{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T20:58:11Z","timestamp":1770497891589,"version":"3.49.0"},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100001866","name":"Luxembourg National Research Fund","doi-asserted-by":"publisher","award":["IPBG19\/14016225\/INSTRUCT"],"award-info":[{"award-number":["IPBG19\/14016225\/INSTRUCT"]}],"id":[{"id":"10.13039\/501100001866","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100018703","name":"European Union&#x2019;s Horizon Europe Program","doi-asserted-by":"publisher","award":["101148870"],"award-info":[{"award-number":["101148870"]}],"id":[{"id":"10.13039\/100018703","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001602","name":"Research Ireland","doi-asserted-by":"publisher","award":["13\/RC\/2094-2"],"award-info":[{"award-number":["13\/RC\/2094-2"]}],"id":[{"id":"10.13039\/501100001602","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000038","name":"NSERC of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1109\/tse.2025.3563121","type":"journal-article","created":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T17:05:30Z","timestamp":1745514330000},"page":"1666-1684","source":"Crossref","is-referenced-by-count":2,"title":["Testing CPS With Design Assumptions-Based Metamorphic Relations and Genetic Programming"],"prefix":"10.1109","volume":"51","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7013-1191","authenticated-orcid":false,"given":"Claudio","family":"Mandrioli","sequence":"first","affiliation":[{"name":"University of Luxembourg, Esch-sur-Alzette, Luxembourg"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9025-7173","authenticated-orcid":false,"given":"Seung Yeob","family":"Shin","sequence":"additional","affiliation":[{"name":"University of Luxembourg, Esch-sur-Alzette, Luxembourg"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4854-685X","authenticated-orcid":false,"given":"Domenico","family":"Bianculli","sequence":"additional","affiliation":[{"name":"University of Luxembourg, Esch-sur-Alzette, Luxembourg"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1393-1010","authenticated-orcid":false,"given":"Lionel","family":"Briand","sequence":"additional","affiliation":[{"name":"University of Ottawa, Ottawa, ON, Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/s150304837"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3624742"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1515\/9781400828739"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.23943\/9781400890088"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TMECH.2015.2465849"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.arcontrol.2023.100900"},{"key":"ref7","article-title":"Investigating robustness in cyber-physical systems: Specification-centric analysis in the face of system deviations","author":"Zhang","year":"2024"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397387"},{"key":"ref9","article-title":"Metamorphic testing: A new approach for generating next test cases","author":"Chen","year":"2020"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3143561"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2024.3407840"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3473920"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2022.3206427"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3678171"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678841"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.3009698"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2811489"},{"key":"ref19","article-title":"Nonlinear control of unmanned aerial vehicles: Systems with an attitude","author":"Greiff","year":"2021"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3617170"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23716-4_6"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1145\/3377811.3380370","article-title":"Approximation-refinement testing of compute-intensive cyber-physical models: An approach based on system identification","volume-title":"Proc. ACM\/IEEE 42nd Int. Conf. Softw. Eng.","author":"Menghi","year":"2020"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110881"},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.4271\/2016-01-0621","article-title":"St-lib: A library for specifying and classifying model behaviors","volume-title":"SAE Tech. Paper Ser.","author":"Kapinski","year":"2016"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32332-4"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00082"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20872-0_2"},{"key":"ref28","first-page":"1004","article-title":"Trace-checking signal-based temporal properties: A model-driven approach","volume-title":"Proc. 35th IEEE\/ACM Int. Conf. Automated Softw. Eng.","author":"Boufaied","year":"2021"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3663529.3663845"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.28"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00029"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1002\/9781119546405.ch4"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3049797.3049809"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33386-6_9"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2014.11.035"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.5220\/0003365003870396"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE5003.2020.00019"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2022.3193070"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3560442.3560445"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/32\/11048386\/10976605.pdf?arnumber=10976605","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T18:22:52Z","timestamp":1750875772000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10976605\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6]]},"references-count":39,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tse.2025.3563121","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6]]}}}