{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T03:59:29Z","timestamp":1769745569922,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,4]],"date-time":"2023-08-04T00:00:00Z","timestamp":1691107200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20200442"],"award-info":[{"award-number":["BK20200442"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62002162"],"award-info":[{"award-number":["62002162"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,4]]},"DOI":"10.1145\/3609437.3609453","type":"proceedings-article","created":{"date-parts":[[2023,10,5]],"date-time":"2023-10-05T22:11:25Z","timestamp":1696543885000},"page":"123-133","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["A Fine-Grained Evaluation of Mutation Operators for Deep Learning Systems: A Selective Mutation Approach"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-8513-1586","authenticated-orcid":false,"given":"Yichun","family":"Wang","sequence":"first","affiliation":[{"name":"Nanjing University of Aeronautics and Astronautics, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6671-4378","authenticated-orcid":false,"given":"Zhiyi","family":"Zhang","sequence":"additional","affiliation":[{"name":"Nanjing University of Aeronautics and Astronautics, China and Collaborative Innovation Center of Novel Software Technology and Industrialization, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4532-1580","authenticated-orcid":false,"given":"Yongming","family":"Yao","sequence":"additional","affiliation":[{"name":"Army Engineering of PLA, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6843-1892","authenticated-orcid":false,"given":"Zhiqiu","family":"Huang","sequence":"additional","affiliation":[{"name":"Nanjing University of Aeronautics and Astronautics, China and Ministry Key Laboratory for Safety-Critical Software Development and Verification, China"}]}],"member":"320","published-online":{"date-parts":[[2023,10,5]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Towards evaluating the robustness of neural networks. In 2017 ieee symposium on security and privacy (sp)","author":"Carlini Nicholas","unstructured":"Nicholas Carlini and David Wagner . 2017. Towards evaluating the robustness of neural networks. In 2017 ieee symposium on security and privacy (sp) . IEEE , 39\u201357. Nicholas Carlini and David Wagner. 2017. Towards evaluating the robustness of neural networks. In 2017 ieee symposium on security and privacy (sp). IEEE, 39\u201357."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-018-9425-7"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1630"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1528"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483773"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00126"},{"key":"e_1_3_2_1_7_1","volume-title":"Mutation clustering. Ms. Th","author":"Hussain Shamaila","year":"2008","unstructured":"Shamaila Hussain . 2008. Mutation clustering. Ms. Th ., Kings College London , Strand, London ( 2008 ), 9. Shamaila Hussain. 2008. Mutation clustering. Ms. Th., Kings College London, Strand, London (2008), 9."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST46399.2020.00018"},{"key":"e_1_3_2_1_9_1","volume-title":"An analysis and survey of the development of mutation testing","author":"Jia Yue","year":"2010","unstructured":"Yue Jia and Mark Harman . 2010. An analysis and survey of the development of mutation testing . IEEE transactions on software engineering 37, 5 ( 2010 ), 649\u2013678. Yue Jia and Mark Harman. 2010. An analysis and survey of the development of mutation testing. IEEE transactions on software engineering 37, 5 (2010), 649\u2013678."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510187"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00108"},{"key":"e_1_3_2_1_12_1","unstructured":"Alex Krizhevsky Vinod Nair and Geoffrey Hinton. 2023. The cifar-10 dataset. http:\/\/www.cs.toronto.edu\/\u00a0kriz\/cifar.html. Accessed January 15.  Alex Krizhevsky Vinod Nair and Geoffrey Hinton. 2023. The cifar-10 dataset. http:\/\/www.cs.toronto.edu\/\u00a0kriz\/cifar.html. Accessed January 15."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2014.20"},{"key":"e_1_3_2_1_14_1","unstructured":"Yann LeCun. 1998. The MNIST database of handwritten digits. http:\/\/yann. lecun. com\/exdb\/mnist\/ (1998).  Yann LeCun. 1998. The MNIST database of handwritten digits. http:\/\/yann. lecun. com\/exdb\/mnist\/ (1998)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2022.106954"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2019.8668044"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238202"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2018.00021"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CMPSAC.1991.170248"},{"key":"e_1_3_2_1_21_1","unstructured":"Yuval Netzer Tao Wang Adam Coates Alessandro Bissacco Bo Wu and Andrew\u00a0Y Ng. 2011. Reading digits in natural images with unsupervised feature learning. (2011).  Yuval Netzer Tao Wang Adam Coates Alessandro Bissacco Bo Wu and Andrew\u00a0Y Ng. 2011. Reading digits in natural images with unsupervised feature learning. (2011)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1993.346062"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3205455.3205533"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132785"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/1552138.1552140"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2020.106413"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C.2018.00032"},{"key":"e_1_3_2_1_28_1","unstructured":"Youcheng Sun Xiaowei Huang Daniel Kroening James Sharp Matthew Hill and Rob Ashmore. 2018. Testing deep neural networks. (2018).  Youcheng Sun Xiaowei Huang Daniel Kroening James Sharp Matthew Hill and Rob Ashmore. 2018. Testing deep neural networks. (2018)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(94)00098-0"},{"key":"e_1_3_2_1_30_1","volume-title":"Generating adversarial examples with adversarial networks. arXiv preprint arXiv:1801.02610","author":"Xiao Chaowei","year":"2018","unstructured":"Chaowei Xiao , Bo Li , Jun-Yan Zhu , Warren He , Mingyan Liu , and Dawn Song . 2018. Generating adversarial examples with adversarial networks. arXiv preprint arXiv:1801.02610 ( 2018 ). Chaowei Xiao, Bo Li, Jun-Yan Zhu, Warren He, Mingyan Liu, and Dawn Song. 2018. Generating adversarial examples with adversarial networks. arXiv preprint arXiv:1801.02610 (2018)."}],"event":{"name":"Internetware 2023: 14th Asia-Pacific Symposium on Internetware","location":"Hangzhou China","acronym":"Internetware 2023"},"container-title":["Proceedings of the 14th Asia-Pacific Symposium on Internetware"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3609437.3609453","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3609437.3609453","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:24Z","timestamp":1750178784000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3609437.3609453"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,4]]},"references-count":30,"alternative-id":["10.1145\/3609437.3609453","10.1145\/3609437"],"URL":"https:\/\/doi.org\/10.1145\/3609437.3609453","relation":{},"subject":[],"published":{"date-parts":[[2023,8,4]]},"assertion":[{"value":"2023-10-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}