{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T17:19:35Z","timestamp":1777569575224,"version":"3.51.4"},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"U.K. EPSRC projects on Offshore Robotics for Certification of Assets","award":["EP\/R026173\/1"],"award-info":[{"award-number":["EP\/R026173\/1"]}]},{"name":"End-to-End Conceptual Guarding of Neural Architectures","award":["EP\/T026995\/1"],"award-info":[{"award-number":["EP\/T026995\/1"]}]},{"name":"U.K. Dstl projects on Test Coverage Metrics for Artificial Intelligence"},{"name":"Safety Argument for Learning-enabled Autonomous Underwater Vehicles"},{"name":"ORCA Partnership Resource Fund Toward the Accountable and Explainable Learning-Enabled Autonomous Robotic Systems"},{"name":"European Unions Horizon 2020 Research and Innovation Programme","award":["956123"],"award-info":[{"award-number":["956123"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1109\/tr.2021.3080664","type":"journal-article","created":{"date-parts":[[2021,6,10]],"date-time":"2021-06-10T19:49:06Z","timestamp":1623354546000},"page":"1191-1206","source":"Crossref","is-referenced-by-count":36,"title":["Coverage-Guided Testing for Recurrent Neural Networks"],"prefix":"10.1109","volume":"71","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1418-6267","authenticated-orcid":false,"given":"Wei","family":"Huang","sequence":"first","affiliation":[{"name":"University of Liverpool, Liverpool, U.K."}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Youcheng","family":"Sun","sequence":"additional","affiliation":[{"name":"Queen&#x2019;s University Belfast, Belfast, U.K."}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3474-349X","authenticated-orcid":false,"given":"Xingyu","family":"Zhao","sequence":"additional","affiliation":[{"name":"University of Liverpool, Liverpool, U.K."}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"James","family":"Sharp","sequence":"additional","affiliation":[{"name":"Defence Science and Technology Laboratory, Salisbury, U.K."}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8311-8738","authenticated-orcid":false,"given":"Wenjie","family":"Ruan","sequence":"additional","affiliation":[{"name":"University of Exeter, Exeter, U.K."}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jie","family":"Meng","sequence":"additional","affiliation":[{"name":"Loughborough University, Loughborough, U.K."}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xiaowei","family":"Huang","sequence":"additional","affiliation":[{"name":"University of Liverpool, Liverpool, U.K."}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D18-1316"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8682430"},{"key":"ref3","article-title":"Abstraction and symbolic execution of deep neural networks with Bayesian approximation of hidden features","author":"Berthier","year":"2021"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2016.08.019"},{"key":"ref5","volume-title":"Testing for Continuous Delivery With Visual Studio 2012","author":"Brader","year":"2012"},{"key":"ref6","first-page":"66","article-title":"Detecting backdoor attacks on deep neural networks by activation clustering","volume-title":"Proc. Workshop Artif. Intell. Saf. Co-Located 33rd AAAI Conf. Artif. Intell.","volume":"2301","author":"Chen","year":"2019"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MEMCOD.2018.8556962"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-10575-8","volume-title":"D. Peled, and H. Veith, Model Checking","author":"Clarke","year":"2018"},{"key":"ref9","first-page":"483","article-title":"Detecting black-box adversarial examples through nonlinear dimensionality reduction","volume-title":"Proc. 27th Eur. Symp. Artif. Neural Netw.","author":"Crecchi","year":"2019"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2941376"},{"key":"ref11","article-title":"There is limited correlation between coverage and robustness for deep neural networks","author":"Dong","year":"2019"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338954"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/32.707695"},{"key":"ref14","article-title":"Crafting adversarial examples for speech paralinguistics applications","volume-title":"Proc. DYnamic Novel Adv. Mach. Learn. Intell. Cyber Secur. Workshop","author":"Gong","year":"2018"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2917620"},{"key":"ref16","article-title":"Symbolic execution for deep neural networks","author":"Gopinath","year":"2018"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909068"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3264835"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3114353"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/32.62448"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100270"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00108"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-NIER.2019.00031"},{"key":"ref24","first-page":"53","article-title":"Finding motifs in time series","volume-title":"Proc. 2nd Workshop Temporal Data Mining","author":"Lin","year":"2002"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238202"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2018.00021"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236082"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.06083"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/VAST.2017.8585721"},{"key":"ref30","first-page":"4901","article-title":"TensorFuzz: Debugging neural networks with coverage-guided fuzzing","volume-title":"Proc. 36th Int. Conf. Mach. Learn.","volume":"97","author":"Odena","year":"2019"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2016.7795300"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132785"},{"key":"ref33","article-title":"Towards practical verification of machine learning: The case of computer vision systems","author":"Pei","year":"2017"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2016.2598838"},{"key":"ref35","volume-title":"RDKit: Open-Source Cheminformatics","year":"2013"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/824"},{"key":"ref37","first-page":"6106","article-title":"Poison frogs! Targeted clean-label poisoning attacks on neural networks","volume-title":"Proc. 32nd Int. Conf. Neural Inf. Process. Syst.","author":"Shafahi","year":"2018"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref39","article-title":"UCF101: A dataset of 101 human action classes from videos in the wild","author":"Soomro","year":"2012"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3358233"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238172"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.308"},{"key":"ref43","article-title":"Intriguing properties of neural networks","volume-title":"Proc. 2nd Int. Conf. Learn. Representations","author":"Szegedy","year":"2014"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion52605.2021.00027"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00038"},{"key":"ref46","article-title":"Detecting adversarial samples for deep neural networks through mutation testing","author":"Wang","year":"2018"},{"key":"ref47","first-page":"6586","article-title":"On the convergence and robustness of adversarial training","volume-title":"Proc. 36th Int. Conf. Mach. Learn.","volume":"97","author":"Wang","year":"2019"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1670"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-89960-2_22"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1039\/c7sc02664a"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409671"},{"key":"ref52","first-page":"1603","article-title":"Diversity regularized machine","volume-title":"Proc. 22nd Int. Joint Conf. Artif. Intel.","author":"Yu","year":"2011"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00043"},{"key":"ref54","first-page":"132","article-title":"DeepRoad: GAN-based metamorphic autonomous driving system testing","volume-title":"Proc. 33rd IEEE\/ACM Int. Conf. Autom. Softw. Eng.","author":"Zhang","year":"2018"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2020.106393"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/24\/9872066\/09451178.pdf?arnumber=9451178","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T23:24:25Z","timestamp":1705015465000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9451178\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9]]},"references-count":55,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tr.2021.3080664","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"value":"0018-9529","type":"print"},{"value":"1558-1721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9]]}}}