{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T04:29:13Z","timestamp":1775017753047,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T00:00:00Z","timestamp":1726012800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,11]]},"DOI":"10.1145\/3650212.3680329","type":"proceedings-article","created":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T11:44:25Z","timestamp":1726055065000},"page":"895-907","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Datactive: Data Fault Localization for Object Detection Systems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-1574-2758","authenticated-orcid":false,"given":"Yining","family":"Yin","sequence":"first","affiliation":[{"name":"Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7477-3642","authenticated-orcid":false,"given":"Yang","family":"Feng","sequence":"additional","affiliation":[{"name":"Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-8817-8723","authenticated-orcid":false,"given":"Shihao","family":"Weng","sequence":"additional","affiliation":[{"name":"Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6913-6542","authenticated-orcid":false,"given":"Yuan","family":"Yao","sequence":"additional","affiliation":[{"name":"Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8368-4898","authenticated-orcid":false,"given":"Jia","family":"Liu","sequence":"additional","affiliation":[{"name":"Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-4629-6372","authenticated-orcid":false,"given":"Zhihong","family":"Zhao","sequence":"additional","affiliation":[{"name":"Nanjing University, Nanjing, China"}]}],"member":"320","published-online":{"date-parts":[[2024,9,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. Anonymized Repository - Anonymous GitHub. https:\/\/anonymous.4open.science\/r\/DataDetective-Ano\/README.md (Accessed on 12\/12\/2023)"},{"key":"e_1_3_2_1_2_1","unstructured":"[n. d.]. COCO - Common Objects in Context. https:\/\/cocodataset.org (Accessed on 07\/30\/2023)"},{"key":"e_1_3_2_1_3_1","unstructured":"[n. d.]. Datactive. https:\/\/sites.google.com\/view\/datactive\/introduction (Accessed on 04\/05\/2024)"},{"key":"e_1_3_2_1_4_1","unstructured":"[n. d.]. Gaussian blur - Wikipedia. https:\/\/en.wikipedia.org\/wiki\/Gaussian_blur (Accessed on 05\/05\/2023)"},{"key":"e_1_3_2_1_5_1","unstructured":"[n. d.]. The KITTI Vision Benchmark Suite. https:\/\/www.cvlibs.net\/datasets\/kitti\/eval_object.php?obj_benchmark=2d (Accessed on 04\/30\/2023)"},{"key":"e_1_3_2_1_6_1","unstructured":"[n. d.]. Pricing \u00a0|\u00a0 Data Labeling Service \u00a0|\u00a0 Google Cloud. https:\/\/cloud.google.com\/ai-platform\/data-labeling\/pricing (Accessed on 05\/05\/2023)"},{"key":"e_1_3_2_1_7_1","volume-title":"SAFECOMP 2021 Workshops: DECSoS, MAPSOD, DepDevOps, USDAI, and WAISE, York, UK, September 7, 2021, Proceedings 40","author":"Adhikari Bishwo","year":"2021","unstructured":"Bishwo Adhikari, Jukka Peltom\u00e4ki, Saeed Bakhshi Germi, Esa Rahtu, and Heikki Huttunen. 2021. Effect of label noise on robustness of deep neural network object detectors. In Computer Safety, Reliability, and Security. SAFECOMP 2021 Workshops: DECSoS, MAPSOD, DepDevOps, USDAI, and WAISE, York, UK, September 7, 2021, Proceedings 40. 239\u2013250."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3517337"},{"key":"e_1_3_2_1_9_1","volume-title":"International conference on machine learning. 233\u2013242","author":"Arpit Devansh","year":"2017","unstructured":"Devansh Arpit, Stanislaw Jastrzebski, Nicolas Ballas, David Krueger, Emmanuel Bengio, Maxinder S Kanwal, Tegan Maharaj, Asja Fischer, Aaron Courville, and Yoshua Bengio. 2017. A closer look at memorization in deep networks. In International conference on machine learning. 233\u2013242."},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops. 3850\u20133859","author":"B\u00e4r Andreas","year":"2023","unstructured":"Andreas B\u00e4r, Jonas Uhrig, Jeethesh Pai Umesh, Marius Cordts, and Tim Fingscheidt. 2023. A Novel Benchmark for Localization Label Errors and Their Refinement in Autolabeled Datasets for Object Detection. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops. 3850\u20133859."},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings, Part III 16","author":"Bolya Daniel","year":"2020","unstructured":"Daniel Bolya, Sean Foley, James Hays, and Judy Hoffman. 2020. Tide: A general toolbox for identifying object detection errors. In Computer Vision\u2013ECCV 2020: 16th European Conference, Glasgow, UK, August 23\u201328, 2020, Proceedings, Part III 16. 558\u2013573."},{"key":"e_1_3_2_1_12_1","unstructured":"Clemens-Alexander Brust Christoph K\u00e4ding and Joachim Denzler. 2018. Active learning for deep object detection. arXiv preprint arXiv:1809.09875."},{"key":"e_1_3_2_1_13_1","unstructured":"Xinyun Chen Chang Liu Bo Li Kimberly Lu and Dawn Song. 2017. Targeted backdoor attacks on deep learning systems using data poisoning. arXiv preprint arXiv:1712.05526."},{"key":"e_1_3_2_1_14_1","volume-title":"2020 33rd SIBGRAPI conference on graphics, patterns and images (SIBGRAPI). 9\u201316","author":"Cordeiro Filipe R","year":"2020","unstructured":"Filipe R Cordeiro and Gustavo Carneiro. 2020. A survey on deep learning with noisy labels: How to train your model when you cannot trust on the annotations? In 2020 33rd SIBGRAPI conference on graphics, patterns and images (SIBGRAPI). 9\u201316."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_3_2_1_16_1","volume-title":"Test case prioritization: A family of empirical studies","author":"Elbaum Sebastian","year":"2002","unstructured":"Sebastian Elbaum, Alexey G Malishevsky, and Gregg Rothermel. 2002. Test case prioritization: A family of empirical studies. IEEE transactions on software engineering, 28, 2 (2002), 159\u2013182."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-009-0275-4"},{"key":"e_1_3_2_1_18_1","volume-title":"Active learning: An introduction. ASQ higher education brief, 2, 4","author":"Felder Richard M","year":"2009","unstructured":"Richard M Felder and Rebecca Brent. 2009. Active learning: An introduction. ASQ higher education brief, 2, 4 (2009), 1\u20135."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.2972974"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397357"},{"key":"e_1_3_2_1_21_1","volume-title":"The KITTI Vision Benchmark Suite. In Conference on Computer Vision and Pattern Recognition (CVPR).","author":"Geiger Andreas","year":"2012","unstructured":"Andreas Geiger, Philip Lenz, and Raquel Urtasun. 2012. Are we ready for Autonomous Driving? The KITTI Vision Benchmark Suite. In Conference on Computer Vision and Pattern Recognition (CVPR)."},{"key":"e_1_3_2_1_22_1","volume-title":"International conference on machine learning. 2242\u20132251","author":"Ghorbani Amirata","year":"2019","unstructured":"Amirata Ghorbani and James Zou. 2019. Data shapley: Equitable valuation of data for machine learning. In International conference on machine learning. 2242\u20132251."},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the AAAI conference on artificial intelligence. 31","author":"Ghosh Aritra","year":"2017","unstructured":"Aritra Ghosh, Himanshu Kumar, and P Shanti Sastry. 2017. Robust loss functions under label noise for deep neural networks. In Proceedings of the AAAI conference on artificial intelligence. 31."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.09.081"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.169"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Ross Girshick Jeff Donahue Trevor Darrell and Jitendra Malik. 2014. Rich feature hierarchies for accurate object detection and semantic segmentation. In Computer Vision and Pattern Recognition.","DOI":"10.1109\/CVPR.2014.81"},{"key":"e_1_3_2_1_27_1","volume-title":"Jo\u00e3o E Ferreira, and Luciano V Ara\u00fajo.","author":"Goncalves Vinicius PM","year":"2023","unstructured":"Vinicius PM Goncalves, Lourival P Silva, Fatima LS Nunes, Jo\u00e3o E Ferreira, and Luciano V Ara\u00fajo. 2023. Concept drift adaptation in video surveillance: a systematic review. Multimedia Tools and Applications, 1\u201341."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_29_1","volume-title":"2021 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE). 917\u2013929","author":"Hu Qiang","year":"2021","unstructured":"Qiang Hu, Yuejun Guo, Maxime Cordy, Xiaofei Xie, Wei Ma, Mike Papadakis, and Yves Le Traon. 2021. Towards exploring the limitations of active learning: An empirical study. In 2021 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE). 917\u2013929."},{"key":"e_1_3_2_1_30_1","first-page":"1","article-title":"Probability differential-based class label noise purification for object detection in aerial images","volume":"19","author":"Hu Zibo","year":"2022","unstructured":"Zibo Hu, Kun Gao, Xiaodian Zhang, Junwei Wang, Hong Wang, and Jiawei Han. 2022. Probability differential-based class label noise purification for object detection in aerial images. IEEE Geoscience and Remote Sensing Letters, 19 (2022), 1\u20135.","journal-title":"IEEE Geoscience and Remote Sensing Letters"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3514221.3517907"},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV).","author":"Khodabandeh Mehran","unstructured":"Mehran Khodabandeh, Arash Vahdat, Mani Ranjbar, and William G. Macready. 2019. A Robust Learning Approach to Domain Adaptive Object Detection. In Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380329"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931051"},{"key":"e_1_3_2_1_35_1","volume-title":"Basic set theory","author":"Levy Azriel","unstructured":"Azriel Levy. 2012. Basic set theory. Courier Corporation."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510091"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3556941"},{"key":"e_1_3_2_1_38_1","volume-title":"Daniel Ho, Fei-Fei Li, Matei Zaharia, Ce Zhang, and James Zou.","author":"Liang Weixin","year":"2022","unstructured":"Weixin Liang, Girmaw Abebe Tadesse, Daniel Ho, Fei-Fei Li, Matei Zaharia, Ce Zhang, and James Zou. 2022. Advances, challenges and opportunities in creating data for trustworthy AI. Nature Machine Intelligence, 1\u20139."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.324"},{"key":"e_1_3_2_1_40_1","volume-title":"Zurich","author":"Lin Tsung-Yi","year":"2014","unstructured":"Tsung-Yi Lin, Michael Maire, Serge Belongie, James Hays, Pietro Perona, Deva Ramanan, Piotr Doll\u00e1r, and C Lawrence Zitnick. 2014. Microsoft coco: Common objects in context. In Computer Vision\u2013ECCV 2014: 13th European Conference, Zurich, Switzerland, September 6-12, 2014, Proceedings, Part V 13. 740\u2013755."},{"key":"e_1_3_2_1_41_1","volume-title":"Proceedings, Part I 14","author":"Liu Wei","year":"2016","unstructured":"Wei Liu, Dragomir Anguelov, Dumitru Erhan, Christian Szegedy, Scott Reed, Cheng-Yang Fu, and Alexander C Berg. 2016. Ssd: Single shot multibox detector. In Computer Vision\u2013ECCV 2016: 14th European Conference, Amsterdam, The Netherlands, October 11\u201314, 2016, Proceedings, Part I 14. 21\u201337."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW56347.2022.00532"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3417330","article-title":"Test selection for deep learning systems","volume":"30","author":"Ma Wei","year":"2021","unstructured":"Wei Ma, Mike Papadakis, Anestis Tsakmalis, Maxime Cordy, and Yves Le Traon. 2021. Test selection for deep learning systems. ACM Transactions on Software Engineering and Methodology (TOSEM), 30, 2 (2021), 1\u201322.","journal-title":"ACM Transactions on Software Engineering and Methodology (TOSEM)"},{"key":"e_1_3_2_1_44_1","volume-title":"Deep learning-based object detection in low-altitude UAV datasets: A survey. Image and Vision computing, 104","author":"Mittal Payal","year":"2020","unstructured":"Payal Mittal, Raman Singh, and Akashdeep Sharma. 2020. Deep learning-based object detection in low-altitude UAV datasets: A survey. Image and Vision computing, 104 (2020), 104046."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2006.876287"},{"key":"e_1_3_2_1_46_1","volume-title":"Proceedings of the 35th Conference on Neural Information Processing Systems Track on Datasets and Benchmarks.","author":"Northcutt Curtis G.","year":"2021","unstructured":"Curtis G. Northcutt, Anish Athalye, and Jonas Mueller. 2021. Pervasive Label Errors in Test Sets Destabilize Machine Learning Benchmarks. In Proceedings of the 35th Conference on Neural Information Processing Systems Track on Datasets and Benchmarks."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1613\/jair.1.12125"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Dim P. Papadopoulos Jasper Uijlings Frank Keller and Vittorio Ferrari. 2016. We don\u2019t need no bounding-boxes: Training object class detectors using only human verification. computer vision and pattern recognition.","DOI":"10.1109\/CVPR.2016.99"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.62"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.91"},{"key":"e_1_3_2_1_51_1","volume-title":"Faster r-cnn: Towards real-time object detection with region proposal networks. Advances in neural information processing systems, 28","author":"Ren Shaoqing","year":"2015","unstructured":"Shaoqing Ren, Kaiming He, Ross Girshick, and Jian Sun. 2015. Faster r-cnn: Towards real-time object detection with region proposal networks. Advances in neural information processing systems, 28 (2015)."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00075"},{"key":"e_1_3_2_1_53_1","first-page":"91","article-title":"Deep active learning for object detection","volume":"362","author":"Roy Soumya","year":"2018","unstructured":"Soumya Roy, Asim Unmesh, and Vinay P Namboodiri. 2018. Deep active learning for object detection.. In BMVC. 362, 91.","journal-title":"BMVC."},{"key":"e_1_3_2_1_54_1","volume-title":"Data Cascades in High-Stakes AI. In proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. 1\u201315","author":"Sambasivan Nithya","year":"2021","unstructured":"Nithya Sambasivan, Shivani Kapania, Hannah Highfill, Diana Akrong, Praveen Paritosh, and Lora M Aroyo. 2021. \u201cEveryone wants to do the model work, not the data work\u201d: Data Cascades in High-Stakes AI. In proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. 1\u201315."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3152527"},{"key":"e_1_3_2_1_56_1","volume-title":"Workshops at the Twenty-Sixth AAAI Conference on Artificial Intelligence.","author":"Su Hao","year":"2012","unstructured":"Hao Su, Jia Deng, and Li Fei-Fei. 2012. Crowdsourcing annotations for visual object detection. In Workshops at the Twenty-Sixth AAAI Conference on Artificial Intelligence."},{"key":"e_1_3_2_1_57_1","volume-title":"ObjectLab: Automated Diagnosis of Mislabeled Images in Object Detection Data. In ICML Workshop on Data-centric Machine Learning Research.","author":"Tkachenko Ulyana","year":"2023","unstructured":"Ulyana Tkachenko, Aditya Thyagarajan, and Jonas Mueller. 2023. ObjectLab: Automated Diagnosis of Mislabeled Images in Object Detection Data. In ICML Workshop on Data-centric Machine Learning Research."},{"key":"e_1_3_2_1_58_1","first-page":"1","article-title":"Multitype Label Noise Modeling and Uncertainty-Weighted Label Correction for Concealed Object Detection","volume":"72","author":"Wang Chen","year":"2023","unstructured":"Chen Wang, Jun Shi, Chongben Tao, FengLei Xu, Xinxin Tang, Liang Li, Yuanyuan Zhou, Bokun Tian, Shunjun Wei, and Xiaoling Zhang. 2023. Multitype Label Noise Modeling and Uncertainty-Weighted Label Correction for Concealed Object Detection. IEEE Transactions on Instrumentation and Measurement, 72 (2023), 1\u201312.","journal-title":"IEEE Transactions on Instrumentation and Measurement"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00721"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2521368"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3063727"},{"key":"e_1_3_2_1_62_1","volume-title":"Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 1345\u20131357","author":"Yin Yining","year":"2023","unstructured":"Yining Yin, Yang Feng, Shihao Weng, Zixi Liu, Yuan Yao, Yichi Zhang, Zhihong Zhao, and Zhenyu Chen. 2023. Dynamic Data Fault Localization for Deep Neural Networks. In Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 1345\u20131357."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1002\/stv.430"},{"key":"e_1_3_2_1_64_1","volume-title":"Improving crowdsourced label quality using noise correction","author":"Zhang Jing","year":"2017","unstructured":"Jing Zhang, Victor S Sheng, Tao Li, and Xindong Wu. 2017. Improving crowdsourced label quality using noise correction. IEEE transactions on neural networks and learning systems, 29, 5 (2017), 1675\u20131688."},{"key":"e_1_3_2_1_65_1","volume-title":"Generalized cross entropy loss for training deep neural networks with noisy labels. Advances in neural information processing systems, 31","author":"Zhang Zhilu","year":"2018","unstructured":"Zhilu Zhang and Mert Sabuncu. 2018. Generalized cross entropy loss for training deep neural networks with noisy labels. Advances in neural information processing systems, 31 (2018)."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3119563"},{"key":"e_1_3_2_1_67_1","volume-title":"Proc. IEEE.","author":"Zou Zhengxia","year":"2023","unstructured":"Zhengxia Zou, Keyan Chen, Zhenwei Shi, Yuhong Guo, and Jieping Ye. 2023. Object detection in 20 years: A survey. Proc. IEEE."}],"event":{"name":"ISSTA '24: 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Vienna Austria","acronym":"ISSTA '24","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","AITO"]},"container-title":["Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3650212.3680329","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3650212.3680329","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:50:07Z","timestamp":1750287007000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3650212.3680329"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,11]]},"references-count":67,"alternative-id":["10.1145\/3650212.3680329","10.1145\/3650212"],"URL":"https:\/\/doi.org\/10.1145\/3650212.3680329","relation":{},"subject":[],"published":{"date-parts":[[2024,9,11]]},"assertion":[{"value":"2024-09-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}