{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T03:57:01Z","timestamp":1776139021628,"version":"3.50.1"},"reference-count":83,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372071"],"award-info":[{"award-number":["62372071"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62202074"],"award-info":[{"award-number":["62202074"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Chongqing Technology Innovation and Application Development","award":["CSTB2022TIAD-STX0007"],"award-info":[{"award-number":["CSTB2022TIAD-STX0007"]}]},{"name":"Chongqing Technology Innovation and Application Development","award":["CSTB2023TIAD-STX0025"],"award-info":[{"award-number":["CSTB2023TIAD-STX0025"]}]},{"name":"State Key Laboratory of Intelligent Vehicle Safety Technology","award":["IVSTSKL-202412"],"award-info":[{"award-number":["IVSTSKL-202412"]}]},{"name":"Scientific and Technological Research Program of Chongqing Municipal Education Commission","award":["KJQN202300547"],"award-info":[{"award-number":["KJQN202300547"]}]},{"name":"Singapore Ministry of Education (MOE) Academic Research Fund (AcRF) Tier 1","award":["23-SOL-SMU-004"],"award-info":[{"award-number":["23-SOL-SMU-004"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1109\/tse.2025.3565037","type":"journal-article","created":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T17:33:33Z","timestamp":1745861613000},"page":"1702-1723","source":"Crossref","is-referenced-by-count":4,"title":["DeepVec: State-Vector Aware Test Case Selection for Enhancing Recurrent Neural Network"],"prefix":"10.1109","volume":"51","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-4774-2225","authenticated-orcid":false,"given":"Zhonghao","family":"Jiang","sequence":"first","affiliation":[{"name":"School of Big Data and Software Engineering, Chongqing University, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9538-9121","authenticated-orcid":false,"given":"Meng","family":"Yan","sequence":"additional","affiliation":[{"name":"School of Big Data and Software Engineering, Chongqing University, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-2603-3366","authenticated-orcid":false,"given":"Li","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Big Data and Software Engineering, Chongqing University, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6013-1369","authenticated-orcid":false,"given":"Weifeng","family":"Sun","sequence":"additional","affiliation":[{"name":"School of Big Data and Software Engineering, Chongqing University, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8283-9146","authenticated-orcid":false,"given":"Chao","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Big Data and Software Engineering, Chongqing University, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-9766-8514","authenticated-orcid":false,"given":"Song","family":"Sun","sequence":"additional","affiliation":[{"name":"School of Computer and Information Science, Chongqing Normal University, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4367-7201","authenticated-orcid":false,"given":"David","family":"Lo","sequence":"additional","affiliation":[{"name":"School of Information Systems, Singapore Management University, Singapore"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1080\/01431160600746456"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/taslp.2017.2756440"},{"key":"ref3","article-title":"Neural machine translation by jointly learning to align and translate","author":"Bahdanau","year":"2014"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/p17-1152"},{"key":"ref5","article-title":"BERT: Pre-training of deep bidirectional transformers for language understanding","author":"Devlin","year":"2018"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC57777.2023.10422139"},{"key":"ref7","article-title":"Amazon promises fix for creepy Alexa laugh","author":"News","year":"2018"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-020-09866-x"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.trpro.2020.03.003"},{"key":"ref10","article-title":"Automated vehicle safety","year":"2023"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510231"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238202"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3361566"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180220"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00126"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2018.00021"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2023.3330982"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397357"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510232"},{"issue":"1","key":"ref22","first-page":"42","article-title":"K-medoid clustering algorithm-a review","volume":"1","author":"Kaur","year":"2014","journal-title":"Int. J. Comput. Appl. Technol."},{"key":"ref23","article-title":"Examples are not enough, learn to criticize! criticism for interpretability","volume":"29","author":"Kim","year":"2016","journal-title":"Proc. Adv. Neural Inf. Process. Syst."},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00046"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3644388"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7439(97)00061-0"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICEngTechnol.2017.8308186"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1090\/proc\/14789"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409754"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-NIER.2019.00031"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409671"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2886017"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"110955","DOI":"10.1016\/j.knosys.2023.110955","article-title":"RNNTCS: A test case selection method for recurrent neural news","volume":"279","author":"Wu","year":"2023","journal-title":"Knowl. Based Syst."},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1613\/jair.1.12752"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.findings-emnlp.355"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338930"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/32.536955"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.physd.2019.132306"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2011.5947611"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338954"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/tr.2021.3080664"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2021.3080664"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2021.3114353"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3643678"},{"key":"ref46","article-title":"MNIST","author":"LeCun","year":"1998"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511802997"},{"key":"ref48","volume-title":"Fashion","author":"Rasul","year":"2017"},{"key":"ref49","article-title":"Snips voice platform: An embedded spoken language understanding system for private-by-design voice interfaces","author":"Coucke","year":"2018"},{"key":"ref50","article-title":"Ag\u2019s corpus of news articles"},{"key":"ref51","first-page":"649","article-title":"Character-level convolutional networks for text classification","volume-title":"Proc. 28th Int. Conf. Neural Inf. Process. Syst. (NIPS), vol.","volume":"1","author":"Zhang","year":"2015"},{"issue":"2","key":"ref52","first-page":"4","article-title":"Reading digits in natural images with unsupervised feature learning","volume-title":"Proc. NIPS Workshop Deep Learn. Unsupervised Feature Learn.","volume":"2011","author":"Netzer"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS.2017.8053243"},{"key":"ref54","article-title":"Empirical evaluation of gated recurrent neural networks on sequence modeling","author":"Chung","year":"2014"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2005.1556215"},{"key":"ref56","article-title":"Understanding LSTM networks","author":"Olah","year":"2015"},{"key":"ref57","article-title":"KERAS tuner","author":"O\u2019Malley","year":"2019"},{"key":"ref58","article-title":"NLP augmentation","author":"Ma","year":"2019"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/IIPHDW.2018.8388338"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-019-0197-0"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/p16-1009"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N18-2072"},{"key":"ref63","article-title":"Exploring the limits of transfer learning with a unified text-to-text transformer","author":"Raffel","year":"2019"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1002\/stv.430"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2004.1357947"},{"key":"ref66","article-title":"Python release python 3.7.16"},{"key":"ref67","article-title":"KERAS","author":"Chollet","year":"2015"},{"key":"ref68","article-title":"Tensorflow"},{"key":"ref69","article-title":"Adversarial training methods for semi-supervised text classification","author":"Miyato","year":"2016"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/3422622"},{"key":"ref71","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014"},{"key":"ref72","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2017"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00019"},{"key":"ref74","article-title":"Spectral normalization for generative adversarial networks","author":"Miyato","year":"2018"},{"key":"ref75","volume-title":"Markov Chains.","author":"Norris","year":"1998"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/367008.367020"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/248233.248262"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180198"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/3472291"},{"key":"ref80","article-title":"Active learning literature survey","volume-title":"Technical Report","author":"Settles","year":"2009"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-2099-5_1"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206627"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2008.4563068"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/32\/11048386\/10979368.pdf?arnumber=10979368","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T17:34:19Z","timestamp":1750786459000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10979368\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6]]},"references-count":83,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tse.2025.3565037","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6]]}}}