{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T16:35:50Z","timestamp":1778258150194,"version":"3.51.4"},"reference-count":369,"publisher":"Association for Computing Machinery (ACM)","issue":"5","license":[{"start":{"date-parts":[[2023,7,24]],"date-time":"2023-07-24T00:00:00Z","timestamp":1690156800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Anhui Provincial Department of Science and Technology","award":["202103a05020009"],"award-info":[{"award-number":["202103a05020009"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61972373"],"award-info":[{"award-number":["61972373"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100005145","name":"Basic Research Program of Jiangsu Province","doi-asserted-by":"crossref","award":["BK20201192"],"award-info":[{"award-number":["BK20201192"]}],"id":[{"id":"10.13039\/501100005145","id-type":"DOI","asserted-by":"crossref"}]},{"name":"National Research Foundation Singapore under its NSoE Programme","award":["NSOE-TSS2019-03"],"award-info":[{"award-number":["NSOE-TSS2019-03"]}]},{"name":"CAS Pioneer Hundred Talents Program of China"},{"name":"Canada CIFAR AI Chairs Program, NSERC","award":["RGPIN-2021-02549, RGPAS-2021-00034, DGECR-2021-00019"],"award-info":[{"award-number":["RGPIN-2021-02549, RGPAS-2021-00034, DGECR-2021-00019"]}]},{"name":"JSPS KAKENHI","award":["JP20H04168, No. JP21H04877"],"award-info":[{"award-number":["JP20H04168, No. JP21H04877"]}]},{"DOI":"10.13039\/501100020959","name":"JST-Mirai Program","doi-asserted-by":"crossref","award":["JPMJMI20B8"],"award-info":[{"award-number":["JPMJMI20B8"]}],"id":[{"id":"10.13039\/501100020959","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Softw. Eng. Methodol."],"published-print":{"date-parts":[[2023,9,30]]},"abstract":"<jats:p>\n            <jats:italic>Automated Driving Systems<\/jats:italic>\n            (\n            <jats:italic>ADS<\/jats:italic>\n            ) have made great achievements in recent years thanks to the efforts from both academia and industry. A typical ADS is composed of multiple modules, including sensing, perception, planning, and control, which brings together the latest advances in different domains. Despite these achievements, safety assurance of ADS is of great significance, since unsafe behavior of ADS can bring catastrophic consequences. Testing has been recognized as an important system validation approach that aims to expose unsafe system behavior; however, in the context of ADS, it is extremely challenging to devise effective testing techniques, due to the high complexity and multidisciplinarity of the systems. There has been great much literature that focuses on the testing of ADS, and a number of surveys have also emerged to summarize the technical advances. Most of the surveys focus on the system-level testing performed within software simulators, and they thereby ignore the distinct features of different modules. In this article, we provide a comprehensive survey on the existing ADS testing literature, which takes into account both module-level and system-level testing. Specifically, we make the following contributions: (1) We survey the module-level testing techniques for ADS and highlight the technical differences affected by the features of different modules; (2) we also survey the system-level testing techniques, with focuses on the empirical studies that summarize the issues occurring in system development or deployment, the problems due to the collaborations between different modules, and the gap between ADS testing in simulators and the real world; and (3) we identify the challenges and opportunities in ADS testing, which pave the path to the future research in this field.\n          <\/jats:p>","DOI":"10.1145\/3579642","type":"journal-article","created":{"date-parts":[[2023,2,10]],"date-time":"2023-02-10T12:11:15Z","timestamp":1676031075000},"page":"1-62","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":117,"title":["A Survey on Automated Driving System Testing: Landscapes and Trends"],"prefix":"10.1145","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3019-2598","authenticated-orcid":false,"given":"Shuncheng","family":"Tang","sequence":"first","affiliation":[{"name":"University of Science and Technology of China, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3854-9846","authenticated-orcid":false,"given":"Zhenya","family":"Zhang","sequence":"additional","affiliation":[{"name":"Kyushu University, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4217-029X","authenticated-orcid":false,"given":"Yi","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4289-5151","authenticated-orcid":false,"given":"Jixiang","family":"Zhou","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2091-7732","authenticated-orcid":false,"given":"Yan","family":"Guo","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8766-7235","authenticated-orcid":false,"given":"Shuang","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Intelligence and Computing, Tianjin University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9145-9279","authenticated-orcid":false,"given":"Shengjian","family":"Guo","sequence":"additional","affiliation":[{"name":"Baidu Security, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5755-7115","authenticated-orcid":false,"given":"Yan-Fu","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Industrial Engineering, Tsinghua University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8621-2420","authenticated-orcid":false,"given":"Lei","family":"Ma","sequence":"additional","affiliation":[{"name":"University of Alberta, Alberta Machine Intelligence Institute, Canada and Kyushu University, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2979-7151","authenticated-orcid":false,"given":"Yinxing","family":"Xue","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7300-9215","authenticated-orcid":false,"given":"Yang","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Nanyang Technological University, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2023,7,24]]},"reference":[{"key":"e_1_3_2_2_2","unstructured":"Mordor Intelligence Inc. 2022. Autonomous (Driverless) Car Market\u2014Growth Trends COVID-19 Impact and Forecast (2022\u20132027). Retrieved from https:\/\/www.mordorintelligence.com\/industry-reports\/autonomous-driverless-cars-market-potential-estimation."},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2018.12.006"},{"key":"e_1_3_2_4_2","unstructured":"Bay City News. 2022. Fatal Crash on SB I-680 Onramp in San Jose. Retrieved from https:\/\/www.kron4.com\/news\/bay-area\/fatal-crash-on-sb-i-680-onramp-in-san-jose\/."},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.3390\/machines5010006"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1002\/rob.21918"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.3390\/s19030648"},{"key":"e_1_3_2_8_2","article-title":"Finding critical scenarios for automated driving systems: A systematic mapping study","author":"Zhang Xinhai","year":"2022","unstructured":"Xinhai Zhang, Jianbo Tao, Kaige Tan, Martin Torngren, Jose Manuel Gaspar Sanchez, Muhammad Rusyadi Ramli, Xin Tao, Magnus Gyllenhammar, Franz Wotawa, Naveen Mohan, et\u00a0al. 2022. Finding critical scenarios for automated driving systems: A systematic mapping study. IEEE Trans. Softw. Eng. (2022).","journal-title":"IEEE Trans. Softw. Eng."},{"key":"e_1_3_2_9_2","article-title":"A survey on scenario-based testing for automated driving systems in high-fidelity simulation","author":"Zhong Ziyuan","year":"2021","unstructured":"Ziyuan Zhong, Yun Tang, Yuan Zhou, Vania de Oliveira Neves, Yang Liu, and Baishakhi Ray. 2021. A survey on scenario-based testing for automated driving systems in high-fidelity simulation. arXiv:2112.00964. Retrieved from https:\/\/arxiv.org\/abs\/2112.00964.","journal-title":"arXiv:2112.00964"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICST49551.2021.00030"},{"key":"e_1_3_2_11_2","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1117\/12.280797","volume-title":"Signal Processing, Sensor Fusion, and Target Recognition VI","author":"Julier Simon J.","year":"1997","unstructured":"Simon J. Julier and Jeffrey K. Uhlmann. 1997. New extension of the Kalman filter to nonlinear systems. In Signal Processing, Sensor Fusion, and Target Recognition VI, Vol. 3068. International Society for Optics and Photonics, 182\u2013193."},{"key":"e_1_3_2_12_2","first-page":"91","volume-title":"Proceedings of the 28th International Conference on Neural Information Processing Systems (NIPS\u201915)","author":"Ren Shaoqing","year":"2015","unstructured":"Shaoqing Ren, Kaiming He, Ross Girshick, and Jian Sun. 2015. Faster r-cnn: Towards real-time object detection with region proposal networks. In Proceedings of the 28th International Conference on Neural Information Processing Systems (NIPS\u201915). 91\u201399."},{"key":"e_1_3_2_13_2","unstructured":"Joseph Redmon and Ali Farhadi. 2018. Yolov3: An incremental improvement. arXiv:1804.02767. Retrieved from https:\/\/arxiv.org\/abs\/1804.02767"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1007\/1-84628-148-2"},{"key":"e_1_3_2_15_2","volume-title":"Model Predictive Control","author":"Camacho Eduardo F.","year":"2013","unstructured":"Eduardo F. Camacho and Carlos Bordons Alba. 2013. Model Predictive Control. Springer."},{"key":"e_1_3_2_16_2","unstructured":"BeamNG. BeamNG.tech. Retrieved from https:\/\/beamng.tech\/."},{"key":"e_1_3_2_17_2","unstructured":"Eric Walz. Retrieved from https:\/\/m.futurecar.com\/5209\/Baidus-Apollo-Go-Robotaxis-Are-Now-Deployed-in-All-of-Chinas-Top-Tier-Cities-After-Launching-in-Shenzhen."},{"key":"e_1_3_2_18_2","unstructured":"TIER IV. Retrieved from https:\/\/www.mih-ev.org\/en\/featuring-info\/?id=1140."},{"key":"e_1_3_2_19_2","unstructured":"R.Baldwin. Retrieved from https:\/\/www.engadget.com\/2020-01-13-comma-two-openpilot-hands-on.html."},{"key":"e_1_3_2_20_2","unstructured":"Baidu. Retrieved from https:\/\/cyber-rt.readthedocs.io\/en\/latest\/."},{"key":"e_1_3_2_21_2","unstructured":"ROS. Retrieved from https:\/\/www.ros.org\/."},{"key":"e_1_3_2_22_2","unstructured":"comma.ai. Retrieved from https:\/\/comma.ai\/shop\/products\/comma-car-harness."},{"key":"e_1_3_2_23_2","unstructured":"comma.ai. Retrieved from https:\/\/comma.ai\/shop\/products\/two."},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA48506.2021.9561747"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3492321.3519576"},{"key":"e_1_3_2_26_2","unstructured":"BeamNG Gmbh. BeamNG.tech Technical Paper. Retrieved from https:\/\/www.beamng.gmbh\/research."},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/SBST52555.2021.00011"},{"key":"e_1_3_2_28_2","unstructured":"BeamNG. BeamNG.AI. Retrieved from https:\/\/documentation.beamng.com\/tutorials\/ai\/."},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.7304210"},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/2601248.2601268"},{"key":"e_1_3_2_31_2","unstructured":"Testing of Autonomous Vehicles with a Driver. 2019. State of California Department of Motor Vehicles. Retrieved from https:\/\/www.dmv.ca.gov\/portal\/dmv\/detail\/vr\/autonomous\/testing."},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3417063"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468559"},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2022.111425"},{"key":"e_1_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380397"},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW53611.2021.00057"},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2017.7510745"},{"key":"e_1_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.aap.2019.105406"},{"key":"e_1_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3003527"},{"key":"e_1_3_2_40_2","volume-title":"Discrete Choice Methods with Simulation","author":"Train Kenneth E.","year":"2009","unstructured":"Kenneth E. Train. 2009. Discrete Choice Methods with Simulation. Cambridge University Press."},{"key":"e_1_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2019.8916775"},{"key":"e_1_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0184952"},{"key":"e_1_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0214550"},{"key":"e_1_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.iatssr.2020.03.001"},{"key":"e_1_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.1145\/3486629.3490692"},{"key":"e_1_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.aap.2021.106017"},{"key":"e_1_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/IV48863.2021.9576007"},{"key":"e_1_3_2_48_2","unstructured":"Department for Transport. 2019. Road Safety Data\u2014STATS19. Retrieved from https:\/\/data.gov.uk\/dataset\/cb7ae6f0-4be6-4935-927747e5ce24a11f\/road-safety-data."},{"key":"e_1_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2017.7995723"},{"key":"e_1_3_2_50_2","first-page":"1","article-title":"Driver Acceptance and behavioral changes with an Integrated warning system: Key findings from the IVBSS FOT","author":"LeBlanc D.","year":"2011","unstructured":"D. LeBlanc, James R. Sayer, Shan Bao, Scott Bogard, Mary Lynn Buonarosa, Adam Blankespoor, and Dillon Funkhouser. 2011. Driver Acceptance and behavioral changes with an Integrated warning system: Key findings from the IVBSS FOT. In Proceedings of the 22nd International Technical Conference on the Enhanced Safety of Vehicles (ESV\u201911), 1\u201310.","journal-title":"Proceedings of the 22nd International Technical Conference on the Enhanced Safety of Vehicles (ESV\u201911)"},{"key":"e_1_3_2_51_2","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2016.7795565"},{"key":"e_1_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2018.8569624"},{"key":"e_1_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_22"},{"issue":"8","key":"e_1_3_2_54_2","first-page":"109","article-title":"Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle","volume":"24","author":"Yan Chen","year":"2016","unstructured":"Chen Yan, Wenyuan Xu, and Jianhao Liu. 2016. Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle. Def Con 24, 8 (2016), 109.","journal-title":"Def Con"},{"key":"e_1_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2018.8355132"},{"key":"e_1_3_2_56_2","doi-asserted-by":"publisher","DOI":"10.3390\/s19183993"},{"key":"e_1_3_2_57_2","first-page":"1527","volume-title":"Proceedings of the 27th USENIX Security Symposium (USENIX Security\u201918)","author":"Zeng Kexiong Curtis","year":"2018","unstructured":"Kexiong Curtis Zeng, Shinan Liu, Yuanchao Shu, Dong Wang, Haoyu Li, Yanzhi Dou, Gang Wang, and Yaling Yang. 2018. All your \\(\\lbrace\\) GPS \\(\\rbrace\\) are belong to us: Towards stealthy manipulation of road navigation systems. In Proceedings of the 27th USENIX Security Symposium (USENIX Security\u201918). 1527\u20131544."},{"key":"e_1_3_2_58_2","doi-asserted-by":"publisher","DOI":"10.1145\/3474376.3487283"},{"key":"e_1_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484766"},{"key":"e_1_3_2_60_2","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1007\/978-3-319-94042-7_11","volume-title":"The NIPS\u201917 Competition: Building Intelligent Systems","author":"Kurakin Alexey","year":"2018","unstructured":"Alexey Kurakin, Ian Goodfellow, Samy Bengio, Yinpeng Dong, Fangzhou Liao, Ming Liang, Tianyu Pang, Jun Zhu, Xiaolin Hu, Cihang Xie, et\u00a0al. 2018. Adversarial attacks and defences competition. In The NIPS\u201917 Competition: Building Intelligent Systems. Springer, 195\u2013231."},{"key":"e_1_3_2_61_2","first-page":"2672","volume-title":"Proceedings of the 27th International Conference on Neural Information Processing Systems (NIPS\u201914)","author":"Goodfellow Ian","year":"2014","unstructured":"Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative adversarial nets. In Proceedings of the 27th International Conference on Neural Information Processing Systems (NIPS\u201914). 2672\u20132680."},{"key":"e_1_3_2_62_2","first-page":"52","volume-title":"Joint European Conference on Machine Learning and Knowledge Discovery in Databases","author":"Chen Shang-Tse","year":"2018","unstructured":"Shang-Tse Chen, Cory Cornelius, Jason Martin, and Duen Horng Polo Chau. 2018. Shapeshifter: Robust physical adversarial attack on faster r-cnn object detector. In Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, 52\u201368."},{"key":"e_1_3_2_63_2","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354259"},{"key":"e_1_3_2_64_2","article-title":"CAMOU: Learning a vehicle camouflage for physical adversarial attack on object detections in the wild","author":"Zhang Yang","year":"2019","unstructured":"Yang Zhang, P. D. Hassan Foroosh, and Boqing Gong. 2019. CAMOU: Learning a vehicle camouflage for physical adversarial attack on object detections in the wild. In Proceedings of the International Conference on Learning Representations (ICLR\u201919).","journal-title":"Proceedings of the International Conference on Learning Representations (ICLR\u201919)"},{"key":"e_1_3_2_65_2","doi-asserted-by":"publisher","DOI":"10.1109\/IV51971.2022.9827222"},{"key":"e_1_3_2_66_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3024643"},{"issue":"8","key":"e_1_3_2_67_2","first-page":"6337","article-title":"Adaptive square attack: Fooling autonomous cars with adversarial traffic signs","volume":"8","author":"Li Yujie","year":"2020","unstructured":"Yujie Li, Xing Xu, Jinhui Xiao, Siyuan Li, and Heng Tao Shen. 2020. Adaptive square attack: Fooling autonomous cars with adversarial traffic signs. IEEE IoT J. 8, 8 (2020), 6337\u20136347.","journal-title":"IEEE IoT J."},{"key":"e_1_3_2_68_2","doi-asserted-by":"publisher","DOI":"10.1109\/AIPR50011.2020.9425267"},{"key":"e_1_3_2_69_2","first-page":"284","volume-title":"International Conference on Machine Learning","author":"Athalye Anish","year":"2018","unstructured":"Anish Athalye, Logan Engstrom, Andrew Ilyas, and Kevin Kwok. 2018. Synthesizing robust adversarial examples. In International Conference on Machine Learning. PMLR, 284\u2013293."},{"key":"e_1_3_2_70_2","article-title":"Yolov4: Optimal speed and accuracy of object detection","author":"Bochkovskiy Alexey","year":"2020","unstructured":"Alexey Bochkovskiy, Chien-Yao Wang, and Hong-Yuan Mark Liao. 2020. Yolov4: Optimal speed and accuracy of object detection. arXiv:2004.10934. Retrieved from https:\/\/arxiv.org\/abs\/2004.10934.","journal-title":"arXiv:2004.10934"},{"key":"e_1_3_2_71_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01234-2_49"},{"key":"e_1_3_2_72_2","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339815"},{"key":"e_1_3_2_73_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00076"},{"key":"e_1_3_2_74_2","first-page":"877","volume-title":"Proceedings of the 29th USENIX Security Symposium (USENIX Security\u201920)","author":"Sun Jiachen","year":"2020","unstructured":"Jiachen Sun, Yulong Cao, Qi Alfred Chen, and Z. Morley Mao. 2020. Towards robust lidar-based perception in autonomous driving: General black-box adversarial sensor attack and countermeasures. In Proceedings of the 29th USENIX Security Symposium (USENIX Security\u201920). 877\u2013894."},{"key":"e_1_3_2_75_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.09.027"},{"key":"e_1_3_2_76_2","doi-asserted-by":"publisher","DOI":"10.1002\/int.22349"},{"key":"e_1_3_2_77_2","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485377"},{"key":"e_1_3_2_78_2","first-page":"349","volume-title":"Proceedings of the ACM Asia Conference on Computer and Communications Security","author":"Yang Kaichen","year":"2021","unstructured":"Kaichen Yang, Tzungyu Tsai, Honggang Yu, Max Panoff, Tsung-Yi Ho, and Yier Jin. 2021. Robust roadside physical adversarial attack against deep learning in lidar perception modules. In Proceedings of the ACM Asia Conference on Computer and Communications Security. 349\u2013362."},{"key":"e_1_3_2_79_2","doi-asserted-by":"publisher","DOI":"10.1145\/3485730.3485935"},{"key":"e_1_3_2_80_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00780"},{"key":"e_1_3_2_81_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00175"},{"key":"e_1_3_2_82_2","volume-title":"Proceedings of the 12th USENIX Workshop on Offensive Technologies (WOOT\u201918)","author":"Song Dawn","year":"2018","unstructured":"Dawn Song, Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Amir Rahmati, Florian Tramer, Atul Prakash, and Tadayoshi Kohno. 2018. Physical adversarial examples for object detectors. In Proceedings of the 12th USENIX Workshop on Offensive Technologies (WOOT\u201918)."},{"key":"e_1_3_2_83_2","doi-asserted-by":"publisher","DOI":"10.5555\/3304222.3304312"},{"key":"e_1_3_2_84_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011028"},{"key":"e_1_3_2_85_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3061065"},{"key":"e_1_3_2_86_2","doi-asserted-by":"publisher","DOI":"10.5555\/3201607.3201610"},{"key":"e_1_3_2_87_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.244"},{"key":"e_1_3_2_88_2","volume-title":"Proceedings of the 25th Annual Network and Distributed System Security Symposium (NDSS\u201918)","author":"Liu Yingqi","year":"2017","unstructured":"Yingqi Liu, Shiqing Ma, Yousra Aafer, Wen-Chuan Lee, Juan Zhai, Weihang Wang, and Xiangyu Zhang. 2017. Trojaning attack on neural networks. In Proceedings of the 25th Annual Network and Distributed System Security Symposium (NDSS\u201918)."},{"key":"e_1_3_2_89_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2977378"},{"key":"e_1_3_2_90_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-37228-6_15"},{"key":"e_1_3_2_91_2","doi-asserted-by":"publisher","DOI":"10.1109\/MHS.1995.494215"},{"key":"e_1_3_2_92_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00263"},{"key":"e_1_3_2_93_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2909066"},{"key":"e_1_3_2_94_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSRS53853.2021.9660660"},{"key":"e_1_3_2_95_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion52605.2021.00052"},{"key":"e_1_3_2_96_2","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C55045.2021.00016"},{"key":"e_1_3_2_97_2","doi-asserted-by":"publisher","DOI":"10.1145\/3241979"},{"key":"e_1_3_2_98_2","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510212"},{"key":"e_1_3_2_99_2","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C55045.2021.00083"},{"key":"e_1_3_2_100_2","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2018.2857402"},{"key":"e_1_3_2_101_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03769-7_23"},{"key":"e_1_3_2_102_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88494-9_18"},{"key":"e_1_3_2_103_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2016.10"},{"key":"e_1_3_2_104_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00252"},{"key":"e_1_3_2_105_2","article-title":"Metamorphic testing: A new approach for generating next test cases","author":"Chen Tsong Y.","year":"2020","unstructured":"Tsong Y. Chen, Shing C. Cheung, and Shiu Ming Yiu. 2020. Metamorphic testing: A new approach for generating next test cases. arXiv:2002.12543. Retrieved from https:\/\/arxiv.org\/abs\/2002.12543.","journal-title":"arXiv:2002.12543"},{"key":"e_1_3_2_106_2","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1977.32"},{"key":"e_1_3_2_107_2","doi-asserted-by":"publisher","DOI":"10.1007\/BF01995674"},{"key":"e_1_3_2_108_2","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132785"},{"key":"e_1_3_2_109_2","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238202"},{"key":"e_1_3_2_110_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00108"},{"key":"e_1_3_2_111_2","doi-asserted-by":"publisher","DOI":"10.1145\/1883612.1883618"},{"key":"e_1_3_2_112_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00170"},{"key":"e_1_3_2_113_2","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1007\/978-3-030-01090-4_8","volume-title":"International Symposium on Automated Technology for Verification and Analysis","author":"Cheng Chih-Hong","year":"2018","unstructured":"Chih-Hong Cheng, Chung-Hao Huang, and Hirotoshi Yasuoka. 2018. Quantitative projection coverage for testing ml-enabled autonomous systems. In International Symposium on Automated Technology for Verification and Analysis. Springer, 126\u2013142."},{"key":"e_1_3_2_114_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12239-018-0072-6"},{"key":"e_1_3_2_115_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.322"},{"key":"e_1_3_2_116_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_117_2","article-title":"Mobilenets: Efficient convolutional neural networks for mobile vision applications","author":"Howard Andrew G.","year":"2017","unstructured":"Andrew G. Howard, Menglong Zhu, Bo Chen, Dmitry Kalenichenko, Weijun Wang, Tobias Weyand, Marco Andreetto, and Hartwig Adam. 2017. Mobilenets: Efficient convolutional neural networks for mobile vision applications. arXiv:1704.04861. Retrieved from https:\/\/arxiv.org\/abs\/1704.04861.","journal-title":"arXiv:1704.04861"},{"key":"e_1_3_2_118_2","unstructured":"Kaggle InClass Challenge. Retrieved from https:\/\/www.kaggle.com\/c\/nyu-cv-fall-2018\/data."},{"key":"e_1_3_2_119_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00086"},{"key":"e_1_3_2_120_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01298"},{"key":"e_1_3_2_121_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00798"},{"key":"e_1_3_2_122_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01054"},{"key":"e_1_3_2_123_2","first-page":"652","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","author":"Qi Charles R.","year":"2017","unstructured":"Charles R. Qi, Hao Su, Kaichun Mo, and Leonidas J. Guibas. 2017. Pointnet: Deep learning on point sets for 3d classification and segmentation. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 652\u2013660."},{"key":"e_1_3_2_124_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01101"},{"key":"e_1_3_2_125_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2012.2209421"},{"key":"e_1_3_2_126_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2012.02.016"},{"key":"e_1_3_2_127_2","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"e_1_3_2_128_2","article-title":"Very deep convolutional networks for large-scale image recognition","author":"Simonyan Karen","year":"2014","unstructured":"Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv:1409.1556. Retrieved from https:\/\/arxiv.org\/abs\/1409.1556.","journal-title":"arXiv:1409.1556"},{"key":"e_1_3_2_129_2","unstructured":"V. Yadav. p2-trafficsigns. Retrieved from https:\/\/github.com\/vxy10\/p2-TrafficSigns."},{"key":"e_1_3_2_130_2","first-page":"1558","volume-title":"International Conference on Machine Learning","author":"Larsen Anders Boesen Lindbo","year":"2016","unstructured":"Anders Boesen Lindbo Larsen, S\u00f8ren Kaae S\u00f8nderby, Hugo Larochelle, and Ole Winther. 2016. Autoencoding beyond pixels using a learned similarity metric. In International Conference on Machine Learning. PMLR, 1558\u20131566."},{"key":"e_1_3_2_131_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46475-6_43"},{"key":"e_1_3_2_132_2","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_133_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01234-2_18"},{"key":"e_1_3_2_134_2","article-title":"No need to worry about adversarial examples in object detection in autonomous vehicles","author":"Lu Jiajun","year":"2017","unstructured":"Jiajun Lu, Hussein Sibai, Evan Fabry, and David Forsyth. 2017. No need to worry about adversarial examples in object detection in autonomous vehicles. arXiv:1707.03501. Retrieved from https:\/\/arxiv.org\/abs\/1707.03501.","journal-title":"arXiv:1707.03501"},{"key":"e_1_3_2_135_2","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409671"},{"key":"e_1_3_2_136_2","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409754"},{"key":"e_1_3_2_137_2","doi-asserted-by":"publisher","DOI":"10.1145\/3417330"},{"key":"e_1_3_2_138_2","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC48747.2019.00022"},{"key":"e_1_3_2_139_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCS51672.2020.00018"},{"key":"e_1_3_2_140_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICST49551.2021.00042"},{"key":"e_1_3_2_141_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA48506.2021.9560890"},{"key":"e_1_3_2_142_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICST53961.2022.00037"},{"key":"e_1_3_2_143_2","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2018.8500374"},{"key":"e_1_3_2_144_2","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2019.8814230"},{"key":"e_1_3_2_145_2","doi-asserted-by":"publisher","DOI":"10.1109\/IV51971.2022.9827237"},{"key":"e_1_3_2_146_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA46639.2022.9812041"},{"key":"e_1_3_2_147_2","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2018.8500406"},{"key":"e_1_3_2_148_2","doi-asserted-by":"publisher","DOI":"10.1162\/evco.1993.1.1.1"},{"key":"e_1_3_2_149_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICST46399.2020.00045"},{"key":"e_1_3_2_150_2","first-page":"1055","volume-title":"Proceedings of the Genetic and Evolutionary Computation Conference","author":"Cal\u00f2 Alessandro","year":"2020","unstructured":"Alessandro Cal\u00f2, Paolo Arcaini, Shaukat Ali, Florian Hauer, and Fuyuki Ishikawa. 2020. Simultaneously searching and solving multiple avoidable collisions for testing autonomous driving systems. In Proceedings of the Genetic and Evolutionary Computation Conference. 1055\u20131063."},{"key":"e_1_3_2_151_2","first-page":"987","volume-title":"Proceedings of the IEEE International Conference on Robotics and Automation","author":"Werling Moritz","year":"2010","unstructured":"Moritz Werling, Julius Ziegler, S\u00f6ren Kammel, and Sebastian Thrun. 2010. Optimal trajectory generation for dynamic street scenarios in a frenet frame. In Proceedings of the IEEE International Conference on Robotics and Automation. IEEE, 987\u2013993."},{"key":"e_1_3_2_152_2","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2017.7995977"},{"key":"e_1_3_2_153_2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN53405.2022.00020"},{"key":"e_1_3_2_154_2","doi-asserted-by":"publisher","DOI":"10.1109\/IV47402.2020.9304702"},{"key":"e_1_3_2_155_2","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC48978.2021.9564844"},{"key":"e_1_3_2_156_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2018.2858463"},{"key":"e_1_3_2_157_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-81685-8_29"},{"key":"e_1_3_2_158_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19835-9_21"},{"key":"e_1_3_2_159_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14295-6_17"},{"key":"e_1_3_2_160_2","article-title":"FalsifAI: Falsification of AI-enabled hybrid control systems guided by time-aware coverage criteria","author":"Zhang Zhenya","year":"2022","unstructured":"Zhenya Zhang, Deyun Lyu, Paolo Arcaini, Lei Ma, Ichiro Hasuo, and Jianjun Zhao. 2022. FalsifAI: Falsification of AI-enabled hybrid control systems guided by time-aware coverage criteria. IEEE Trans. Softw. Eng. (2022).","journal-title":"IEEE Trans. Softw. Eng."},{"key":"e_1_3_2_161_2","doi-asserted-by":"publisher","DOI":"10.1145\/3510457.3513049"},{"key":"e_1_3_2_162_2","doi-asserted-by":"publisher","DOI":"10.29007\/xwl1"},{"key":"e_1_3_2_163_2","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2016.7795751"},{"key":"e_1_3_2_164_2","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2019.8917375"},{"key":"e_1_3_2_165_2","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC45102.2020.9294454"},{"key":"e_1_3_2_166_2","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180220"},{"key":"e_1_3_2_167_2","first-page":"6471","volume-title":"International Conference on Machine Learning","author":"Li Zhong","year":"2021","unstructured":"Zhong Li, Minxue Pan, Tian Zhang, and Xuandong Li. 2021. Testing DNN-based autonomous driving systems under critical environmental conditions. In International Conference on Machine Learning. PMLR, 6471\u20136482."},{"key":"e_1_3_2_168_2","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380422"},{"key":"e_1_3_2_169_2","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC45102.2020.9294426"},{"key":"e_1_3_2_170_2","volume-title":"Proceedings of the International Conference on Learning Representations (ICLR\u201918)","author":"Madry Aleksander","year":"2018","unstructured":"Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2018. Towards deep learning models resistant to adversarial attacks. In Proceedings of the International Conference on Learning Representations (ICLR\u201918)."},{"key":"e_1_3_2_171_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICESS.2019.8782514"},{"key":"e_1_3_2_172_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2020.101766"},{"key":"e_1_3_2_173_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01426"},{"key":"e_1_3_2_174_2","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238187"},{"key":"e_1_3_2_175_2","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C55045.2021.00015"},{"key":"e_1_3_2_176_2","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380353"},{"key":"e_1_3_2_177_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-021-00310-0"},{"key":"e_1_3_2_178_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW52544.2021.00022"},{"key":"e_1_3_2_179_2","unstructured":"Team Rambo. Steering Angle Model: Rambo. Retrieved from https:\/\/github.com\/udacity\/self-driving-car\/tree\/master\/steering-models\/community-models\/rambo."},{"key":"e_1_3_2_180_2","unstructured":"Team Chauffeur. Steering Angle Model: Chauffeur. Retrieved from https:\/\/github.com\/udacity\/self-driving-car\/tree\/master\/steering-models\/community-models\/chauffeur."},{"key":"e_1_3_2_181_2","unstructured":"Team Epoch. Steering Angle Model: Epoch. Retrieved from https:\/\/github.com\/udacity\/self-driving-car\/tree\/master\/steering-models\/community-models\/cg23."},{"key":"e_1_3_2_182_2","unstructured":"NVIDIA. Nvidia-autopilot-keras: End to End Learning for Self-driving Sars. Retrieved from https:\/\/github.com\/0bserver07\/Nvidia-Autopilot-Keras."},{"key":"e_1_3_2_183_2","article-title":"Behavioral cloning: End-to-end Learning for Self-driving Cars","author":"Staravoitau Alex","unstructured":"Alex Staravoitau. Behavioral cloning: End-to-end Learning for Self-driving Cars. Retrived from https:\/\/github.com\/navoshta\/behavioral-cloning.","journal-title":"https:\/\/github.com\/navoshta\/behavioral-cloning"},{"key":"e_1_3_2_184_2","unstructured":"Jacob Gildenblat. 2016. Visualizations for Understanding the Regressed Wheel Steering Angle for Self Driving Cars. Retrieved from https:\/\/github.com\/jacobgil\/keras-steering-angle-visualizations."},{"key":"e_1_3_2_185_2","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2017.8317923"},{"key":"e_1_3_2_186_2","unstructured":"Team Autumn. Steering Angle Model: Autumn. Retrieved from https:\/\/github.com\/udacity\/self-driving-car\/tree\/master\/steering-models\/community-models\/autumn."},{"key":"e_1_3_2_187_2","unstructured":"Team Rwightman. 2016. Steering Angle Model: Rwightman. Retrieved from https:\/\/github.com\/udacity\/self-driving-car\/tree\/master\/steering-models\/evaluation."},{"key":"e_1_3_2_188_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10817-018-09509-5"},{"key":"e_1_3_2_189_2","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238192"},{"key":"e_1_3_2_190_2","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330566"},{"key":"e_1_3_2_191_2","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409730"},{"key":"e_1_3_2_192_2","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464811"},{"key":"e_1_3_2_193_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544792"},{"key":"e_1_3_2_194_2","doi-asserted-by":"publisher","DOI":"10.1109\/QRS54544.2021.00028"},{"key":"e_1_3_2_195_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVE52871.2022.9743067"},{"key":"e_1_3_2_196_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICMA49215.2020.9233535"},{"key":"e_1_3_2_197_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE5003.2020.00012"},{"key":"e_1_3_2_198_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26601-1_5"},{"key":"e_1_3_2_199_2","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC48978.2021.9564591"},{"key":"e_1_3_2_200_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678883"},{"issue":"4","key":"e_1_3_2_201_2","first-page":"111","article-title":"Single and multi-objective test cases prioritization for self-driving cars in virtual environments","volume":"37","author":"Birchler Christian","year":"2022","unstructured":"Christian Birchler, Sajad Khatiri, Pouria Derakhshanfar, Sebastiano Panichella, and Annibale Panichella. 2022. Single and multi-objective test cases prioritization for self-driving cars in virtual environments. Proc. ACM Meas. Anal. Comput. Syst. 37, 4, Article 111.","journal-title":"Proc. ACM Meas. Anal. Comput. Syst."},{"key":"e_1_3_2_202_2","doi-asserted-by":"publisher","DOI":"10.1109\/SANER53432.2022.00030"},{"key":"e_1_3_2_203_2","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970311"},{"key":"e_1_3_2_204_2","doi-asserted-by":"publisher","DOI":"10.3390\/app11020775"},{"key":"e_1_3_2_205_2","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2017.8317768"},{"key":"e_1_3_2_206_2","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC45102.2020.9294429"},{"key":"e_1_3_2_207_2","article-title":"Illuminating search spaces by mapping elites","author":"Mouret Jean-Baptiste","year":"2015","unstructured":"Jean-Baptiste Mouret and Jeff Clune. 2015. Illuminating search spaces by mapping elites. arXiv:1504.04909. Retrieved from https:\/\/arxiv.org\/abs\/1504.04909.","journal-title":"arXiv:1504.04909"},{"key":"e_1_3_2_208_2","unstructured":"Voyage. Deepdrive. Retrieved from https:\/\/deepdrive.io\/."},{"key":"e_1_3_2_209_2","doi-asserted-by":"publisher","DOI":"10.1109\/SBST52555.2021.00016"},{"key":"e_1_3_2_210_2","doi-asserted-by":"publisher","DOI":"10.1145\/3526072.3527538"},{"key":"e_1_3_2_211_2","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180160"},{"key":"e_1_3_2_212_2","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2018.8500400"},{"key":"e_1_3_2_213_2","first-page":"163","volume-title":"Proceedings of the IEEE Intelligent Transportation Systems Conference (ITSC\u201919)","author":"Corso Anthony","year":"2019","unstructured":"Anthony Corso, Peter Du, Katherine Driggs-Campbell, and Mykel J. Kochenderfer. 2019. Adaptive stress testing with reward augmentation for autonomous vehicle validation. In Proceedings of the IEEE Intelligent Transportation Systems Conference (ITSC\u201919). IEEE, 163\u2013168."},{"key":"e_1_3_2_214_2","article-title":"On a formal model of safe and scalable self-driving cars","author":"Shalev-Shwartz Shai","year":"2017","unstructured":"Shai Shalev-Shwartz, Shaked Shammah, and Amnon Shashua. 2017. On a formal model of safe and scalable self-driving cars. arXiv:1708.06374. Retrieved from https:\/\/arxiv.org\/abs\/1708.06374.","journal-title":"arXiv:1708.06374"},{"key":"e_1_3_2_215_2","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2021-Spring51267.2021.9448686"},{"key":"e_1_3_2_216_2","doi-asserted-by":"publisher","DOI":"10.1007\/BF00992698"},{"key":"e_1_3_2_217_2","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC45102.2020.9294590"},{"key":"e_1_3_2_218_2","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2019.8917311"},{"key":"e_1_3_2_219_2","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2018.8569631"},{"key":"e_1_3_2_220_2","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC45102.2020.9294490"},{"key":"e_1_3_2_221_2","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC45102.2020.9294636"},{"key":"e_1_3_2_222_2","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2019.8917119"},{"key":"e_1_3_2_223_2","unstructured":"IPG. Carmaker. Retrieved from https:\/\/ipg-automotive.com\/en\/products-solutions\/software\/carmaker\/."},{"key":"e_1_3_2_224_2","doi-asserted-by":"publisher","DOI":"10.5220\/0011064600003191"},{"key":"e_1_3_2_225_2","doi-asserted-by":"publisher","DOI":"10.1145\/3510466.3510474"},{"key":"e_1_3_2_226_2","doi-asserted-by":"publisher","DOI":"10.1002\/wics.56"},{"key":"e_1_3_2_227_2","first-page":"9849","article-title":"Scalable end-to-end autonomous vehicle testing via rare-event simulation","volume":"31","author":"O\u2019Kelly Matthew","year":"2018","unstructured":"Matthew O\u2019Kelly, Aman Sinha, Hongseok Namkoong, Russ Tedrake, and John C. Duchi. 2018. Scalable end-to-end autonomous vehicle testing via rare-event simulation. Adv. Neural Inf. Process. Syst. 31 (2018), 9849\u20139860.","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"e_1_3_2_228_2","article-title":"Efficient black-box assessment of autonomous vehicle safety","author":"Norden Justin","year":"2019","unstructured":"Justin Norden, Matthew O\u2019Kelly, and Aman Sinha. 2019. Efficient black-box assessment of autonomous vehicle safety. arXiv:1912.03618. Retrieved from https:\/\/arxiv.org\/abs\/1912.03618.","journal-title":"arXiv:1912.03618"},{"key":"e_1_3_2_229_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2582208"},{"key":"e_1_3_2_230_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2766172"},{"key":"e_1_3_2_231_2","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2017.8317940"},{"key":"e_1_3_2_232_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2701846"},{"key":"e_1_3_2_233_2","doi-asserted-by":"publisher","DOI":"10.23919\/ACC.2018.8431590"},{"key":"e_1_3_2_234_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2017.7989024"},{"issue":"1","key":"e_1_3_2_235_2","article-title":"Combining reachability analysis and importance sampling for accelerated evaluation of highway automated vehicles at pedestrian crossing","volume":"1","author":"Wang Xinpeng","year":"2021","unstructured":"Xinpeng Wang, Huei Peng, and Ding Zhao. 2021. Combining reachability analysis and importance sampling for accelerated evaluation of highway automated vehicles at pedestrian crossing. ASME Lett. Dynam. Syst. Contr. 1, 1 (2021).","journal-title":"ASME Lett. Dynam. Syst. Contr."},{"key":"e_1_3_2_236_2","first-page":"3309","volume-title":"Proceedings of the 30th USENIX Security Symposium (USENIX Security\u201921)","author":"Sato Takami","year":"2021","unstructured":"Takami Sato, Junjie Shen, Ningfei Wang, Yunhan Jia, Xue Lin, and Qi Alfred Chen. 2021. Dirty road can attack: Security of deep learning based automated lane centering under \\(\\lbrace\\) Physical-World \\(\\rbrace\\) attack. In Proceedings of the 30th USENIX Security Symposium (USENIX Security\u201921). 3309\u20133326."},{"key":"e_1_3_2_237_2","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2018.00016"},{"key":"e_1_3_2_238_2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW55150.2022.00045"},{"key":"e_1_3_2_239_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00978"},{"key":"e_1_3_2_240_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.iatssr.2017.02.001"},{"key":"e_1_3_2_241_2","first-page":"1","article-title":"Criticality metrics for automated driving: A review and suitability analysis of the state of the art","author":"Westhofen Lukas","year":"2022","unstructured":"Lukas Westhofen, Christian Neurohr, Tjark Koopmann, Martin Butz, Barbara Sch\u00fctt, Fabian Utesch, Birte Neurohr, Christian Gutenkunst, and Eckard B\u00f6de. 2022. Criticality metrics for automated driving: A review and suitability analysis of the state of the art. In Archives of Computational Methods in Engineering, 1\u201335.","journal-title":"Archives of Computational Methods in Engineering"},{"key":"e_1_3_2_242_2","doi-asserted-by":"publisher","DOI":"10.2208\/journalip.20.949"},{"key":"e_1_3_2_243_2","doi-asserted-by":"publisher","DOI":"10.1109\/IV47402.2020.9304635"},{"key":"e_1_3_2_244_2","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2011.5940482"},{"issue":"1318","key":"e_1_3_2_245_2","first-page":"34","article-title":"Use of speed limiters in cars for increased safety and a better environment","author":"Almqvist Sverker","year":"1991","unstructured":"Sverker Almqvist, Christer Hyden, and Ralf Risser. 1991. Use of speed limiters in cars for increased safety and a better environment. Transport. Res. Rec.1318 (1991), 34\u201339.","journal-title":"Transport. Res. Rec."},{"key":"e_1_3_2_246_2","doi-asserted-by":"publisher","DOI":"10.1177\/001872087101300503"},{"key":"e_1_3_2_247_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2016.2608003"},{"key":"e_1_3_2_248_2","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2018.8500421"},{"key":"e_1_3_2_249_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2019.2955903"},{"issue":"2","key":"e_1_3_2_250_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3460082","article-title":"A systematic framework to identify violations of scenario-dependent driving rules in autonomous vehicle software","volume":"5","author":"Zhang Qingzhao","year":"2021","unstructured":"Qingzhao Zhang, David Ke Hong, Ze Zhang, Qi Alfred Chen, Scott Mahlke, and Z. Morley Mao. 2021. A systematic framework to identify violations of scenario-dependent driving rules in autonomous vehicle software. Proc. ACM Meas. Anal. Comput. Syst. 5, 2 (2021), 1\u201325.","journal-title":"Proc. ACM Meas. Anal. Comput. Syst."},{"key":"e_1_3_2_251_2","doi-asserted-by":"publisher","DOI":"10.1145\/3387940.3392252"},{"key":"e_1_3_2_252_2","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2019.8917326"},{"key":"e_1_3_2_253_2","doi-asserted-by":"publisher","DOI":"10.1109\/IV48863.2021.9575536"},{"key":"e_1_3_2_254_2","doi-asserted-by":"publisher","DOI":"10.1109\/IV47402.2020.9304646"},{"key":"e_1_3_2_255_2","doi-asserted-by":"publisher","DOI":"10.1109\/MODELS.2019.00-12"},{"key":"e_1_3_2_256_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-98260-7_12"},{"key":"e_1_3_2_257_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICISCE50968.2020.00340"},{"key":"e_1_3_2_258_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3103912"},{"key":"e_1_3_2_259_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2019.106200"},{"key":"e_1_3_2_260_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA46639.2022.9811794"},{"key":"e_1_3_2_261_2","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2017.8317919"},{"key":"e_1_3_2_262_2","volume-title":"Proceedings of the 22nd International Technical Conference on the Enhanced Safety of Vehicles (ESV\u201911)","author":"Lee Taeyoung","year":"2011","unstructured":"Taeyoung Lee, Kyongsu Yi, Jangseop Kim, and Jaewan Lee. 2011. Development and evaluations of advanced emergency braking system algorithm for the commercial vehicle. In Proceedings of the 22nd International Technical Conference on the Enhanced Safety of Vehicles (ESV\u201911)."},{"key":"e_1_3_2_263_2","unstructured":"Udacity. Udacity\u2019s Self-Driving Car Simulator. Retrieved from https:\/\/github.com\/udacity\/self-driving-car-sim."},{"key":"e_1_3_2_264_2","unstructured":"International Electronics & Engineering. Retrieved from https:\/\/www.iee.lu\/."},{"key":"e_1_3_2_265_2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.62.1805"},{"key":"e_1_3_2_266_2","doi-asserted-by":"publisher","DOI":"10.1088\/0957-0233\/11\/12\/708"},{"key":"e_1_3_2_267_2","doi-asserted-by":"publisher","DOI":"10.1109\/IROS40897.2019.8967615"},{"key":"e_1_3_2_268_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00886"},{"key":"e_1_3_2_269_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58592-1_25"},{"key":"e_1_3_2_270_2","first-page":"1","volume-title":"Proceedings of the IEEE\/AIAA 34th Digital Avionics Systems Conference (DASC)","author":"Lee Ritchie","year":"2015","unstructured":"Ritchie Lee, Mykel J. Kochenderfer, Ole J. Mengshoel, Guillaume P. Brat and Michael P. Owen. 2015. Adaptive stress testing of airborne collision avoidance systems. In Proceedings of the IEEE\/AIAA 34th Digital Avionics Systems Conference (DASC). IEEE, 1\u201313."},{"key":"e_1_3_2_271_2","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2018.8500461"},{"key":"e_1_3_2_272_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2019.2919470"},{"key":"e_1_3_2_273_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2019.2919457"},{"key":"e_1_3_2_274_2","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC45102.2020.9294704"},{"key":"e_1_3_2_275_2","unstructured":"Microsoft. OpenstreetMap. Retrieved from http:\/\/www.openstreetmap.org\/."},{"key":"e_1_3_2_276_2","doi-asserted-by":"publisher","DOI":"10.1109\/IV47402.2020.9304658"},{"key":"e_1_3_2_277_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICVES.2018.8519486"},{"key":"e_1_3_2_278_2","doi-asserted-by":"publisher","DOI":"10.1109\/IV47402.2020.9304811"},{"key":"e_1_3_2_279_2","doi-asserted-by":"publisher","DOI":"10.1109\/IV48863.2021.9575426"},{"key":"e_1_3_2_280_2","article-title":"Mind the gap! A study on the transferability of virtual vs physical-world testing of autonomous driving systems","author":"Stocco Andrea","year":"2022","unstructured":"Andrea Stocco, Brian Pulfer, and Paolo Tonella. 2022. Mind the gap! A study on the transferability of virtual vs physical-world testing of autonomous driving systems. IEEE Trans. Softw. Eng. (2022).","journal-title":"IEEE Trans. Softw. Eng."},{"key":"e_1_3_2_281_2","first-page":"183","volume-title":"Proceedings of the 4th Middle East Symposium on Simulation and Modelling (MESM\u201902)","author":"Krajzewicz Daniel","year":"2002","unstructured":"Daniel Krajzewicz, Georg Hertkorn, Christian R\u00f6ssel, and Peter Wagner. 2002. SUMO (simulation of urban mobility)-an open-source traffic simulation. In Proceedings of the 4th Middle East Symposium on Simulation and Modelling (MESM\u201902). 183\u2013187."},{"key":"e_1_3_2_282_2","unstructured":"PTV. Vissim. Retrieved from https:\/\/www.ptvgroup.com\/en\/solutions\/products\/ptv-vissim\/."},{"key":"e_1_3_2_283_2","unstructured":"Donkey Car. 2021. Retrieved from https:\/\/www.donkeycar.com\/."},{"key":"e_1_3_2_284_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVE45908.2019.8965086"},{"key":"e_1_3_2_285_2","unstructured":"Unity. Unity. Retrieved from https:\/\/unity.com\/."},{"key":"e_1_3_2_286_2","doi-asserted-by":"publisher","DOI":"10.1109\/SAMI48414.2020.9108745"},{"key":"e_1_3_2_287_2","doi-asserted-by":"publisher","DOI":"10.2478\/ttj-2019-0014"},{"key":"e_1_3_2_288_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.tra.2016.09.010"},{"key":"e_1_3_2_289_2","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2019.8916839"},{"key":"e_1_3_2_290_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3044024"},{"key":"e_1_3_2_291_2","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC45102.2020.9294629"},{"issue":"1","key":"e_1_3_2_292_2","first-page":"1","article-title":"A scenario generation pipeline for autonomous vehicle simulators","volume":"10","author":"Wen Mingyun","year":"2020","unstructured":"Mingyun Wen, Jisun Park, and Kyungeun Cho. 2020. A scenario generation pipeline for autonomous vehicle simulators. Hum.-centr. Comput. Inf. Sci. 10, 1 (2020), 1\u201315.","journal-title":"Hum.-centr. Comput. Inf. Sci."},{"key":"e_1_3_2_293_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA40945.2020.9197053"},{"key":"e_1_3_2_294_2","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338942"},{"key":"e_1_3_2_295_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion.2019.00031"},{"key":"e_1_3_2_296_2","doi-asserted-by":"publisher","DOI":"10.1109\/IV51971.2022.9827170"},{"key":"e_1_3_2_297_2","doi-asserted-by":"publisher","DOI":"10.1109\/IV47402.2020.9304609"},{"key":"e_1_3_2_298_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR48806.2021.9412011"},{"key":"e_1_3_2_299_2","first-page":"2746","volume-title":"Proceedings of the International Conference on Robotics and Automation","author":"Balaji Bharathan","year":"2019","unstructured":"Bharathan Balaji, Sunil Mallya, Sahika Genc, Saurabh Gupta, Leo Dirac, Vineet Khare, Gourav Roy, Tao Sun, Yunzhe Tao, Brian Townsend, Eddie Calleja, Sunil Muralidhara, and Dhanasekar Karuppasamy. 2019. Deepracer: Educational autonomous racing platform for experimentation with sim2real reinforcement learning. In Proceedings of the International Conference on Robotics and Automation. IEEE, 2746\u20132754."},{"key":"e_1_3_2_300_2","first-page":"77","article-title":"F1tenth: An open-source evaluation environment for continuous control and reinforcement learning","volume":"123","author":"O\u2019Kelly Matthew","year":"2020","unstructured":"Matthew O\u2019Kelly, Hongrui Zheng, Dhruv Karthik, and Rahul Mangharam. 2020. F1tenth: An open-source evaluation environment for continuous control and reinforcement learning. Proc. Mach. Learn. Res. 123 (2020), 77\u201389.","journal-title":"Proc. Mach. Learn. Res."},{"key":"e_1_3_2_301_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01678"},{"key":"e_1_3_2_302_2","doi-asserted-by":"publisher","DOI":"10.4271\/2020-01-1204"},{"key":"e_1_3_2_303_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICST49551.2021.00050"},{"key":"e_1_3_2_304_2","unstructured":"Siemens. Prescan. Retrieved from https:\/\/m.tass.plm.automation.siemens.com\/cn\/prescan-2."},{"key":"e_1_3_2_305_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbspro.2012.06.1096"},{"key":"e_1_3_2_306_2","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC45102.2020.9294368"},{"key":"e_1_3_2_307_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICST46399.2020.00019"},{"key":"e_1_3_2_308_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-021-09982-4"},{"key":"e_1_3_2_309_2","doi-asserted-by":"publisher","DOI":"10.1109\/IV47402.2020.9304567"},{"key":"e_1_3_2_310_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2005.844422"},{"key":"e_1_3_2_311_2","article-title":"Exploiting social navigation","author":"Sinai Meital Ben","year":"2014","unstructured":"Meital Ben Sinai, Nimrod Partush, Shir Yadid, and Eran Yahav. 2014. Exploiting social navigation. arXiv:1410.0151. Retrieved from https:\/\/arxiv.org\/abs\/1410.0151.","journal-title":"arXiv:1410.0151"},{"key":"e_1_3_2_312_2","unstructured":"Verylukyguy. 2021. OpenPilot Issue. Retrieved from https:\/\/github.com\/commaai\/openpilot\/issues\/21557."},{"issue":"8","key":"e_1_3_2_313_2","first-page":"22","article-title":"The next generation simulation program","volume":"74","author":"Alexiadis Vassili","year":"2004","unstructured":"Vassili Alexiadis, James Colyar, John Halkias, Rob Hranac, and Gene McHale. 2004. The next generation simulation program. ITE J. 74, 8 (2004), 22.","journal-title":"ITE J."},{"key":"e_1_3_2_314_2","doi-asserted-by":"publisher","DOI":"10.1177\/0278364913491297"},{"key":"e_1_3_2_315_2","unstructured":"Belgium Dataset. Retrieved from https:\/\/hci.iwr.uni-heidelberg.de\/content\/bosch-small-traffic-lightsdataset."},{"key":"e_1_3_2_316_2","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2015.378"},{"key":"e_1_3_2_317_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.350"},{"key":"e_1_3_2_318_2","unstructured":"Udacity. Retrieved from https:\/\/fcav.engin.umich.edu\/research\/failing-to-learn."},{"key":"e_1_3_2_319_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.352"},{"key":"e_1_3_2_320_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46484-8_33"},{"key":"e_1_3_2_321_2","doi-asserted-by":"publisher","DOI":"10.1177\/0278364916679498"},{"key":"e_1_3_2_322_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.474"},{"key":"e_1_3_2_323_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.534"},{"key":"e_1_3_2_324_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46475-6_7"},{"key":"e_1_3_2_325_2","first-page":"2636","volume-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (CVPR\u201920)","author":"Yu Fisher","year":"2018","unstructured":"Fisher Yu, Wenqi Xian, Yingying Chen, Fangchen Liu, Mike Liao, Vashisht Madhavan, and Trevor Darrell. 2018. Bdd100k: A diverse driving video database with scalable annotation tooling. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (CVPR\u201920). IEEE, 2636\u20132645."},{"key":"e_1_3_2_326_2","article-title":"A commute in data: The comma2k19 dataset","author":"Schafer Harald","year":"2018","unstructured":"Harald Schafer, Eder Santana, Andrew Haden, and Riccardo Biasini. 2018. A commute in data: The comma2k19 dataset. arXiv:1812.05752. Retrieved from https:\/\/arxiv.org\/abs\/1812.05752.","journal-title":"arXiv:1812.05752"},{"key":"e_1_3_2_327_2","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2018.8569552"},{"key":"e_1_3_2_328_2","unstructured":"Baidu. ApolloScape. Retrieved from https:\/\/github.com\/ApolloScapeAuto\/dataset-api."},{"key":"e_1_3_2_329_2","doi-asserted-by":"publisher","DOI":"10.1109\/MITS.2019.2907676"},{"key":"e_1_3_2_330_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01164"},{"key":"e_1_3_2_331_2","article-title":"Interaction dataset: An international, adversarial and cooperative motion dataset in interactive driving scenarios with semantic maps","author":"Zhan Wei","year":"2019","unstructured":"Wei Zhan, Liting Sun, Di Wang, Haojie Shi, Aubrey Clausse, Maximilian Naumann, Julius Kummerle, Hendrik Konigshof, Christoph Stiller, Arnaud de La Fortelle, et\u00a0al. 2019. Interaction dataset: An international, adversarial and cooperative motion dataset in interactive driving scenarios with semantic maps. arXiv:1910.03088. Retrieved from https:\/\/arxiv.org\/abs\/1910.03088.","journal-title":"arXiv:1910.03088"},{"key":"e_1_3_2_332_2","doi-asserted-by":"publisher","DOI":"10.1109\/IV47402.2020.9304839"},{"key":"e_1_3_2_333_2","doi-asserted-by":"publisher","DOI":"10.1177\/0278364920961451"},{"key":"e_1_3_2_334_2","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC45102.2020.9294728"},{"key":"e_1_3_2_335_2","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC45102.2020.9294301"},{"key":"e_1_3_2_336_2","unstructured":"Bosch Night Dataset. Retrieved from https:\/\/hci.iwr.uni-heidelberg.de\/content\/bosch-small-traffic-lightsdataset."},{"key":"e_1_3_2_337_2","unstructured":"2022. CrashD Dataset. Retrieved from https:\/\/crashd-cars.github.io\/."},{"key":"e_1_3_2_338_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2962027"},{"key":"e_1_3_2_339_2","article-title":"Learning a driving simulator","author":"Santana Eder","year":"2016","unstructured":"Eder Santana and George Hotz. 2016. Learning a driving simulator. arXiv:1608.01230. Retrieved from https:\/\/arxviv.org\/abs\/1608.01230.","journal-title":"arXiv:1608.01230"},{"key":"e_1_3_2_340_2","unstructured":"Manikandasriram. GTA. Retrieved from https:\/\/fcav.engin.umich.edu\/research\/failing-to-learn."},{"key":"e_1_3_2_341_2","unstructured":"MathWorks. Matlab Simulink. Retrieved from https:\/\/ww2.mathworks.cn\/products\/simulink.html?s_tid=hp_products_simulink."},{"key":"e_1_3_2_342_2","unstructured":"Mechanical Simulation. Carsim. Retrieved from https:\/\/www.carsim.com\/products\/carsim\/index.php."},{"key":"e_1_3_2_343_2","unstructured":"Cyberbotics Ltd. Webots. Retrieved from http:\/\/www.cyberbotics.com\/#cyberbotics."},{"key":"e_1_3_2_344_2","unstructured":"Vires. VTD. Retrieved from https:\/\/vires.mscsoftware.com\/vtd-vires-virtual-test-drive\/."},{"key":"e_1_3_2_345_2","unstructured":"OSRF. Gazebo. Retrieved from http:\/\/gazebosim.org\/."},{"key":"e_1_3_2_346_2","first-page":"1","volume-title":"Proceedings of the Conference on Robot Learning","author":"Dosovitskiy Alexey","year":"2017","unstructured":"Alexey Dosovitskiy, German Ros, Felipe Codevilla, Antonio Lopez, and Vladlen Koltun. 2017. CARLA: An open urban driving simulator. In Proceedings of the Conference on Robot Learning. PMLR, 1\u201316."},{"key":"e_1_3_2_347_2","first-page":"493","volume-title":"Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA\u201921)","author":"Zhong Ziyuan","year":"2021","unstructured":"Ziyuan Zhong, Zhisheng Hu, Shengjian Guo, Xinyang Zhang, Zhenyu Zhong, and Baishakhi Ray. 2021. Detecting safety problems of multi-sensor fusion in autonomous driving. In Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA\u201921). ACM, 493\u2013505."},{"key":"e_1_3_2_348_2","doi-asserted-by":"crossref","first-page":"621","DOI":"10.1007\/978-3-319-67361-5_40","volume-title":"Field and Service Robotics","author":"Shah Shital","year":"2018","unstructured":"Shital Shah, Debadeepta Dey, Chris Lovett, and Ashish Kapoor. 2018. Airsim: High-fidelity visual and physical simulation for autonomous vehicles. In Field and Service Robotics. Springer, 621\u2013635."},{"key":"e_1_3_2_349_2","unstructured":"rFpro. rFpro. Retrieved from https:\/\/www.rfpro.com\/."},{"key":"e_1_3_2_350_2","unstructured":"Cognata. Retrieved from https:\/\/www.cognata.com\/cn\/."},{"key":"e_1_3_2_351_2","unstructured":"NVIDIA. NVIDIA Drive Constellation. Retrieved from https:\/\/developer.nvidia.com\/zh-cn\/drive\/drive-constellation."},{"key":"e_1_3_2_352_2","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC45102.2020.9294422"},{"key":"e_1_3_2_353_2","unstructured":"AVSIMULATION. SCANeR Studio. Retrieved from https:\/\/www.avsimulation.com\/scaner-studio\/."},{"key":"e_1_3_2_354_2","unstructured":"MSC software. ADAMS. Retrieved from https:\/\/www.mscsoftware.com\/product\/adams."},{"key":"e_1_3_2_355_2","first-page":"277","volume-title":"Proceedings of the IEEE Conference on Dependable and Secure Computing (DSC\u201910)","author":"Hiblot Nicolas","year":"2010","unstructured":"Nicolas Hiblot, Dominic Gruyer, Jean-S\u00e9bastien Barreiro, and Bertrand Monnier. 2010. Pro-SiVIC and roads, a software suite for sensors simulation and virtual prototyping of ADAS. In Proceedings of the IEEE Conference on Dependable and Secure Computing (DSC\u201910). 277\u2013288."},{"key":"e_1_3_2_356_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2018.00035"},{"key":"e_1_3_2_357_2","first-page":"66","volume-title":"Proceedings of the Conference on Robot Learning","author":"Chen Dian","year":"2020","unstructured":"Dian Chen, Brady Zhou, Vladlen Koltun, and Philipp Kr\u00e4henb\u00fchl. 2020. Learning by cheating. In Proceedings of the Conference on Robot Learning. PMLR, 66\u201375."},{"key":"e_1_3_2_358_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.312"},{"key":"e_1_3_2_359_2","article-title":"End to end learning for self-driving cars","author":"Bojarski Mariusz","year":"2016","unstructured":"Mariusz Bojarski, Davide Del Testa, Daniel Dworakowski, Bernhard Firner, Beat Flepp, Prasoon Goyal, Lawrence D. Jackel, Mathew Monfort, Urs Muller, Jiakai Zhang, et\u00a0al. 2016. End to end learning for self-driving cars. arXiv:1604.07316. Retrieved from https:\/\/arxiv.org\/abs\/1604.07316.","journal-title":"arXiv:1604.07316"},{"key":"e_1_3_2_360_2","unstructured":"Udacity self-driving challenge. Retrieved from https:\/\/github.com\/udacity\/self-driving-car\/tree\/master\/challenges."},{"key":"e_1_3_2_361_2","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2019.8814107"},{"key":"e_1_3_2_362_2","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314633"},{"key":"e_1_3_2_363_2","doi-asserted-by":"publisher","DOI":"10.1109\/SYSCON.2019.8836912"},{"key":"e_1_3_2_364_2","doi-asserted-by":"publisher","DOI":"10.1145\/3365438.3410933"},{"key":"e_1_3_2_365_2","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2017.7995802"},{"key":"e_1_3_2_366_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3134661"},{"key":"e_1_3_2_367_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-71500-7_9"},{"key":"e_1_3_2_368_2","doi-asserted-by":"publisher","DOI":"10.3390\/machines9120342"},{"key":"e_1_3_2_369_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-75632-5"},{"key":"e_1_3_2_370_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2022.3197693"}],"container-title":["ACM Transactions on Software Engineering and Methodology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579642","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3579642","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:44Z","timestamp":1750182524000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579642"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,24]]},"references-count":369,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,9,30]]}},"alternative-id":["10.1145\/3579642"],"URL":"https:\/\/doi.org\/10.1145\/3579642","relation":{},"ISSN":["1049-331X","1557-7392"],"issn-type":[{"value":"1049-331X","type":"print"},{"value":"1557-7392","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,24]]},"assertion":[{"value":"2022-06-20","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-11-28","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-07-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}