{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T06:02:34Z","timestamp":1775628154641,"version":"3.50.1"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T00:00:00Z","timestamp":1764720000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T00:00:00Z","timestamp":1764720000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,3]]},"DOI":"10.1109\/icmla66185.2025.00068","type":"proceedings-article","created":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T19:54:58Z","timestamp":1775591698000},"page":"452-459","source":"Crossref","is-referenced-by-count":0,"title":["AI-Driven Test Generation from Natural Language: A Gamified Framework for Automated UI Testing"],"prefix":"10.1109","author":[{"given":"Maroun","family":"Ayli","sequence":"first","affiliation":[{"name":"Saint Joseph University of Beirut,Center for Computer Science,Beirut,Lebanon"}]},{"given":"Youssef","family":"Bakouny","sequence":"additional","affiliation":[{"name":"Saint Joseph University of Beirut,Center for Computer Science,Beirut,Lebanon"}]},{"given":"Nader","family":"Jalloul","sequence":"additional","affiliation":[{"name":"Murex,France"}]},{"given":"Hani","family":"Seifeddine","sequence":"additional","affiliation":[{"name":"Murex,France"}]},{"given":"Rima","family":"Kilany","sequence":"additional","affiliation":[{"name":"Saint Joseph University of Beirut,Center for Computer Science,Beirut,Lebanon"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/icse55347.2025.00142"},{"key":"ref2","article-title":"Auitestagent: Automatic requirements oriented gui function testing","author":"Hu","year":"2024"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3417067"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3510457.3513045"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3524613.3527809"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3266003.3266007"},{"key":"ref7","first-page":"111647","article-title":"Can gamification help in software testing education? findings from an empirical study","volume-title":"Journal of Systems and Software","volume":"200","author":"Blanco","year":"2023"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3524613.3527809"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702605"},{"key":"ref10","article-title":"Formalizing and benchmarking prompt injection attacks and defenses","author":"Liu","year":"2024"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2021.0120167"},{"key":"ref12","article-title":"An empirical study on the classification of bug reports with machine learning","author":"Andrade","year":"2025"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368151"},{"key":"ref14","article-title":"Combining retrieval and classification: Balancing efficiency and accuracy in duplicate bug report detection","author":"Meng","year":"2024"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1109\/COMPSAC65507.2025.00065","article-title":"Automated duplicate bug report detection in large open bug repositories","author":"Laney","year":"2025"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SANER50967.2021.00044"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27660-6_44"},{"key":"ref18","article-title":"Ultralytics yolov8","author":"Jocher","year":"2023"},{"key":"ref19","article-title":"Paddleocr 3.0 technical report","author":"Cui","year":"2025"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.00461"},{"key":"ref21","article-title":"Gemma 3 technical report","author":"Team","year":"2025"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702443"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58951-6_24"},{"key":"ref24","article-title":"Bug hunters\u2019 perspectives on the challenges and benefits of the bug bounty ecosystem","volume-title":"Proceedings of the 32nd USENIX Conference on Security Symposium","author":"Akgul"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1504\/IJCISTUDIES.2019.098020"}],"event":{"name":"2025 International Conference on Machine Learning and Applications (ICMLA)","location":"Boca Raton, FL, USA","start":{"date-parts":[[2025,12,3]]},"end":{"date-parts":[[2025,12,5]]}},"container-title":["2025 International Conference on Machine Learning and Applications (ICMLA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11471302\/11471304\/11471318.pdf?arnumber=11471318","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T05:23:38Z","timestamp":1775625818000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11471318\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,3]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/icmla66185.2025.00068","relation":{},"subject":[],"published":{"date-parts":[[2025,12,3]]}}}