{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T14:50:15Z","timestamp":1776783015854,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":64,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,12]],"date-time":"2019-08-12T00:00:00Z","timestamp":1565568000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,12]]},"DOI":"10.1145\/3338906.3338930","type":"proceedings-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T12:21:03Z","timestamp":1565353263000},"page":"499-509","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":82,"title":["Boosting operational DNN testing efficiency through conditioning"],"prefix":"10.1145","author":[{"given":"Zenan","family":"Li","sequence":"first","affiliation":[{"name":"Nanjing University, China"}]},{"given":"Xiaoxing","family":"Ma","sequence":"additional","affiliation":[{"name":"Nanjing University, China"}]},{"given":"Chang","family":"Xu","sequence":"additional","affiliation":[{"name":"Nanjing University, China"}]},{"given":"Chun","family":"Cao","sequence":"additional","affiliation":[{"name":"Nanjing University, China"}]},{"given":"Jingwei","family":"Xu","sequence":"additional","affiliation":[{"name":"Nanjing University, China"}]},{"given":"Jian","family":"L\u00fc","sequence":"additional","affiliation":[{"name":"Nanjing University, China"}]}],"member":"320","published-online":{"date-parts":[[2019,8,12]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the 33rd AAAI Conference on Artificial Intelligence (AAAI \u201919)","author":"Abid Abubakar","year":"2019"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2013.02.061"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aca.2012.11.007"},{"key":"e_1_3_2_1_4_1","unstructured":"Houssem Ben Braiek and Foutse Khomh. 2018.  Houssem Ben Braiek and Foutse Khomh. 2018."},{"key":"e_1_3_2_1_5_1","volume-title":"Article arXiv:1812.02257 (Dec.","author":"Machine Learning Programs On Testing","year":"2018"},{"key":"e_1_3_2_1_6_1","volume-title":"International conference on machine learning. 552\u2013560","author":"Bengio Yoshua","year":"2013"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.56"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-NIER.2019.00010"},{"key":"e_1_3_2_1_9_1","volume-title":"Davide Del Testa","author":"Bojarski Mariusz","year":"2016"},{"key":"e_1_3_2_1_10_1","volume-title":"CoRR abs\/1604.07316","author":"End End","year":"2016"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(01)00028-0"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1363102.1363107"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2491931"},{"key":"e_1_3_2_1_14_1","unstructured":"J. Deng W. Dong R. Socher L.-J. Li K. Li and L. Fei-Fei. 2009.  J. Deng W. Dong R. Socher L.-J. Li K. Li and L. Fei-Fei. 2009."},{"key":"e_1_3_2_1_15_1","unstructured":"ImageNet: A Large-Scale Hierarchical Image Database. In CVPR09.  ImageNet: A Large-Scale Hierarchical Image Database. In CVPR09."},{"key":"e_1_3_2_1_16_1","unstructured":"Phyllis G. Frankl Richard G. Hamlet Bev Littlewood and Lorenzo Strigini. 1998.  Phyllis G. Frankl Richard G. Hamlet Bev Littlewood and Lorenzo Strigini. 1998."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.707695"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2421011"},{"key":"e_1_3_2_1_19_1","unstructured":"Ian Goodfellow Yoshua Bengio and Aaron Courville. 2016.  Ian Goodfellow Yoshua Bengio and Aaron Courville. 2016."},{"key":"e_1_3_2_1_20_1","unstructured":"Deep Learning. The MIT Press.  Deep Learning. The MIT Press."},{"key":"e_1_3_2_1_21_1","volume-title":"Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572","author":"Goodfellow Ian J","year":"2014"},{"key":"e_1_3_2_1_22_1","unstructured":"Kelly J Hayhurst Dan S Veerhusen John J Chilenski and Leanna K Rierson. 2001.  Kelly J Hayhurst Dan S Veerhusen John J Chilenski and Leanna K Rierson. 2001."},{"key":"e_1_3_2_1_23_1","unstructured":"A practical tutorial on modified condition\/decision coverage. (2001).  A practical tutorial on modified condition\/decision coverage. (2001)."},{"key":"e_1_3_2_1_24_1","volume-title":"Deep Residual Learning for Image Recognition. arXiv preprint arXiv:1512.03385","author":"He Kaiming","year":"2015"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2080431"},{"key":"e_1_3_2_1_26_1","volume-title":"Lyu","author":"Huang Chin-Yu","year":"2005"},{"key":"e_1_3_2_1_27_1","volume-title":"IEEE Transactions on Reliability 54, 4 (December","author":"Resource Allocation Optimal Testing","year":"2005"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6639081"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00108"},{"key":"e_1_3_2_1_30_1","unstructured":"Daphne Koller Nir Friedman and Francis Bach. 2009.  Daphne Koller Nir Friedman and Francis Bach. 2009."},{"key":"e_1_3_2_1_31_1","volume-title":"principles and techniques","author":"Probabilistic"},{"key":"e_1_3_2_1_32_1","volume-title":"Deep learning. Nature 521, 7553","author":"LeCun Yann","year":"2015"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-NIER.2019.00031"},{"key":"e_1_3_2_1_35_1","unstructured":"Zachary C. Lipton. 2016.  Zachary C. Lipton. 2016."},{"key":"e_1_3_2_1_36_1","volume-title":"Article arXiv:1606.03490 (June","author":"Model Interpretability The Mythos","year":"2016"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2310194"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOSE.2007.24"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238202"},{"key":"e_1_3_2_1_40_1","unstructured":"3238202  3238202"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2018.00021"},{"key":"e_1_3_2_1_42_1","unstructured":"Lei Ma Fuyuan Zhang Minhui Xue Bo Li Yang Liu Jianjun Zhao and Yadong Wang. 2018.  Lei Ma Fuyuan Zhang Minhui Xue Bo Li Yang Liu Jianjun Zhao and Yadong Wang. 2018."},{"key":"e_1_3_2_1_43_1","volume-title":"arXiv preprint arXiv:1806.07723","author":"Combinatorial","year":"2018"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236082"},{"key":"e_1_3_2_1_45_1","unstructured":"David JC MacKay and David JC Mac Kay. 2003.  David JC MacKay and David JC Mac Kay. 2003."},{"key":"e_1_3_2_1_46_1","volume-title":"inference and learning algorithms","author":"Information"},{"key":"e_1_3_2_1_47_1","volume-title":"Weed","author":"Daniel Maxim L.","year":"1977"},{"key":"e_1_3_2_1_48_1","volume-title":"IEEE Transactions on Reliability R-26, 2 (June","author":"Test Allocation","year":"1977"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.199724"},{"key":"e_1_3_2_1_50_1","volume-title":"Machine Learning, and Clinical Medicine. The New England journal of medicine 375, 13 (09","author":"Obermeyer Ziad","year":"2016"},{"key":"e_1_3_2_1_51_1","volume-title":"Tensorfuzz: Debugging neural networks with coverage-guided fuzzing. arXiv preprint arXiv:1807.10875","author":"Odena Augustus","year":"2018"},{"key":"e_1_3_2_1_52_1","unstructured":"Art B. Owen. 2013.  Art B. Owen. 2013."},{"key":"e_1_3_2_1_53_1","unstructured":"Monte Carlo theory methods and examples. https:\/\/statweb.stanford.edu\/ owen\/mc\/.  Monte Carlo theory methods and examples. https:\/\/statweb.stanford.edu\/ owen\/mc\/."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132785"},{"key":"e_1_3_2_1_55_1","unstructured":"P\u00e1l R\u00e9v\u00e9sz. 2005.  P\u00e1l R\u00e9v\u00e9sz. 2005."},{"key":"e_1_3_2_1_56_1","unstructured":"Random walk in random and non-random environments. World Scientific.  Random walk in random and non-random environments. World Scientific."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1980.1056144"},{"key":"e_1_3_2_1_58_1","volume-title":"Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556","author":"Simonyan Karen","year":"2014"},{"key":"e_1_3_2_1_59_1","volume-title":"Testing Deep Neural Networks. CoRR abs\/1803.04792","author":"Sun Youcheng","year":"2018"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238172"},{"key":"e_1_3_2_1_61_1","unstructured":"David H. Wolpert. 1996.  David H. Wolpert. 1996."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1996.8.7.1341"},{"key":"e_1_3_2_1_63_1","unstructured":"neco.1996.8.7.1341  neco.1996.8.7.1341"},{"key":"e_1_3_2_1_64_1","unstructured":"Mengshi Zhang Yuqun Zhang Lingming Zhang Cong Liu and Sarfraz Khurshid. 2018.  Mengshi Zhang Yuqun Zhang Lingming Zhang Cong Liu and Sarfraz Khurshid. 2018."}],"event":{"name":"ESEC\/FSE '19: 27th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Tallinn Estonia","acronym":"ESEC\/FSE '19","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338906.3338930","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338906.3338930","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:26:20Z","timestamp":1750206380000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338906.3338930"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,12]]},"references-count":64,"alternative-id":["10.1145\/3338906.3338930","10.1145\/3338906"],"URL":"https:\/\/doi.org\/10.1145\/3338906.3338930","relation":{},"subject":[],"published":{"date-parts":[[2019,8,12]]},"assertion":[{"value":"2019-08-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}