author":"chen","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238202"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69456-6_7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C.2018.00032"},{"journal-title":"Deep Mutation Mutation Testing of Deep Learning Systems","year":"2018","author":"ma","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132785"},{"key":"ref1","article-title":"Machine learning testing: Survey, landscapes and horizons","author":"zhang","year":"2020","journal-title":"IEEE Transactions on Software Engineering"},{"journal-title":"Explaining and Harnessing Adversarial Examples","year":"2014","author":"goodfellow","key":"ref9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2019.00026"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC53464.2021.00012"},{"journal-title":"Ensemble Methods Foundations and Algorithms","year":"2019","author":"zhou","key":"ref21"}],"event":{"name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","start":{"date-parts":[[2022,6,22]]},"location":"Edinburgh, United Kingdom","end":{"date-parts":[[2022,6,24]]}},"container-title":["2022 IEEE Conference on Dependable and Secure Computing (DSC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9888143\/9888794\/09888825.pdf?arnumber=9888825","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,14]],"date-time":"2022-10-14T20:55:37Z","timestamp":1665780937000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9888825\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,22]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/dsc54232.2022.9888825","relation":{},"subject":[],"published":{"date-parts":[[2022,6,22]]}}}