{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T14:50:56Z","timestamp":1776783056969,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":73,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T00:00:00Z","timestamp":1701302400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Research Foundation, Singapore, and the Cyber Security Agency under its National Cybersecurity R&D Programme","award":["NCRP25-P04-TAICeN"],"award-info":[{"award-number":["NCRP25-P04-TAICeN"]}]},{"name":"National Research Foundation Singapore and DSO National Laboratories under the AI Singapore Programme","award":["AISG Award No: AISG2-GC-2023-008"],"award-info":[{"award-number":["AISG Award No: AISG2-GC-2023-008"]}]},{"name":"National Key R&D Program of China","award":["2020AAA0107702"],"award-info":[{"award-number":["2020AAA0107702"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U21B2018, 62161160337, 61822309, U20B2049, 61773310, U1736205, 61802166"],"award-info":[{"award-number":["U21B2018, 62161160337, 61822309, U20B2049, 61773310, U1736205, 61802166"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shaanxi Province Key Industry Innovation Program","award":["2021ZDLGY01-02"],"award-info":[{"award-number":["2021ZDLGY01-02"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,30]]},"DOI":"10.1145\/3611643.3616266","type":"proceedings-article","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T23:14:38Z","timestamp":1701386078000},"page":"68-80","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["DistXplore: Distribution-Guided Testing for Evaluating and Enhancing Deep Learning Systems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-9145-743X","authenticated-orcid":false,"given":"Longtian","family":"Wang","sequence":"first","affiliation":[{"name":"Xi'an Jiaotong University, Xi'an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1288-6502","authenticated-orcid":false,"given":"Xiaofei","family":"Xie","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3728-9541","authenticated-orcid":false,"given":"Xiaoning","family":"Du","sequence":"additional","affiliation":[{"name":"Monash University, Melbourne, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-2085-8674","authenticated-orcid":false,"given":"Meng","family":"Tian","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0974-9299","authenticated-orcid":false,"given":"Qing","family":"Guo","sequence":"additional","affiliation":[{"name":"IHPC and CFAR, Agency for Science, Technology and Research, Singapore, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3775-6739","authenticated-orcid":false,"given":"Zheng","family":"Yang","sequence":"additional","affiliation":[{"name":"TTE Lab, Huawei, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6959-0569","authenticated-orcid":false,"given":"Chao","family":"Shen","sequence":"additional","affiliation":[{"name":"Xi'an Jiaotong University, Xi'an, China"}]}],"member":"320","published-online":{"date-parts":[[2023,11,30]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","unstructured":"Zohreh Aghababaeyan Manel Abdellatif Mahboubeh Dadkhah and Lionel Briand. 2023. DeepGD: A Multi-Objective Black-Box Test Selection Approach for Deep Neural Networks. arXiv preprint arXiv:2303.04878 https:\/\/doi.org\/10.48550\/arXiv.2303.04878 10.48550\/arXiv.2303.04878","DOI":"10.48550\/arXiv.2303.04878"},{"key":"e_1_3_2_2_2_1","unstructured":"Anonymous. 2022. DistXplore. https:\/\/sites.google.com\/view\/distxplore"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3473124"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416609"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","unstructured":"Nicholas Carlini and David Wagner. 2017. Towards evaluating the robustness of neural networks. In 2017 ieee symposium on security and privacy (sp). 39\u201357. https:\/\/doi.org\/10.48550\/arXiv.1608.04644 10.48550\/arXiv.1608.04644","DOI":"10.48550\/arXiv.1608.04644"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW52544.2021.00022"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.18653\/V1"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00032"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576040"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00444"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338954"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/2976456.2976521"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/2188385.2188410"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3264835"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00080"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409756"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW.2015.58"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3511598"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3611666"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00152"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","unstructured":"Wei Huang Xingyu Zhao Alec Banks Victoria Cox and Xiaowei Huang. 2022. Hierarchical Distribution-Aware Testing of Deep Learning. arXiv preprint arXiv:2205.08589 https:\/\/doi.org\/10.1109\/ICSE43902.2021.00032 10.1109\/ICSE43902.2021.00032","DOI":"10.1109\/ICSE43902.2021.00032"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1609\/AAAI.V34I05.6311"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.118936"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2022.3179226"},{"key":"e_1_3_2_2_26_1","unstructured":"Yigitcan Kaya Bilal Zafar Sergul Aydore Nathalie Rauschmayr and Krishnaram Kenthapadi. 2022. Generating distributional adversarial examples to evade statistical detectors."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00108"},{"key":"e_1_3_2_2_28_1","unstructured":"Alex Krizhevsky and Geoffrey Hinton. 2009. Learning multiple layers of features from tiny images."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1607.02533"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","unstructured":"Jokin Labaien Ekhi Zugasti and Xabier De Carlos. 2021. DA-DGCEx: Ensuring validity of deep guided counterfactual explanations with distribution-aware autoencoder loss. arXiv preprint arXiv:2104.09062 https:\/\/doi.org\/10.48550\/arXiv.2104.09062 10.48550\/arXiv.2104.09062","DOI":"10.48550\/arXiv.2104.09062"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1905.00441"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3556941"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","unstructured":"Jiadong Lin Chuanbiao Song Kun He Liwei Wang and John E Hopcroft. 2019. Nesterov accelerated gradient and scale invariance for adversarial attacks. arXiv preprint arXiv:1908.06281 https:\/\/doi.org\/10.48550\/arXiv.1908.06281 10.48550\/arXiv.1908.06281","DOI":"10.48550\/arXiv.1908.06281"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0273804"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238202"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/2002472.2002491"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1706.06083"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00810"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1162\/evco.1996.4.2.113"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1080\/03610918208812247"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","unstructured":"Edoardo Mosca Shreyash Agarwal Javier Rando-Ramirez and Georg Groh. 2022. \" That Is a Suspicious Reaction!\": Interpreting Logits Variation to Detect NLP Adversarial Attacks. arXiv preprint arXiv:2204.04636 https:\/\/doi.org\/10.18653\/v1\/2022.acl-long.538 10.18653\/v1\/2022.acl-long.538","DOI":"10.18653\/v1"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3032227"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1807.10875"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","unstructured":"Liwen Ouyang and Aaron Key. 2021. Maximum Mean Discrepancy for Generalization in the Presence of Distribution and Missingness Shift. arXiv preprint arXiv:2111.10344 https:\/\/doi.org\/10.48550\/arXiv.2111.10344 10.48550\/arXiv.2111.10344","DOI":"10.48550\/arXiv.2111.10344"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3361566"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/RBME.2020.3013489"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9207588"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-NIER.2019.00030"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1162\/153244302760185252"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238172"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510206"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180220"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678590"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380379"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00038"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00126"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3200421"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00284"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00127"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3490489"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330579"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2021.3096332"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST57152.2023.00050"},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00790"},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.5555\/2969239.2969312"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178115"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464822"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33012253"},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC51365.2020.00035"},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464811"},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544792"}],"event":{"name":"ESEC\/FSE '23: 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"San Francisco CA USA","acronym":"ESEC\/FSE '23","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3616266","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3611643.3616266","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:03Z","timestamp":1750178163000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3616266"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,30]]},"references-count":73,"alternative-id":["10.1145\/3611643.3616266","10.1145\/3611643"],"URL":"https:\/\/doi.org\/10.1145\/3611643.3616266","relation":{},"subject":[],"published":{"date-parts":[[2023,11,30]]},"assertion":[{"value":"2023-11-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}