{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T16:30:03Z","timestamp":1774629003145,"version":"3.50.1"},"reference-count":147,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001866","name":"Fonds National de la Recherche Luxembourg","doi-asserted-by":"publisher","award":["CHARACTERIZE C17\/IS\/11693861"],"award-info":[{"award-number":["CHARACTERIZE C17\/IS\/11693861"]}],"id":[{"id":"10.13039\/501100001866","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001866","name":"Fonds National de la Recherche Luxembourg","doi-asserted-by":"publisher","award":["Recommend C15\/IS\/10449467"],"award-info":[{"award-number":["Recommend C15\/IS\/10449467"]}],"id":[{"id":"10.13039\/501100001866","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1109\/tr.2018.2865733","type":"journal-article","created":{"date-parts":[[2018,9,3]],"date-time":"2018-09-03T22:34:24Z","timestamp":1536014064000},"page":"45-66","source":"Crossref","is-referenced-by-count":154,"title":["Automated Testing of Android Apps: A Systematic Literature Review"],"prefix":"10.1109","volume":"68","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4479-0775","authenticated-orcid":false,"given":"Pingfan","family":"Kong","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2990-1614","authenticated-orcid":false,"given":"Li","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3864-5926","authenticated-orcid":false,"given":"Jun","family":"Gao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0145-615X","authenticated-orcid":false,"given":"Kui","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7270-9869","authenticated-orcid":false,"given":"Tegawende F.","family":"Bissyande","sequence":"additional","affiliation":[]},{"given":"Jacques","family":"Klein","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"82","article-title":"Monkey see, monkey do: Effective generation of GUI tests with inferred macro events","author":"ermuth","year":"0","journal-title":"Proc Int Symp Software Testing Anal"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-016-1670-2"},{"key":"ref33","first-page":"88","article-title":"Reproducing context-sensitive crashes of mobile apps using crowdsourced monitoring","author":"g\u00f3mez","year":"0","journal-title":"Proc 1st Int Conf Mobile Softw Eng Syst"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950316"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970320"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2896921.2896925"},{"key":"ref37","first-page":"425","article-title":"Energy-aware test-suite minimization for Android apps","author":"jabbarvand","year":"0","journal-title":"Proc Int'l Symp on Softw Testing and Analysis"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2896921.2896932"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2016.037"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2016.10"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2896921.2896930"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2016.34"},{"key":"ref29","first-page":"490","article-title":"Experience report: Detecting poor-responsive UI in Android applications","author":"kang","year":"0","journal-title":"Proc IEEE Int Symp Softw Rel Eng"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2006.07.009"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.04.001"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2015.08.006"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2015.125"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2015.70"},{"key":"ref101","first-page":"3","article-title":"Towards automated UI-tests for sensor-based mobile applications","author":"griebe","year":"0","journal-title":"Int Conf Intell Softw Methodol Tools Tech"},{"key":"ref26","first-page":"217","article-title":"Mobile application impersonation detection using dynamic user interface extraction","author":"malisa","year":"0","journal-title":"Proc Euro Symp Res Computer Security"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2015.2481601"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28865-9_4"},{"key":"ref50","first-page":"899","article-title":"Effective real-time Android application auditing","author":"xia","year":"0","journal-title":"Proc IEEE Symp Secur Privacy"},{"key":"ref51","first-page":"577","article-title":"Web-to-application injection attacks on Android: Characterization and detection","author":"hassanshahi","year":"0","journal-title":"Proc 20th Eur Symp Res Comput Secur"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2630689"},{"key":"ref147","first-page":"1","article-title":"A survey on dynamic mobile malware detection","author":"yan","year":"2017","journal-title":"Softw Quality J"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2014.9"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590316"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/SERE-C.2014.32"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2014.31"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2652483"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23404-5_10"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2015.7107450"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ASEW.2015.11"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.18293\/SEKE2015-199"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2017.49"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2015.7102609"},{"key":"ref6","first-page":"254","article-title":"Characterising deprecated Android APIs","author":"li","year":"0","journal-title":"Proc 15th Int Conf Mining Software Repositories"},{"key":"ref5","first-page":"231","article-title":"Why are Android apps removed from Google play? A large-scale empirical study","author":"wang","year":"0","journal-title":"Proc 15th Int Conf Mining Software Repositories"},{"key":"ref8","first-page":"559","article-title":"Reducing combinatorics in GUI testing of Android applications","author":"mirzaei","year":"0","journal-title":"Proc Int Conf Softw Eng"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2015.17"},{"key":"ref7","first-page":"411","article-title":"Accessing inaccessible Android APIs: An empirical study","author":"li","year":"0","journal-title":"Proceedings of the 32nd International Conference on Software Maintenance and Evolution"},{"key":"ref9","first-page":"377","article-title":"Automatically verifying and reproducing event-based races in Android apps","author":"hu","year":"0","journal-title":"Proc Int'l Symp on Softw Testing and Analysis"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2015.05.002"},{"key":"ref45","first-page":"118","article-title":"Dynamic detection of inter-application communication vulnerabilities in Android","author":"hay","year":"0","journal-title":"Proc Int'l Symp on Softw Testing and Analysis"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2014.55"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2814270.2814303"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2015.7102585"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2015.35"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2015.7107459"},{"key":"ref43","first-page":"560","article-title":"The testing method based on image analysis for automated detection of UI defects intended for mobile applications","author":"packevi?ius","year":"0","journal-title":"Proc Int Conf Inf Softw Technol"},{"key":"ref127","author":"limaye","year":"2009","journal-title":"Software Testing"},{"key":"ref126","first-page":"v2-297","article-title":"Adaptive random testing of mobile application","author":"liu","year":"0","journal-title":"Proc 2nd Int Conf Comput Eng Technol"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2011.77"},{"key":"ref124","first-page":"163","article-title":"Towards unit testing of user interface code for Android mobile applications","author":"sadeh","year":"0","journal-title":"Proc Comp Syst Softw Eng Conf"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2014.49"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/2632168.2632169"},{"key":"ref129","doi-asserted-by":"crossref","first-page":"957","DOI":"10.1016\/j.infsof.2008.12.005","article-title":"A systematic review of search-based testing for non-functional system properties","volume":"51","author":"wasif","year":"2009","journal-title":"Inf Softw Technol"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597085"},{"key":"ref128","author":"fundamentals","year":"0"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11203-9_11"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11569-6_37"},{"key":"ref130","article-title":"Random testing","author":"hamlet","year":"1994","journal-title":"Encyclopaedia of Software Eng"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/IWAST.2013.6595792"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/MOBS.2013.6614215"},{"key":"ref75","first-page":"341","article-title":"DroidTest: Testing Android applications for leakage of private information","volume":"7807","author":"rumee","year":"2013","journal-title":"Int J Inf Secur"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1145\/2480362.2480701"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052990"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590325"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2013.6698894"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/IWAST.2012.6228986"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1145\/3017427"},{"key":"ref135","article-title":"Lessons learnt undertaking a large-scale systematic literature review","volume":"8","author":"turner","year":"0","journal-title":"Proc 12th Int Conf Eval Assess Softw Eng"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2016.03.065"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1145\/2963145"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2014.32"},{"key":"ref139","first-page":"195","article-title":"Automated testing of mobile applications: A systematic map and review","author":"m\u00e9ndez-porras","year":"0","journal-title":"Proc 18th Ibero-Amer Conf Softw Eng Lima Peru"},{"key":"ref62","first-page":"316","article-title":"Race detection for Android applications","author":"maiya","year":"0","journal-title":"Proc ACM SIGPLAN Conf Programming Language Design and Implementation"},{"key":"ref61","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/s10009-014-0303-8","article-title":"APSET, an Android application security testing tool for detecting intent-based vulnerabilities","volume":"17","author":"salva","year":"2014","journal-title":"Int J Softw Tools Technol Transfer"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/MobileCloud.2014.13"},{"key":"ref64","first-page":"326","article-title":"Race detection for event-driven mobile applications","author":"hsiao","year":"0","journal-title":"Proc ACM SIGPLAN Conf Programming Language Design and Implementation"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-408094-2.00001-1"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/2593501.2593503"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2014.30"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/2554850.2554942"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08964-5_4"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/QUATIC.2014.16"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/IWAST.2012.6228987"},{"key":"ref68","first-page":"588","article-title":"Detecting energy bugs and hotspots in mobile apps","author":"banerjee","year":"0","journal-title":"Proc 2nd ACM SIGSOFT Symp on Foundations of Software Engineering"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.460"},{"key":"ref2","article-title":"Androzoo++: Collecting millions of Android apps and their metadata for the research community","author":"li","year":"2017"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/2666620.2666630"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2615307"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.52"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1145\/2684103.2684119"},{"key":"ref95","first-page":"571","article-title":"MobiPlay: A remote execution based record-and-replay tool for mobile applications","author":"qin","year":"0","journal-title":"Proc IEEE\/ACM 38th Int Conf Softw Eng"},{"key":"ref108","first-page":"27","article-title":"User guided automation for testing mobile apps","author":"li","year":"0","journal-title":"Proc Asia-Pacific Software Eng Conf"},{"key":"ref94","first-page":"238","article-title":"Automated model-based Android GUI testing using multi-level GUI comparison criteria","author":"baek","year":"0","journal-title":"Proc IEEE Int Conf Automated Software Engineering"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2639131"},{"key":"ref93","first-page":"37","article-title":"Mining sandboxes","author":"jamrozik","year":"0","journal-title":"Proc IEEE\/ACM 38th Int Conf Softw Eng"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2331982"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2014.50"},{"key":"ref105","first-page":"599","article-title":"EvoDroid: Segmented evolutionary testing of Android apps","author":"mahmood","year":"0","journal-title":"Proc Sixth ACM SIGSOFT Int'l Symp Foundations of Software Eng"},{"key":"ref91","first-page":"513","article-title":"ApkCombiner: combining multiple Android apps to support inter-app analysis","author":"li","year":"0","journal-title":"Proc 30th IFIP Int Conf ICT Syst Secur Privacy Protection"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.96"},{"key":"ref90","first-page":"469","article-title":"Combining static analysis with probabilistic models to enable market-scale Android inter-component analysis","author":"octeau","year":"0","journal-title":"Proc 43th Symp Principles Programm Lang"},{"key":"ref103","first-page":"83","article-title":"Systematic execution of Android test suites in adverse conditions","author":"adamsen","year":"0","journal-title":"Proc Int'l Symp on Softw Testing and Analysis"},{"key":"ref102","first-page":"5","article-title":"AGRippin: A novel search based testing technique for Android applications","author":"amalfitano","year":"0","journal-title":"Proc Int Workshop Softw Develop Lifecycle Mobile"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1145\/2647648.2656426"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/ICODSE.2014.7062683"},{"key":"ref110","first-page":"53","article-title":"Towards automatic consistency checking between web application and its mobile application","author":"chen","year":"0","journal-title":"Proc Int Conf on Software Eng Knowledge Eng"},{"key":"ref98","first-page":"87","article-title":"Generating various contexts from permissions for testing Android applications","author":"song","year":"0","journal-title":"Proc Int Conf on Software Eng Knowledge Eng"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2015.7381839"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2016.036"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2015.77"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950342"},{"key":"ref11","first-page":"94","article-title":"Sapienz: Multi-objective automated testing for Android applications","author":"mao","year":"0","journal-title":"Proc Int'l Symp on Softw Testing and Analysis"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2983958"},{"key":"ref13","article-title":"Frauddroid: Automated ad fraud detection for Android apps","author":"dong","year":"0","journal-title":"Proc 26th ACM Joint Eur Softw Eng Conf Symp Found Softw Eng"},{"key":"ref14","first-page":"280","article-title":"IccTA: detecting inter-component privacy leaks in Android apps","author":"li","year":"2015","journal-title":"Proceedings of the International Conference on Software Engineering ICSE'94"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606553"},{"key":"ref118","first-page":"499","article-title":"GUIdif&#x2014;A regression testing tool for graphical user interfaces","author":"bauersfeld","year":"0","journal-title":"Proc 1st Int Conf Softw Testing Verification Validation"},{"key":"ref16","first-page":"153","article-title":"CiD: Automating the detection of API-related compatibility issues in Android apps","author":"li","year":"0","journal-title":"Proc ACM SIGSOFT Int Symp Softw Testing Analysis"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381950"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1002\/sec.633"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970312"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/SRII.2012.16"},{"key":"ref18","first-page":"1","article-title":"Testing Android apps through symbolic execution","author":"mirzaei","year":"0","journal-title":"ACM SIGSOFT Software Engineering Notes"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/1982595.1982612"},{"key":"ref119","first-page":"67","article-title":"Automated testing with targeted event sequence generation","author":"jensen","year":"0","journal-title":"Proc Int'l Symp on Softw Testing and Analysis"},{"key":"ref19","article-title":"Guidelines for performing systematic literature reviews in software engineering","author":"kitchenham","year":"2007","journal-title":"Univ Durham Durham U K"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2012.6263963"},{"key":"ref114","first-page":"623","article-title":"Guided GUI testing of Android apps with minimal restart and approximate learning","author":"choi","year":"0","journal-title":"Proc ACM SIGPLAN Int Conf Object Oriented Programm Syst Lang Appl"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2013.100"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2013.22"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.104"},{"key":"ref115","first-page":"641","article-title":"Targeted and depth-first exploration for systematic testing of Android apps","author":"azim","year":"0","journal-title":"Proc ACM SIGPLAN Int Conf Object Oriented Programm Syst Lang Appl"},{"key":"ref120","first-page":"1","article-title":"Verifying Android applications using java pathfinder","author":"merwe","year":"0","journal-title":"ACM SIGSOFT Software Engineering Notes"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491450"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35267-6_7"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393666"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2011.11"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970312"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2015.29"},{"key":"ref87","first-page":"250","article-title":"A grey-box approach for automated GUI-model generation of mobile applications","author":"yang","year":"0","journal-title":"Proc Conf Fundamental Approaches to Software Eng"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2003.1287256"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/24\/8656610\/08453877.pdf?arnumber=8453877","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T21:08:38Z","timestamp":1657746518000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8453877\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3]]},"references-count":147,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tr.2018.2865733","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"value":"0018-9529","type":"print"},{"value":"1558-1721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,3]]}}}