{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T16:51:44Z","timestamp":1777567904178,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T00:00:00Z","timestamp":1608508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key R&D Program of China","award":["2018YFB1003901"],"award-info":[{"award-number":["2018YFB1003901"]}]},{"name":"National Natural Science Foundation of China","award":["61932012, 61872177, 61832009, 61772259"],"award-info":[{"award-number":["61932012, 61872177, 61832009, 61772259"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,21]]},"DOI":"10.1145\/3324884.3416621","type":"proceedings-article","created":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T23:39:02Z","timestamp":1611790742000},"page":"410-422","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":43,"title":["Multiple-boundary clustering and prioritization to promote neural network retraining"],"prefix":"10.1145","author":[{"given":"Weijun","family":"Shen","sequence":"first","affiliation":[{"name":"Nanjing University, China"}]},{"given":"Yanhui","family":"Li","sequence":"additional","affiliation":[{"name":"Nanjing University, China"}]},{"given":"Lin","family":"Chen","sequence":"additional","affiliation":[{"name":"Nanjing University, China"}]},{"given":"Yuanlei","family":"Han","sequence":"additional","affiliation":[{"name":"Nanjing University, China"}]},{"given":"Yuming","family":"Zhou","sequence":"additional","affiliation":[{"name":"Nanjing University, China"}]},{"given":"Baowen","family":"Xu","sequence":"additional","affiliation":[{"name":"Nanjing University, China"}]}],"member":"320","published-online":{"date-parts":[[2021,1,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Accessed","year":"2019","unstructured":"2019. Discover the current state of the art in objects classification. https:\/\/rodrigob.github.io\/are_we_there_yet\/build\/classification_datasets_results.html. Accessed May 12, 2019."},{"key":"e_1_3_2_1_2_1","volume-title":"Softmax function. https:\/\/en.wikipedia.org\/wiki\/Softmax_function\/. Accessed","year":"2019","unstructured":"2019. Softmax function. https:\/\/en.wikipedia.org\/wiki\/Softmax_function\/. Accessed May 4, 2019."},{"key":"e_1_3_2_1_3_1","unstructured":"Dario Amodei Rishita Anubhai Eric Battenberg Carl Case Jared Casper Bryan Catanzaro Jingdong Chen Mike Chrzanowski Adam Coates Greg Diamos Erich Elsen Jesse Engel Linxi Fan Christopher Fougner Tony Han Awni Y. Hannun Billy Jun Patrick LeGresley Libby Lin Sharan Narang Andrew Y. Ng Sherjil Ozair Ryan Prenger Jonathan Raiman Sanjeev Satheesh David Seetapun Shubho Sengupta Yandong Wang Zhiqian Wang Chong Wang Bo Xiao Dani Yogatama Jun Zhan and Zhenyao Zhu. 2016. Deep Speech 2 : End-to-End Speech Recognition in English and Mandarin. In ICML."},{"key":"e_1_3_2_1_4_1","volume-title":"The Power of Ensembles for Active Learning in Image Classification. In 2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR).","author":"Beluch William H.","unstructured":"William H. Beluch, Tim Genewein, Andreas Nurnberger, and Jan M. Kohler. 2018. The Power of Ensembles for Active Learning in Image Classification. In 2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.spl.2011.04.001"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.312"},{"key":"e_1_3_2_1_7_1","unstructured":"Cody Coleman Christopher Yeh Stephen Mussmann Baharan Mirzasoleiman Peter Bailis Percy Liang Jure Leskovec and Matei Zaharia. [n.d.]. Selection via proxy: Efficient data selection for deep learning."},{"key":"e_1_3_2_1_8_1","volume-title":"Le","author":"Cubuk Ekin Dogus","year":"2019","unstructured":"Ekin Dogus Cubuk, Barret Zoph, Dandelion Mane, Vijay Vasudevan, and Quoc V. Le. 2019. AutoAugment: Learning Augmentation Policies from Data. https:\/\/arxiv.org\/pdf\/1805.09501.pdf"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.707695"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380415"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the 42th International Conference on Software Engineering (ICSE '20)","author":"Gerasimou Simos","year":"2020","unstructured":"Simos Gerasimou, Hasan Ferit Eniser, Alper Sen, and Alper Cakan. 2020. Importance-Driven Deep Learning System Testing. In Proceedings of the 42th International Conference on Software Engineering (ICSE '20)."},{"key":"e_1_3_2_1_12_1","volume-title":"Advances in Neural Information Processing Systems 27","author":"Goodfellow Ian","unstructured":"Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative Adversarial Nets. In Advances in Neural Information Processing Systems 27, Z. Ghahramani, M. Welling, C. Cortes, N. D. Lawrence, and K. Q. Weinberger (Eds.). Curran Associates, Inc., 2672--2680. http:\/\/papers.nips.cc\/paper\/5423-generative-adversarial-nets.pdf"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00080"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2014.11.005"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380378"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00108"},{"key":"e_1_3_2_1_18_1","volume-title":"Deep learning. nature 521, 7553","author":"LeCun Yann","year":"2015","unstructured":"Yann LeCun, Yoshua Bengio, and Geoffrey Hinton. 2015. Deep learning. nature 521, 7553 (2015), 436."},{"key":"e_1_3_2_1_19_1","unstructured":"Y. LeCun and C. Cortes. 2019. The MNIST database of handwritten digits. http:\/\/yann.lecun.com\/exdb\/mnist\/. Accessed May 4 2019."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2013.116"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338930"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298958"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330212"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2019.8668044"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238202"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2018.00021"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2018.00021"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236082"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.291"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2720603"},{"key":"e_1_3_2_1_31_1","unstructured":"Yuval Netzer Tao Wang Adam Coates Alessandro Bissacco Bo Wu and Andrew Y Ng. 2011. Reading digits in natural images with unsupervised feature learning. (2011)."},{"key":"e_1_3_2_1_32_1","unstructured":"N.Krizhevsky H.Vinod C.Geoffrey M.Papadakis and A.Ventresque. [n.d.]. The cifar-10 dataset. http:\/\/www.cs.toronto.edu\/~kriz\/cifar.html. Accessed May 4 2019."},{"key":"e_1_3_2_1_33_1","unstructured":"Nicolas Papernot Fartash Faghri Nicholas Carlini Ian Goodfellow Reuben Feinman Alexey Kurakin Cihang Xie Yash Sharma Tom Brown Aurko Roy et al. 2016. Technical report on the cleverhans v2. 1.0 adversarial examples library. arXiv preprint arXiv:1610.00768 ( 2016)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132785"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2002.1039014"},{"key":"e_1_3_2_1_36_1","unstructured":"J. Romano J. D. Kromrey J. Coraggio J. Skowronek and L. Devine. 2006. Exploring methods for evaluating group differences on the NSSE and other surveys: Are the t-test and cohen's d indices the most appropriate choices. In In annual meeting of the Southern Association for Institutional Research."},{"key":"e_1_3_2_1_37_1","volume-title":"Deep learning in neural networks: An overview. Neural networks 61","author":"Schmidhuber J\u00fcrgen","year":"2015","unstructured":"J\u00fcrgen Schmidhuber. 2015. Deep learning in neural networks: An overview. Neural networks 61 (2015), 85--117."},{"key":"e_1_3_2_1_38_1","volume-title":"International Conference on Learning Representations(ICLR","author":"Sener Ozan","year":"2018","unstructured":"Ozan Sener and Silvio Savarese. 2018. Active learning for convolutional neural networks: A core-set approach. In International Conference on Learning Representations(ICLR 2018)."},{"key":"e_1_3_2_1_40_1","volume-title":"Deep-Gini: Prioritizing Massive Tests to Reduce Labeling Cost. CoRR abs\/1903.00661","author":"Shi Qingkai","year":"2019","unstructured":"Qingkai Shi, Jun Wan, Yang Feng, Chunrong Fang, and Zhenyu Chen. 2019. Deep-Gini: Prioritizing Massive Tests to Reduce Labeling Cost. CoRR abs\/1903.00661 (2019). arXiv:1903.00661 http:\/\/arxiv.org\/abs\/1903.00661"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380420"},{"key":"e_1_3_2_1_42_1","unstructured":"Ilya Sutskever Oriol Vinyals and Quoc V Le. 2014. Sequence to sequence learning with neural networks. In Advances in neural information processing systems. 3104--3112."},{"key":"e_1_3_2_1_43_1","volume-title":"YFCC100M: The new data in multimedia research. arXiv preprint arXiv:1503.01817","author":"Thomee Bart","year":"2015","unstructured":"Bart Thomee, David A Shamma, Gerald Friedland, Benjamin Elizalde, Karl Ni, Douglas Poland, Damian Borth, and Li-Jia Li. 2015. YFCC100M: The new data in multimedia research. arXiv preprint arXiv:1503.01817 (2015)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180220"},{"key":"e_1_3_2_1_45_1","volume-title":"Testing DNN Image Classifier for Confusion & Bias Errors. In 42nd International Conference on Software Engineering.","author":"Tian Yuchi","year":"2020","unstructured":"Yuchi Tian, Ziyuan Zhong, Vicente Ordonez, Gail Kaiser, and Baishakhi Ray. 2020. Testing DNN Image Classifier for Confusion & Bias Errors. In 42nd International Conference on Software Engineering."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2647868.2654948"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330579"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3126908.3126912"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00043"},{"key":"e_1_3_2_1_50_1","volume-title":"Machine learning testing: Survey, landscapes and horizons","author":"Zhang Jie M","year":"2020","unstructured":"Jie M Zhang, Mark Harman, Lei Ma, and Yang Liu. 2020. Machine learning testing: Survey, landscapes and horizons. IEEE Transactions on Software Engineering (2020)."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238187"},{"key":"e_1_3_2_1_52_1","volume-title":"An Empirical Study on Program Failures of Deep Learning Jobs. In 42nd International Conference on Software Engineering.","author":"Zhang Ru","year":"2020","unstructured":"Ru Zhang, Wencong Xiao, Hongyu Zhang, Yu Liu, Haoxiang Lin, and Mao Yang. 2020. An Empirical Study on Program Failures of Deep Learning Jobs. In 42nd International Conference on Software Engineering."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380422"}],"event":{"name":"ASE '20: 35th IEEE\/ACM International Conference on Automated Software Engineering","location":"Virtual Event Australia","acronym":"ASE '20","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416621","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3416621","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:38Z","timestamp":1750197698000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416621"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,21]]},"references-count":52,"alternative-id":["10.1145\/3324884.3416621","10.1145\/3324884"],"URL":"https:\/\/doi.org\/10.1145\/3324884.3416621","relation":{},"subject":[],"published":{"date-parts":[[2020,12,21]]},"assertion":[{"value":"2021-01-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}