{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T20:10:36Z","timestamp":1770754236525,"version":"3.50.0"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,12]],"date-time":"2019-08-12T00:00:00Z","timestamp":1565568000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"JSPS KAKENHI Grant","award":["19H04086"],"award-info":[{"award-number":["19H04086"]}]},{"name":"NTU research grant","award":["NGF-2019-06-024"],"award-info":[{"award-number":["NGF-2019-06-024"]}]},{"name":"National Satellite of Excellence in Trustworthy Software System","award":["NRF2018NCR-NSOE003-0001"],"award-info":[{"award-number":["NRF2018NCR-NSOE003-0001"]}]},{"name":"National Research Foundation","award":["NRF2018NCR-NCR005-0001"],"award-info":[{"award-number":["NRF2018NCR-NCR005-0001"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,12]]},"DOI":"10.1145\/3338906.3338954","type":"proceedings-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T12:21:03Z","timestamp":1565353263000},"page":"477-487","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":125,"title":["DeepStellar: model-based quantitative analysis of stateful deep learning systems"],"prefix":"10.1145","author":[{"given":"Xiaoning","family":"Du","sequence":"first","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"given":"Xiaofei","family":"Xie","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"given":"Yi","family":"Li","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"given":"Lei","family":"Ma","sequence":"additional","affiliation":[{"name":"Kyushu University, Japan"}]},{"given":"Yang","family":"Liu","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore \/ Zhejiang Sci-Tech University, China"}]},{"given":"Jianjun","family":"Zhao","sequence":"additional","affiliation":[{"name":"Kyushu University, Japan"}]}],"member":"320","published-online":{"date-parts":[[2019,8,12]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Mozilla Common Voice. https:\/\/voice.mozilla.org\/en","year":"2018"},{"key":"e_1_3_2_1_2_1","unstructured":"Martin Abadi Paul Barham Jianmin Chen Zhifeng Chen and etal 2016. TensorFlow: A system for large-scale machine learning. In OSDI. 265\u2013283.   Martin Abadi Paul Barham Jianmin Chen Zhifeng Chen and et al. 2016. TensorFlow: A system for large-scale machine learning. In OSDI. 265\u2013283."},{"key":"e_1_3_2_1_3_1","volume-title":"Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. (jan","author":"Carlini Nicholas","year":"2018"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/950790.951318"},{"key":"e_1_3_2_1_5_1","volume-title":"Dzmitry Bahdanau, and Yoshua Bengio.","author":"Cho Kyunghyun","year":"2014"},{"key":"e_1_3_2_1_6_1","unstructured":"Fran\u00e7ois Chollet et al. 2015. Keras. https:\/\/github.com\/fchollet\/keras.  Fran\u00e7ois Chollet et al. 2015. Keras. https:\/\/github.com\/fchollet\/keras."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Dan Ciregan Ueli Meier and J\u00fcrgen Schmidhuber. 2012. Multi-column deep neural networks for image classification. In CVPR. 3642\u20133649.   Dan Ciregan Ueli Meier and J\u00fcrgen Schmidhuber. 2012. Multi-column deep neural networks for image classification. In CVPR. 3642\u20133649.","DOI":"10.1109\/CVPR.2012.6248110"},{"key":"e_1_3_2_1_8_1","volume-title":"SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems. arXiv preprint arXiv:1901.07846","author":"Du Tianyu","year":"2019"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.10.010"},{"key":"e_1_3_2_1_10_1","volume-title":"Detecting adversarial samples from artifacts. arXiv preprint arXiv:1703.00410","author":"Feinman Reuben","year":"2017"},{"key":"e_1_3_2_1_11_1","volume-title":"Introduction to the Theory of Finite-State Machines","author":"Gill Arthur"},{"key":"e_1_3_2_1_12_1","volume-title":"Explaining and Harnessing Adversarial Examples. In International Conference on Learning Representations. http:\/\/arxiv.org\/abs\/1412","author":"Goodfellow Ian","year":"2015"},{"key":"e_1_3_2_1_13_1","unstructured":"Google Accident. 2016. A Google self-driving car caused a crash for the first time. https:\/\/www.theverge.com\/2016\/2\/29\/11134344\/google-self-driving-carcrash-report  Google Accident. 2016. A Google self-driving car caused a crash for the first time. https:\/\/www.theverge.com\/2016\/2\/29\/11134344\/google-self-driving-carcrash-report"},{"key":"e_1_3_2_1_14_1","volume-title":"A baseline for detecting misclassified and out-of-distribution examples in neural networks. arXiv preprint arXiv:1610.02136","author":"Hendrycks Dan","year":"2016"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2205597"},{"key":"e_1_3_2_1_16_1","unstructured":"Sepp Hochreiter Yoshua Bengio Paolo Frasconi J\u00fcrgen Schmidhuber etal 2001. Gradient flow in recurrent nets: the difficulty of learning long-term dependencies.  Sepp Hochreiter Yoshua Bengio Paolo Frasconi J\u00fcrgen Schmidhuber et al. 2001. Gradient flow in recurrent nets: the difficulty of learning long-term dependencies."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_1_18_1","volume-title":"Man Sci, Peter Tino, and Peter Tino.","author":"Horne Bill G.","year":"1998"},{"key":"e_1_3_2_1_19_1","volume-title":"Learning with Interpretable Structure from RNN. (oct","author":"Hou Bo-Jian","year":"2018"},{"key":"e_1_3_2_1_20_1","volume-title":"Ng","author":"Huval Brody","year":"2015"},{"key":"e_1_3_2_1_21_1","unstructured":"arXiv: 1504.01716 http:\/\/arxiv.org\/abs\/1504.01716  arXiv: 1504.01716 http:\/\/arxiv.org\/abs\/1504.01716"},{"key":"e_1_3_2_1_22_1","volume-title":"International Encyclopedia of Statistical Science","author":"Jolliffe Ian"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00108"},{"key":"e_1_3_2_1_24_1","volume-title":"Adversarial examples in the physical world. arXiv preprint arXiv:1607.02533","author":"Kurakin Alexey","year":"2016"},{"key":"e_1_3_2_1_25_1","volume-title":"Enhancing the reliability of out-ofdistribution image detection in neural networks. arXiv preprint arXiv:1706.02690","author":"Liang Shiyu","year":"2017"},{"key":"e_1_3_2_1_26_1","volume-title":"Secure Deep Learning Engineering: A Software Quality Assurance Perspective. arXiv e-prints (Oct","author":"Ma Lei","year":"2018"},{"key":"e_1_3_2_1_27_1","volume-title":"DeepCT: Tomographic Combinatorial Testing for Deep Learning Systems. In 2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER). 614\u2013618","author":"Ma Lei","year":"2019"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238202"},{"key":"e_1_3_2_1_29_1","volume-title":"DeepMutation: Mutation Testing of Deep Learning Systems. In 29th IEEE International Symposium on Software Reliability Engineering (ISSRE)","author":"Ma Lei","year":"2018"},{"key":"e_1_3_2_1_30_1","volume-title":"NIC: Detecting Adversarial Samples with Neural Network Invariant Checking. In NDSS. 24\u201327.","author":"Ma Shiqing","year":"2019"},{"key":"e_1_3_2_1_31_1","volume-title":"On a test of whether one of two random variables is stochastically larger than the other. The annals of mathematical statistics","author":"Mann Henry B","year":"1947"},{"key":"e_1_3_2_1_32_1","volume-title":"On detecting adversarial perturbations. arXiv preprint arXiv:1702.04267","author":"Metzen Jan Hendrik","year":"2017"},{"key":"e_1_3_2_1_33_1","volume-title":"DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks. CVPR","author":"Moosavi-Dezfooli Seyed-Mohsen","year":"2016"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"J. R. Norris. 1997. Markov Chains. Cambridge University Press.  J. R. Norris. 1997. Markov Chains. Cambridge University Press.","DOI":"10.1017\/CBO9780511810633"},{"key":"e_1_3_2_1_35_1","volume-title":"TensorFuzz: Debugging Neural Networks with Coverage-Guided Fuzzing. (2018). arXiv","author":"Odena Augustus","year":"1807"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/0893-6080(95)00086-0"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132785"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-1076"},{"key":"e_1_3_2_1_39_1","volume-title":"A neural attention model for abstractive sentence summarization. arXiv preprint arXiv:1509.00685","author":"Rush Alexander M","year":"2015"},{"key":"e_1_3_2_1_40_1","volume-title":"The proof and measurement of association between two things. The American journal of psychology 100, 3\/4","author":"Spearman Charles","year":"1987"},{"key":"e_1_3_2_1_41_1","volume-title":"Testing Deep Neural Networks. arXiv preprint arXiv:1803.04792","author":"Sun Youcheng","year":"2018"},{"key":"e_1_3_2_1_42_1","unstructured":"Youcheng Sun Min Wu Wenjie Ruan Xiaowei Huang Marta Kwiatkowska and Daniel Kroening. 2018. Concolic Testing for Deep Neural Networks. (2018).  Youcheng Sun Min Wu Wenjie Ruan Xiaowei Huang Marta Kwiatkowska and Daniel Kroening. 2018. Concolic Testing for Deep Neural Networks. (2018)."},{"key":"e_1_3_2_1_43_1","unstructured":"arXiv: 1805.00089  arXiv: 1805.00089"},{"key":"e_1_3_2_1_44_1","unstructured":"The BBC. 2016. AI image recognition fooled by single pixel change. https: \/\/www.bbc.com\/news\/technology-41845878  The BBC. 2016. AI image recognition fooled by single pixel change. https: \/\/www.bbc.com\/news\/technology-41845878"},{"key":"e_1_3_2_1_45_1","unstructured":"The New York Times. 2016. Alexa and Siri Can Hear This Hidden Command. You Can\u2019t. https:\/\/www.nytimes.com\/2018\/05\/10\/technology\/alexa-siri-hiddencommand-audio-attacks.html  The New York Times. 2016. Alexa and Siri Can Hear This Hidden Command. You Can\u2019t. https:\/\/www.nytimes.com\/2018\/05\/10\/technology\/alexa-siri-hiddencommand-audio-attacks.html"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","volume-title":"Handbook of Grid Generation","author":"Thompson Joe F","DOI":"10.1201\/9781420050349"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180220"},{"key":"e_1_3_2_1_48_1","unstructured":"Uber Accident. 2018. After Fatal Uber Crash a Self-Driving Start-Up Moves Forward. https:\/\/www.nytimes.com\/2018\/05\/07\/technology\/uber-crashautonomous-driveai.html  Uber Accident. 2018. After Fatal Uber Crash a Self-Driving Start-Up Moves Forward. https:\/\/www.nytimes.com\/2018\/05\/07\/technology\/uber-crashautonomous-driveai.html"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00126"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco_a_01111"},{"key":"e_1_3_2_1_51_1","volume-title":"Extracting Automata from Recurrent Neural Networks Using Queries and Counterexamples. arXiv preprint arXiv:1711.09576","author":"Weiss Gail","year":"2017"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330579"},{"key":"e_1_3_2_1_53_1","unstructured":"Xiaofei Xie Lei Ma Haijun Wang Yuekang Li Yang Liu and Xiaohong Li. 2019. DiffChaser: Detecting Disagreements for Deep Neural Networks. In IJCAI.  Xiaofei Xie Lei Ma Haijun Wang Yuekang Li Yang Liu and Xiaohong Li. 2019. DiffChaser: Detecting Disagreements for Deep Neural Networks. In IJCAI."},{"key":"e_1_3_2_1_54_1","volume-title":"Feature squeezing: Detecting adversarial examples in deep neural networks. arXiv preprint arXiv:1704.01155","author":"Xu Weilin","year":"2017"},{"key":"e_1_3_2_1_55_1","volume-title":"Machine Learning Testing: Survey, Landscapes and Horizons. arXiv e-prints (Jun","author":"Zhang Jie M.","year":"2019"}],"event":{"name":"ESEC\/FSE '19: 27th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Tallinn Estonia","acronym":"ESEC\/FSE '19","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338906.3338954","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338906.3338954","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:26:21Z","timestamp":1750206381000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338906.3338954"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,12]]},"references-count":55,"alternative-id":["10.1145\/3338906.3338954","10.1145\/3338906"],"URL":"https:\/\/doi.org\/10.1145\/3338906.3338954","relation":{},"subject":[],"published":{"date-parts":[[2019,8,12]]},"assertion":[{"value":"2019-08-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}