{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T03:22:14Z","timestamp":1774495334915,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,18]],"date-time":"2020-07-18T00:00:00Z","timestamp":1595030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,18]]},"DOI":"10.1145\/3395363.3397346","type":"proceedings-article","created":{"date-parts":[[2020,7,13]],"date-time":"2020-07-13T21:44:18Z","timestamp":1594676658000},"page":"165-176","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":53,"title":["Effective white-box testing of deep neural networks with adaptive neuron-selection strategy"],"prefix":"10.1145","author":[{"given":"Seokhyun","family":"Lee","sequence":"first","affiliation":[{"name":"Korea University, South Korea"}]},{"given":"Sooyoung","family":"Cha","sequence":"additional","affiliation":[{"name":"Korea University, South Korea"}]},{"given":"Dain","family":"Lee","sequence":"additional","affiliation":[{"name":"Korea University, South Korea"}]},{"given":"Hakjoo","family":"Oh","sequence":"additional","affiliation":[{"name":"Korea University, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2020,7,18]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"265","volume-title":"Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation (OSDI'16)","author":"Abadi Mart\u00edn","year":"2016"},{"key":"e_1_3_2_1_2_1","volume-title":"Davide Del Testa","author":"Bojarski Mariusz","year":"2016"},{"key":"e_1_3_2_1_3_1","first-page":"39","volume-title":"Towards Evaluating the Robustness of Neural Networks. In 2017 IEEE Symposium on Security and Privacy (S&P'17)","author":"Carlini N."},{"key":"e_1_3_2_1_4_1","volume-title":"Automatically Generating Search Heuristics for Concolic Testing. 2018 IEEE\/ACM 40th International Conference on Software Engineering (ICSE) ( 2018 ), 1244-1254","author":"Cha Sooyoung","year":"2018"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338964"},{"key":"e_1_3_2_1_6_1","unstructured":"Fran\u00e7ois Chollet et al. 2015. Keras. https:\/\/keras.io.  Fran\u00e7ois Chollet et al. 2015. Keras. https:\/\/keras.io."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Hasan Ferit Eniser Simos Gerasimou and Alper Sen. 2019. DeepFault: Fault Localization for Deep Neural Networks. In Fundamental Approaches to Software Engineering (FASE'19). 171-191.  Hasan Ferit Eniser Simos Gerasimou and Alper Sen. 2019. DeepFault: Fault Localization for Deep Neural Networks. In Fundamental Approaches to Software Engineering (FASE'19). 171-191.","DOI":"10.1007\/978-3-030-16722-6_10"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D16-1044"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.265"},{"key":"e_1_3_2_1_11_1","volume-title":"Explaining and Harnessing Adversarial Examples. In International Conference on Learning Representations (ICLR'15)","author":"Goodfellow Ian","year":"2015"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3264835"},{"key":"e_1_3_2_1_13_1","first-page":"770","volume-title":"Deep Residual Learning for Image Recognition. In 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR'16)","author":"He K."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.167"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00108"},{"key":"e_1_3_2_1_16_1","volume-title":"The International Conference on Learning Representations (ICLR'17)","author":"Kurakin Alexey","year":"2017"},{"key":"e_1_3_2_1_17_1","volume-title":"Proc. IEEE ( 1998 ), 2278-2324","author":"Lecun Y."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238202"},{"key":"e_1_3_2_1_19_1","volume-title":"Chao Xie, Li Li, Jianjun Zhao Yang Liu, and Yadong Wang.","author":"Ma Lei","year":"2018"},{"key":"e_1_3_2_1_20_1","volume-title":"MODE: Automated Neural Network Model Debugging via State Diferential Analysis and Input Selection.","author":"Ma Shiqing","year":"2018"},{"key":"e_1_3_2_1_21_1","first-page":"807","volume-title":"Proceedings of the 27th International Conference on International Conference on Machine Learning (ICML'10)","author":"Nair Vinod"},{"key":"e_1_3_2_1_22_1","first-page":"4901","volume-title":"Proceedings of the 36th International Conference on Machine Learning (ICML'19)","author":"Odena Augustus"},{"key":"e_1_3_2_1_23_1","volume-title":"The Limitations of Deep Learning in Adversarial Settings. In 2016 IEEE European Symposium on Security and Privacy. 372-387","author":"Papernot N."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132785"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/3157096.3157360"},{"key":"e_1_3_2_1_26_1","volume-title":"Chexnet: Radiologist-level pneumonia detection on chest x-rays with deep learning. arXiv preprint arXiv:1711.05225 ( 2017 ).","author":"Rajpurkar Pranav","year":"2017"},{"key":"e_1_3_2_1_27_1","first-page":"85","volume-title":"Towards Improved Testing For Deep Learning. In 2019 IEEE\/ACM 41st International Conference on Software Engineering: New Ideas and Emerging Results (ICSE'19)","author":"Sekhon J."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"David Silver Julian Schrittwieser Karen Simonyan Ioannis Antonoglou Aja Huang Arthur Guez Thomas Hubert Lucas Baker Matthew Lai Adrian Bolton etal 2017. Mastering the game of go without human knowledge. Nature 550 ( 2017 ) 354.  David Silver Julian Schrittwieser Karen Simonyan Ioannis Antonoglou Aja Huang Arthur Guez Thomas Hubert Lucas Baker Matthew Lai Adrian Bolton et al. 2017. Mastering the game of go without human knowledge. Nature 550 ( 2017 ) 354.","DOI":"10.1038\/nature24270"},{"key":"e_1_3_2_1_29_1","volume-title":"Very Deep Convolutional Networks for Large-Scale Image Recognition. In 3rd International Conference on Learning Representations (ICLR'15)","author":"Simonyan Karen","year":"2015"},{"key":"e_1_3_2_1_30_1","volume-title":"Testing Deep Neural Networks. CoRR abs\/","author":"Sun Youcheng","year":"1803"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion.2019.00051"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion.2019.00134"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180220"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330579"},{"key":"e_1_3_2_1_35_1","volume-title":"International conference on machine learning (ICML'15)","author":"Xu Kelvin","year":"2015"},{"key":"e_1_3_2_1_36_1","first-page":"4651","volume-title":"Image Captioning with Semantic Attention. In 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR'16)","author":"You Q."},{"key":"e_1_3_2_1_37_1","unstructured":"Micha\u00c5\u0106 Zalewski. 2007. American fuzzy lop. http:\/\/lcamtuf.coredump.cx\/afl\/  Micha\u00c5\u0106 Zalewski. 2007. American fuzzy lop. http:\/\/lcamtuf.coredump.cx\/afl\/"},{"key":"e_1_3_2_1_38_1","first-page":"818","volume-title":"Visualizing and Understanding Convolutional Networks. In European conference on computer vision (ECCV'14)","author":"Matthew"}],"event":{"name":"ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Virtual Event USA","acronym":"ISSTA '20","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3395363.3397346","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3395363.3397346","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:35Z","timestamp":1750199915000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3395363.3397346"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,18]]},"references-count":38,"alternative-id":["10.1145\/3395363.3397346","10.1145\/3395363"],"URL":"https:\/\/doi.org\/10.1145\/3395363.3397346","relation":{},"subject":[],"published":{"date-parts":[[2020,7,18]]},"assertion":[{"value":"2020-07-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}