{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T04:34:22Z","timestamp":1771043662330,"version":"3.50.1"},"reference-count":51,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"ERATO HASUO Metamathematics","award":["JPMJER1603"],"award-info":[{"award-number":["JPMJER1603"]}]},{"name":"JST","award":["10.13039\/501100009024 ERATO"],"award-info":[{"award-number":["10.13039\/501100009024 ERATO"]}]},{"name":"Engineerable AI","award":["JPMJMI20B8, JST"],"award-info":[{"award-number":["JPMJMI20B8, JST"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2023,7,1]]},"DOI":"10.1109\/tdsc.2022.3159773","type":"journal-article","created":{"date-parts":[[2022,3,16]],"date-time":"2022-03-16T19:40:05Z","timestamp":1647459605000},"page":"2713-2730","source":"Crossref","is-referenced-by-count":1,"title":["An Incremental Approach for Understanding Collision Avoidance of an Industrial Path Planner"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7414-8057","authenticated-orcid":false,"given":"Xiao-Yi","family":"Zhang","sequence":"first","affiliation":[{"name":"National Institute of Informatics, Chiyoda City, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6253-4062","authenticated-orcid":false,"given":"Paolo","family":"Arcaini","sequence":"additional","affiliation":[{"name":"National Institute of Informatics, Chiyoda City, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7725-2618","authenticated-orcid":false,"given":"Fuyuki","family":"Ishikawa","sequence":"additional","affiliation":[{"name":"National Institute of Informatics, Chiyoda City, Tokyo, Japan"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-25540-4_25"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49052-6_6"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/IV47402.2020.9304552"},{"key":"ref14","article-title":"Supplementary material","author":"zhang","year":"0"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2559932"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134299"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2017.03.094"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57288-8_23"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29044-2"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/IV48863.2021.9575425"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2019.8917326"},{"key":"ref50","author":"leveson","year":"2016","journal-title":"Engineering A Safer World Systems Thinking Applied to Safety"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970308"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.25"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCS.2019.00028"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110861"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.62"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TAIC.PART.2007.13"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2020.106312"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2892102"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/1883612.1883618"},{"key":"ref8","volume":"112","author":"tzoref-brill","year":"2019","journal-title":"Chapter Two - Advances in Combinatorial Testing"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/581396.581397"},{"key":"ref9","author":"lowen","year":"1996","journal-title":"Fuzzy Set Theory Basic Concepts Techniques and Bibliography"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64708-7"},{"key":"ref3","author":"mcnaughton","year":"2011","journal-title":"Parallel Algorithms for Real-time Motion Planning"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE5003.2020.00036"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICST46399.2020.00045"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.66"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3377930.3389827"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238192"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2522920.2522924"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2521368"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.4271\/J3016_201401"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1145\/2970276.2970311","article-title":"Testing Advanced Driver Assistance Systems Using Multi-objective Search and Neural Networks","author":"raja ben abdessalem","year":"2016","journal-title":"IEEE\/ACM Int Conference on Automated Software Engineering (ASE)"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE5003.2020.00012"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330566"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2983149"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.3685309"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2006.18"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2491509.2491513"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.robot.2013.09.004"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2017.3571562"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2013.6631299"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s10846-018-0851-3"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-018-9611-z"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.03.008"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-16722-6_10"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180220"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3233\/AIC-150682"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238187"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/10177761\/09736648.pdf?arnumber=9736648","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T18:33:06Z","timestamp":1690914786000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9736648\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,1]]},"references-count":51,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2022.3159773","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,1]]}}}