{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T04:35:45Z","timestamp":1771994145155,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":87,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,12]],"date-time":"2024-04-12T00:00:00Z","timestamp":1712880000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Research Foundation Singapore and DSO National Laboratories","award":["AISG2-RP-2020-017"],"award-info":[{"award-number":["AISG2-RP-2020-017"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,12]]},"DOI":"10.1145\/3597503.3639149","type":"proceedings-article","created":{"date-parts":[[2024,4,12]],"date-time":"2024-04-12T16:43:26Z","timestamp":1712940206000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Curiosity-Driven Testing for Sequential Decision-Making Process"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3370-8585","authenticated-orcid":false,"given":"Junda","family":"He","sequence":"first","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5938-1918","authenticated-orcid":false,"given":"Zhou","family":"Yang","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0799-5018","authenticated-orcid":false,"given":"Jieke","family":"Shi","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6100-8127","authenticated-orcid":false,"given":"Chengran","family":"Yang","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4462-6916","authenticated-orcid":false,"given":"Kisub","family":"Kim","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1006-8493","authenticated-orcid":false,"given":"Bowen","family":"Xu","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, North Carolina, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4558-0622","authenticated-orcid":false,"given":"Xin","family":"Zhou","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4367-7201","authenticated-orcid":false,"given":"David","family":"Lo","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2024,4,12]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Deep learning using rectified linear units (relu). arXiv preprint arXiv:1803.08375","author":"Agarap Abien Fred","year":"2018","unstructured":"Abien Fred Agarap. 2018. Deep learning using rectified linear units (relu). arXiv preprint arXiv:1803.08375 (2018)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2023.3243522"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.2743240"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3473124"},{"key":"e_1_3_2_1_5_1","first-page":"5087","article-title":"Biasfinder: Metamorphic test generation to uncover bias for sentiment analysis systems","volume":"48","author":"Asyrofi Muhammad Hilmi","year":"2021","unstructured":"Muhammad Hilmi Asyrofi, Zhou Yang, Imam Nur Bani Yusuf, Hong Jin Kang, Ferdian Thung, and David Lo. 2021. Biasfinder: Metamorphic test generation to uncover bias for sentiment analysis systems. IEEE Transactions on Software Engineering 48, 12 (2021), 5087--5101.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"e_1_3_2_1_6_1","volume-title":"Unifying count-based exploration and intrinsic motivation. Advances in neural information processing systems 29","author":"Bellemare Marc","year":"2016","unstructured":"Marc Bellemare, Sriram Srinivasan, Georg Ostrovski, Tom Schaul, David Saxton, and Remi Munos. 2016. Unifying count-based exploration and intrinsic motivation. Advances in neural information processing systems 29 (2016)."},{"key":"e_1_3_2_1_7_1","volume-title":"Testing object-oriented systems: models, patterns, and tools","author":"Binder Robert","unstructured":"Robert Binder. 2000. Testing object-oriented systems: models, patterns, and tools. Addison-Wesley Professional."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210309"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468570"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409748"},{"key":"e_1_3_2_1_11_1","volume-title":"7th International Conference on Learning Representations, ICLR 2019","author":"Burda Yuri","year":"2019","unstructured":"Yuri Burda, Harrison Edwards, Amos J. Storkey, and Oleg Klimov. 2019. Exploration by random network distillation. In 7th International Conference on Learning Representations, ICLR 2019, New Orleans, LA, USA, May 6--9, 2019. OpenReview.net. https:\/\/openreview.net\/forum?id=H1lJJnR5Ym"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2785841"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.413"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.50"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the Conference on Robot Learning (Proceedings of Machine Learning Research","volume":"75","author":"Chen Dian","year":"2020","unstructured":"Dian Chen, Brady Zhou, Vladlen Koltun, and Philipp Kr\u00e4henb\u00fchl. 2020. Learning by Cheating. In Proceedings of the Conference on Robot Learning (Proceedings of Machine Learning Research, Vol. 100), Leslie Pack Kaelbling, Danica Kragic, and Komei Sugiura (Eds.). PMLR, 66--75. https:\/\/proceedings.mlr.press\/v100\/chen20a.html"},{"key":"e_1_3_2_1_16_1","volume-title":"CARLA: An Open Urban Driving Simulator. In 1st Annual Conference on Robot Learning, CoRL","author":"Dosovitskiy Alexey","year":"2017","unstructured":"Alexey Dosovitskiy, Germ\u00e1n Ros, Felipe Codevilla, Antonio M. L\u00f3pez, and Vladlen Koltun. 2017. CARLA: An Open Urban Driving Simulator. In 1st Annual Conference on Robot Learning, CoRL 2017, Mountain View, California, USA, November 13--15, 2017, Proceedings (Proceedings of Machine Learning Research, Vol. 78). PMLR, 1--16. http:\/\/proceedings.mlr.press\/v78\/dosovitskiy17a.html"},{"key":"e_1_3_2_1_17_1","volume-title":"Multi-agent deep reinforcement learning. CS231n: convolutional neural networks for visual recognition","author":"Egorov Maxim","year":"2016","unstructured":"Maxim Egorov. 2016. Multi-agent deep reinforcement learning. CS231n: convolutional neural networks for visual recognition (2016), 1--8."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Jan Eisenhut Alvaro Torralba Maria Christakis and J\u00f6rg Hoffmann. 2023. Automatic Metamorphic Test Oracles for Action-Policy Testing. (2023).","DOI":"10.1609\/icaps.v33i1.27185"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534392"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2021.3064284"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","unstructured":"Chen Gong Zhou Yang Yunpeng Bai Junda He Jieke Shi Arunesh Sinha Bowen Xu Xinwen Hou Guoliang Fan and David Lo. 2022. Mind Your Data! Hiding Backdoors in Offline Reinforcement Learning Datasets. 10.48550\/ARXIV.2210.04688","DOI":"10.48550\/ARXIV.2210.04688"},{"key":"e_1_3_2_1_22_1","volume-title":"Effect sizes for research: A broad practical approach","author":"Grissom Robert J","unstructured":"Robert J Grissom and John J Kim. 2005. Effect sizes for research: A broad practical approach. Lawrence Erlbaum Associates Publishers."},{"key":"e_1_3_2_1_23_1","volume-title":"Neural networks: a comprehensive foundation","author":"Haykin Simon","unstructured":"Simon Haykin. 1994. Neural networks: a comprehensive foundation. Prentice Hall PTR."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3524610.3527897"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3635711"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2430536.2430540"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2015.7102602"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0951-8320(02)00056-X"},{"key":"e_1_3_2_1_29_1","volume-title":"Playing Atari Games with Deep Reinforcement Learning and Human Checkpoint Replay. CoRR abs\/1607.05077","author":"Hosu Ionel-Alexandru","year":"2016","unstructured":"Ionel-Alexandru Hosu and Traian Rebedea. 2016. Playing Atari Games with Deep Reinforcement Learning and Human Checkpoint Replay. CoRR abs\/1607.05077 (2016). arXiv:1607.05077 http:\/\/arxiv.org\/abs\/1607.05077"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3580599"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2023.3309610"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3054912"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2018.8461233"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2014.45"},{"key":"e_1_3_2_1_35_1","volume-title":"Owen","author":"Julian Kyle D.","year":"2018","unstructured":"Kyle D. Julian, Mykel J. Kochenderfer, and Michael P. Owen. 2018. Deep Neural Network Compression for Aircraft Collision Avoidance Systems. CoRR abs\/1810.04240 (2018). arXiv:1810.04240 http:\/\/arxiv.org\/abs\/1810.04240"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243804"},{"key":"e_1_3_2_1_37_1","volume-title":"AAAI Spring Symposium: Help Me Help You: Bridging the Gaps in Human-Agent Collaboration.","author":"Knox W Bradley","year":"2011","unstructured":"W Bradley Knox, Adam Bradley Setapen, and Peter Stone. 2011. Reinforcement Learning with Human Feedback in Mountain Car.. In AAAI Spring Symposium: Help Me Help You: Bridging the Gaps in Human-Agent Collaboration."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1177\/0278364913495721"},{"key":"e_1_3_2_1_39_1","volume-title":"5th online world conference on soft computing in industrial applications (WSC5)","author":"K\u00f6ppen Mario","unstructured":"Mario K\u00f6ppen. 2000. The curse of dimensionality. In 5th online world conference on soft computing in industrial applications (WSC5), Vol. 1. 4--8."},{"key":"e_1_3_2_1_40_1","volume-title":"The Past and Present of Imitation Learning: A Citation Chain Study. CoRR abs\/2001.02328","author":"Kumar Nishanth","year":"2020","unstructured":"Nishanth Kumar. 2020. The Past and Present of Imitation Learning: A Citation Chain Study. CoRR abs\/2001.02328 (2020). arXiv:2001.02328 http:\/\/arxiv.org\/abs\/2001.02328"},{"key":"e_1_3_2_1_41_1","volume-title":"International Conference on Machine Learning. PMLR, 5556--5566","author":"Kuznetsov Arsenii","year":"2020","unstructured":"Arsenii Kuznetsov, Pavel Shvechikov, Alexander Grishin, and Dmitry Vetrov. 2020. Controlling overestimation bias with truncated mixture of continuous distributional quantile critics. In International Conference on Machine Learning. PMLR, 5556--5566."},{"key":"e_1_3_2_1_42_1","volume-title":"Deep reinforcement learning: An overview. arXiv preprint arXiv:1701.07274","author":"Yuxi Li.","year":"2017","unstructured":"Yuxi Li. 2017. Deep reinforcement learning: An overview. arXiv preprint arXiv:1701.07274 (2017)."},{"key":"e_1_3_2_1_43_1","volume-title":"Trustworthy and Synergistic Artificial Intelligence for Software Engineering: Vision and Roadmaps. arXiv preprint arXiv:2309.04142","author":"David Lo.","year":"2023","unstructured":"David Lo. 2023. Trustworthy and Synergistic Artificial Intelligence for Software Engineering: Vision and Roadmaps. arXiv preprint arXiv:2309.04142 (2023)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2018.2808247"},{"key":"e_1_3_2_1_45_1","volume-title":"Multi-Agent Actor-Critic for Mixed Cooperative-Competitive Environments. In Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017","author":"Lowe Ryan","year":"2017","unstructured":"Ryan Lowe, Yi Wu, Aviv Tamar, Jean Harb, Pieter Abbeel, and Igor Mordatch. 2017. Multi-Agent Actor-Critic for Mixed Cooperative-Competitive Environments. In Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, December 4--9, 2017, Long Beach, CA, USA, Isabelle Guyon, Ulrike von Luxburg, Samy Bengio, Hanna M. Wallach, Rob Fergus, S. V. N. Vishwanathan, and Roman Garnett (Eds.). 6379--6390. https:\/\/proceedings.neurips.cc\/paper\/2017\/hash\/68a9750337a418a86fe06c1991a1d64c-Abstract.html"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2022.102701"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2019.8668044"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238202"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.24556"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature14236"},{"key":"e_1_3_2_1_52_1","volume-title":"Methods for interpreting and understanding deep neural networks. Digital signal processing 73","author":"Montavon Gr\u00e9goire","year":"2018","unstructured":"Gr\u00e9goire Montavon, Wojciech Samek, and Klaus-Robert M\u00fcller. 2018. Methods for interpreting and understanding deep neural networks. Digital signal processing 73 (2018), 1--15."},{"key":"e_1_3_2_1_53_1","volume-title":"Illuminating search spaces by mapping elites. arXiv preprint arXiv:1504.04909","author":"Mouret Jean-Baptiste","year":"2015","unstructured":"Jean-Baptiste Mouret and Jeff Clune. 2015. Illuminating search spaces by mapping elites. arXiv preprint arXiv:1504.04909 (2015)."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"crossref","unstructured":"Nadim Nachar et al. 2008. The Mann-Whitney U: A test for assessing whether two independent samples come from the same distribution. Tutorials in quantitative Methods for Psychology 4 1 (2008) 13--20.","DOI":"10.20982\/tqmp.04.1.p013"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/S10664-022-10233-3"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534388"},{"key":"e_1_3_2_1_57_1","volume-title":"PyTorch: An Imperative Style","author":"Paszke Adam","unstructured":"Adam Paszke, Sam Gross, Francisco Massa, Adam Lerer, James Bradbury, Gregory Chanan, Trevor Killeen, Zeming Lin, Natalia Gimelshein, Luca Antiga, Alban Desmaison, Andreas Kopf, Edward Yang, Zachary DeVito, Martin Raison, Alykhan Tejani, Sasank Chilamkurthy, Benoit Steiner, Lu Fang, Junjie Bai, and Soumith Chintala. 2019. PyTorch: An Imperative Style, High-Performance Deep Learning Library. In Advances in Neural Information Processing Systems 32. Curran Associates, Inc., 8024--8035. http:\/\/papers.neurips.cc\/paper\/9015-pytorch-an-imperative-style-high-performance-deep-learning-library.pdf"},{"key":"e_1_3_2_1_58_1","volume-title":"Greybox fuzzing as a contextual bandits problem. arXiv preprint arXiv:1806.03806","author":"Patil Ketan","year":"2018","unstructured":"Ketan Patil and Aditya Kanade. 2018. Greybox fuzzing as a contextual bandits problem. arXiv preprint arXiv:1806.03806 (2018)."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132785"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST46399.2020.00062"},{"key":"e_1_3_2_1_61_1","volume-title":"Markov decision processes. Handbooks in operations research and management science 2","author":"Puterman Martin L","year":"1990","unstructured":"Martin L Puterman. 1990. Markov decision processes. Handbooks in operations research and management science 2 (1990), 331--434."},{"key":"e_1_3_2_1_62_1","volume-title":"Deep learning in neural networks: An overview. Neural networks 61","author":"Schmidhuber J\u00fcrgen","year":"2015","unstructured":"J\u00fcrgen Schmidhuber. 2015. Deep learning in neural networks: An overview. Neural networks 61 (2015), 85--117."},{"key":"e_1_3_2_1_63_1","volume-title":"Proximal policy optimization algorithms. arXiv preprint arXiv:1707.06347","author":"Schulman John","year":"2017","unstructured":"John Schulman, Filip Wolski, Prafulla Dhariwal, Alec Radford, and Oleg Klimov. 2017. Proximal policy optimization algorithms. arXiv preprint arXiv:1707.06347 (2017)."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature16961"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1609\/icaps.v32i1.19820"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2022.3202311"},{"key":"e_1_3_2_1_67_1","volume-title":"Fuzzing for software security testing and quality assurance","author":"Takanen Ari","unstructured":"Ari Takanen, Jared D Demott, Charles Miller, and Atte Kettunen. 2018. Fuzzing for software security testing and quality assurance. Artech House."},{"key":"e_1_3_2_1_68_1","volume-title":"Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017","author":"Tang Haoran","year":"2017","unstructured":"Haoran Tang, Rein Houthooft, Davis Foote, Adam Stooke, Xi Chen, Yan Duan, John Schulman, Filip De Turck, and Pieter Abbeel. 2017. #Exploration: A Study of Count-Based Exploration for Deep Reinforcement Learning. In Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, December 4--9, 2017, Long Beach, CA, USA, Isabelle Guyon, Ulrike von Luxburg, Samy Bengio, Hanna M. Wallach, Rob Fergus, S. V. N. Vishwanathan, and Roman Garnett (Eds.). 2753--2762. https:\/\/proceedings.neurips.cc\/paper\/2017\/hash\/3a20f62a0af1aa152670bab3c602feed-Abstract.html"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/72"},{"key":"e_1_3_2_1_70_1","unstructured":"CARLA Team. 2021. CARLA Challenge. https:\/\/carlachallenge.org\/. Accessed on May 6 2023."},{"key":"e_1_3_2_1_71_1","unstructured":"OpenAI Team. 2021. rlbaselines3-zoo. https:\/\/github.com\/DLR-RM\/rlbaselines3-zoo. Accessed on May 6 2023."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180220"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387940.3391462"},{"key":"e_1_3_2_1_74_1","volume-title":"27th USENIX Security Symposium, USENIX Security 2018","author":"Wang Shiqi","year":"2018","unstructured":"Shiqi Wang, Kexin Pei, Justin Whitehouse, Junfeng Yang, and Suman Jana. 2018. Formal Security Analysis of Neural Networks using Symbolic Intervals. In 27th USENIX Security Symposium, USENIX Security 2018, Baltimore, MD, USA, August 15--17, 2018, William Enck and Adrienne Porter Felt (Eds.). USENIX Association, 1599--1614. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/wang-shiqi"},{"key":"e_1_3_2_1_75_1","volume-title":"Flow: Architecture and benchmarking for reinforcement learning in traffic control. arXiv preprint arXiv:1710.05465 10","author":"Wu Cathy","year":"2017","unstructured":"Cathy Wu, Aboudy Kreidieh, Kanaad Parvate, Eugene Vinitsky, and Alexandre M Bayen. 2017. Flow: Architecture and benchmarking for reinforcement learning in traffic control. arXiv preprint arXiv:1710.05465 10 (2017)."},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330579"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00035"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER53432.2022.00056"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.2302.00330"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510146"},{"key":"e_1_3_2_1_81_1","first-page":"621","article-title":"Towards playing full moba games with deep reinforcement learning","volume":"33","author":"Ye Deheng","year":"2020","unstructured":"Deheng Ye, Guibin Chen, Wen Zhang, Sheng Chen, Bo Yuan, Bo Liu, Jia Chen, Zhao Liu, Fuhao Qiu, Hongsheng Yu, et al. 2020. Towards playing full moba games with deep reinforcement learning. Advances in Neural Information Processing Systems 33 (2020), 621--632.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238187"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2022.3194640"},{"key":"e_1_3_2_1_84_1","volume-title":"Neural network guided evolutionary fuzzing for finding traffic violations of autonomous vehicles","author":"Zhong Ziyuan","year":"2022","unstructured":"Ziyuan Zhong, Gail Kaiser, and Baishakhi Ray. 2022. Neural network guided evolutionary fuzzing for finding traffic violations of autonomous vehicles. IEEE Transactions on Software Engineering (2022)."},{"key":"e_1_3_2_1_85_1","volume-title":"Generation-based Code Review Automation: How Far Are We? arXiv preprint arXiv:2303.07221","author":"Zhou Xin","year":"2023","unstructured":"Xin Zhou, Kisub Kim, Bowen Xu, DongGyun Han, Junda He, and David Lo. 2023. Generation-based Code Review Automation: How Far Are We? arXiv preprint arXiv:2303.07221 (2023)."},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"crossref","unstructured":"Li ZHUO Xiongfei WU Derui ZHU Mingfei CHENG Siyuan CHEN Fuyuan ZHANG Xiaofei XIE Lei MA and Jianjun ZHAO. 2023. Generative model-based testing on decision-making policies. ASE.","DOI":"10.1109\/ASE56229.2023.00153"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464811"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","unstructured":"Amirhossein Zolfagharian Manel Abdellatif Lionel C. Briand Mojtaba Bagherzadeh and Ramesh S. 2023. A Search-Based Testing Approach for Deep Reinforcement Learning Agents. IEEE Transactions on Software Engineering (2023) 1--22. 10.1109\/TSE.2023.3269804","DOI":"10.1109\/TSE.2023.3269804"}],"event":{"name":"ICSE '24: IEEE\/ACM 46th International Conference on Software Engineering","location":"Lisbon Portugal","acronym":"ICSE '24","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS","Faculty of Engineering of University of Porto"]},"container-title":["Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597503.3639149","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3597503.3639149","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:49:12Z","timestamp":1750286952000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597503.3639149"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,12]]},"references-count":87,"alternative-id":["10.1145\/3597503.3639149","10.1145\/3597503"],"URL":"https:\/\/doi.org\/10.1145\/3597503.3639149","relation":{},"subject":[],"published":{"date-parts":[[2024,4,12]]},"assertion":[{"value":"2024-04-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}