{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T14:14:43Z","timestamp":1758636883427,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,2,23]],"date-time":"2023-02-23T00:00:00Z","timestamp":1677110400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,2,23]]},"DOI":"10.1145\/3587828.3587869","type":"proceedings-article","created":{"date-parts":[[2023,6,20]],"date-time":"2023-06-20T15:40:57Z","timestamp":1687275657000},"page":"273-282","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A Framework of Formal Specification-Based Data Generation for Deep Neural Networks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-2880-4949","authenticated-orcid":false,"given":"Yanzhao","family":"Xia","sequence":"first","affiliation":[{"name":"Graduate School of Advanced Science and Engineering, Hiroshima University, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6748-5052","authenticated-orcid":false,"given":"Shaoying","family":"Liu","sequence":"additional","affiliation":[{"name":"Graduate School of Advanced Science and Engineering, Hiroshima University, Japan"}]}],"member":"320","published-online":{"date-parts":[[2023,6,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-010-0145-y"},{"key":"e_1_3_2_1_2_1","volume-title":"SCADE: Synchronous design and validation of embedded control software. In Next Generation Design and Verification Methodologies for Distributed Embedded Control Systems","author":"Berry G\u00e9rard","year":"2007","unstructured":"G\u00e9rard Berry . 2007 . SCADE: Synchronous design and validation of embedded control software. In Next Generation Design and Verification Methodologies for Distributed Embedded Control Systems . Springer , 19\u201333. G\u00e9rard Berry. 2007. SCADE: Synchronous design and validation of embedded control software. In Next Generation Design and Verification Methodologies for Distributed Embedded Control Systems. Springer, 19\u201333."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-55754-6_5"},{"key":"e_1_3_2_1_4_1","volume-title":"Formal methods and software engineering for DL. Security, safety and productivity for DL systems development. arXiv preprint arXiv:1901.11334","author":"Hains JDR","year":"2019","unstructured":"Gaetan\u00a0 JDR Hains , Arvid Jakobsson , and Youry Khmelevsky . 2019. Formal methods and software engineering for DL. Security, safety and productivity for DL systems development. arXiv preprint arXiv:1901.11334 ( 2019 ). Gaetan\u00a0JDR Hains, Arvid Jakobsson, and Youry Khmelevsky. 2019. Formal methods and software engineering for DL. Security, safety and productivity for DL systems development. arXiv preprint arXiv:1901.11334 (2019)."},{"key":"e_1_3_2_1_5_1","volume-title":"Advances in natural language processing. Science 349, 6245","author":"Hirschberg Julia","year":"2015","unstructured":"Julia Hirschberg and Christopher\u00a0 D Manning . 2015. Advances in natural language processing. Science 349, 6245 ( 2015 ), 261\u2013266. Julia Hirschberg and Christopher\u00a0D Manning. 2015. Advances in natural language processing. Science 349, 6245 (2015), 261\u2013266."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Sebastian Houben Johannes Stallkamp Jan Salmen Marc Schlipsing and Christian Igel. 2013. Detection of traffic signs in real-world images: The German Traffic Sign Detection Benchmark. In The 2013 international joint conference on neural networks (IJCNN). Ieee 1\u20138.  Sebastian Houben Johannes Stallkamp Jan Salmen Marc Schlipsing and Christian Igel. 2013. Detection of traffic signs in real-world images: The German Traffic Sign Detection Benchmark. In The 2013 international joint conference on neural networks (IJCNN). Ieee 1\u20138.","DOI":"10.1109\/IJCNN.2013.6706807"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2956508"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/94062"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/336512.336546"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298958"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.11.026"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.663996"},{"key":"e_1_3_2_1_13_1","unstructured":"Andreas M\u00f8gelmose. 2015. Visual analysis in traffic & re-identification. (2015).  Andreas M\u00f8gelmose. 2015. Visual analysis in traffic & re-identification. (2015)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.08.325"},{"key":"e_1_3_2_1_15_1","volume-title":"An overview of gradient descent optimization algorithms. arXiv preprint arXiv:1609.04747","author":"Ruder Sebastian","year":"2016","unstructured":"Sebastian Ruder . 2016. An overview of gradient descent optimization algorithms. arXiv preprint arXiv:1609.04747 ( 2016 ). Sebastian Ruder. 2016. An overview of gradient descent optimization algorithms. arXiv preprint arXiv:1609.04747 (2016)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1609\/aimag.v36i4.2577"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01090-4_2"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503914"},{"key":"e_1_3_2_1_19_1","volume-title":"2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom). Ieee, 1310\u20131315","author":"Singh Amanpreet","year":"2016","unstructured":"Amanpreet Singh , Narina Thakur , and Aakanksha Sharma . 2016 . A review of supervised machine learning algorithms . In 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom). Ieee, 1310\u20131315 . Amanpreet Singh, Narina Thakur, and Aakanksha Sharma. 2016. A review of supervised machine learning algorithms. In 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom). Ieee, 1310\u20131315."},{"volume-title":"Understanding Z: a specification language and its formal semantics. Vol.\u00a03","author":"Spivey J\u00a0Michael","key":"e_1_3_2_1_20_1","unstructured":"J\u00a0Michael Spivey . 1988. Understanding Z: a specification language and its formal semantics. Vol.\u00a03 . Cambridge University Press . J\u00a0Michael Spivey. 1988. Understanding Z: a specification language and its formal semantics. Vol.\u00a03. Cambridge University Press."},{"key":"e_1_3_2_1_21_1","volume-title":"Man vs. computer: Benchmarking machine learning algorithms for traffic sign recognition. Neural networks 32","author":"Stallkamp Johannes","year":"2012","unstructured":"Johannes Stallkamp , Marc Schlipsing , Jan Salmen , and Christian Igel . 2012. Man vs. computer: Benchmarking machine learning algorithms for traffic sign recognition. Neural networks 32 ( 2012 ), 323\u2013332. Johannes Stallkamp, Marc Schlipsing, Jan Salmen, and Christian Igel. 2012. Man vs. computer: Benchmarking machine learning algorithms for traffic sign recognition. Neural networks 32 (2012), 323\u2013332."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Nikko Strom. 2015. Scalable distributed DNN training using commodity GPU cloud computing. In Sixteenth annual conference of the international speech communication association.  Nikko Strom. 2015. Scalable distributed DNN training using commodity GPU cloud computing. In Sixteenth annual conference of the international speech communication association.","DOI":"10.21437\/Interspeech.2015-354"},{"key":"e_1_3_2_1_23_1","volume-title":"Unsupervised machine learning for networking: Techniques, applications and research challenges","author":"Usama Muhammad","year":"2019","unstructured":"Muhammad Usama , Junaid Qadir , Aunn Raza , Hunain Arif , Kok- Lim\u00a0Alvin Yau , Yehia Elkhatib , Amir Hussain , and Ala Al-Fuqaha . 2019. Unsupervised machine learning for networking: Techniques, applications and research challenges . IEEE access 7 ( 2019 ), 65579\u201365615. Muhammad Usama, Junaid Qadir, Aunn Raza, Hunain Arif, Kok-Lim\u00a0Alvin Yau, Yehia Elkhatib, Amir Hussain, and Ala Al-Fuqaha. 2019. Unsupervised machine learning for networking: Techniques, applications and research challenges. IEEE access 7 (2019), 65579\u201365615."},{"key":"e_1_3_2_1_24_1","volume-title":"Formal methods: Practice and experience. ACM computing surveys (CSUR) 41, 4","author":"Woodcock Jim","year":"2009","unstructured":"Jim Woodcock , Peter\u00a0Gorm Larsen , Juan Bicarregui , and John Fitzgerald . 2009. Formal methods: Practice and experience. ACM computing surveys (CSUR) 41, 4 ( 2009 ), 1\u201336. Jim Woodcock, Peter\u00a0Gorm Larsen, Juan Bicarregui, and John Fitzgerald. 2009. Formal methods: Practice and experience. ACM computing surveys (CSUR) 41, 4 (2009), 1\u201336."},{"key":"e_1_3_2_1_25_1","volume-title":"Adversarial examples: Attacks and defenses for deep learning","author":"Yuan Xiaoyong","year":"2019","unstructured":"Xiaoyong Yuan , Pan He , Qile Zhu , and Xiaolin Li. 2019. Adversarial examples: Attacks and defenses for deep learning . IEEE transactions on neural networks and learning systems 30, 9 ( 2019 ), 2805\u20132824. Xiaoyong Yuan, Pan He, Qile Zhu, and Xiaolin Li. 2019. Adversarial examples: Attacks and defenses for deep learning. IEEE transactions on neural networks and learning systems 30, 9 (2019), 2805\u20132824."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2012.2225618"},{"key":"e_1_3_2_1_27_1","unstructured":"Xiaojin\u00a0Jerry Zhu. 2005. Semi-supervised learning literature survey. (2005).  Xiaojin\u00a0Jerry Zhu. 2005. Semi-supervised learning literature survey. (2005)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.07.009"}],"event":{"name":"ICSCA 2023: 2023 12th International Conference on Software and Computer Applications","acronym":"ICSCA 2023","location":"Kuantan Malaysia"},"container-title":["Proceedings of the 2023 12th International Conference on Software and Computer Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3587828.3587869","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3587828.3587869","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:28Z","timestamp":1750183708000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3587828.3587869"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,23]]},"references-count":28,"alternative-id":["10.1145\/3587828.3587869","10.1145\/3587828"],"URL":"https:\/\/doi.org\/10.1145\/3587828.3587869","relation":{},"subject":[],"published":{"date-parts":[[2023,2,23]]},"assertion":[{"value":"2023-06-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}