{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T13:02:18Z","timestamp":1761570138705,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":82,"publisher":"ACM","funder":[{"name":"the National Natural Science Foundation of China","award":["No. 62372225"],"award-info":[{"award-number":["No. 62372225"]}]},{"name":"the National Natural Science Foundation of China","award":["No. 62272220"],"award-info":[{"award-number":["No. 62272220"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,20]]},"DOI":"10.1145\/3755881.3755915","type":"proceedings-article","created":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T11:46:17Z","timestamp":1761565577000},"page":"474-486","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Lightweight Probabilistic Coverage Metrics for Efficient Testing of Deep Neural Networks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-1574-2758","authenticated-orcid":false,"given":"Yining","family":"Yin","sequence":"first","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7477-3642","authenticated-orcid":false,"given":"Yang","family":"Feng","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-8817-8723","authenticated-orcid":false,"given":"Shihao","family":"Weng","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-7135-1833","authenticated-orcid":false,"given":"Xinyu","family":"Gao","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8368-4898","authenticated-orcid":false,"given":"Jia","family":"Liu","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-4629-6372","authenticated-orcid":false,"given":"Zhihong","family":"Zhao","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, China"}]}],"member":"320","published-online":{"date-parts":[[2025,10,27]]},"reference":[{"key":"e_1_3_3_2_2_2","unstructured":"[n.d.]. Amazon promises fix for creepy Alexa laugh - BBC News. https:\/\/www.bbc.com\/news\/technology-43325230. (Accessed on 08\/23\/2021)."},{"key":"e_1_3_3_2_3_2","unstructured":"[n.d.]. A Google self-driving car caused a crash for the first time - The Verge. https:\/\/www.theverge.com\/2016\/2\/29\/11134344\/google-self-driving-car-crash-report. (Accessed on 09\/04\/2021)."},{"key":"e_1_3_3_2_4_2","unstructured":"[n.d.]. Tesla\u2019s Latest Autopilot Death Looks Just Like a Prior Crash | WIRED. https:\/\/www.wired.com\/story\/teslas-latest-autopilot-death-looks-like-prior-crash\/. (Accessed on 09\/04\/2021)."},{"key":"e_1_3_3_2_5_2","unstructured":"Mart\u00edn Abadi Ashish Agarwal Paul Barham Eugene Brevdo Zhifeng Chen Craig Citro Greg\u00a0S. Corrado Andy Davis Jeffrey Dean Matthieu Devin Sanjay Ghemawat Ian Goodfellow Andrew Harp Geoffrey Irving Michael Isard Yangqing Jia Rafal Jozefowicz Lukasz Kaiser Manjunath Kudlur Josh Levenberg Dandelion Man\u00e9 Rajat Monga Sherry Moore Derek Murray Chris Olah Mike Schuster Jonathon Shlens Benoit Steiner Ilya Sutskever Kunal Talwar Paul Tucker Vincent Vanhoucke Vijay Vasudevan Fernanda Vi\u00e9gas Oriol Vinyals Pete Warden Martin Wattenberg Martin Wicke Yuan Yu and Xiaoqiang Zheng. 2015. TensorFlow: Large-Scale Machine Learning on Heterogeneous Systems. https:\/\/www.tensorflow.org\/ Software available from tensorflow.org."},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1017\/9781316771273"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"crossref","unstructured":"Andrea Arcuri and Lionel Briand. 2014. A hitchhiker\u2019s guide to statistical tests for assessing randomized algorithms in software engineering. Software Testing Verification and Reliability 24 3 (2014) 219\u2013250.","DOI":"10.1002\/stvr.1486"},{"key":"e_1_3_3_2_8_2","unstructured":"Dzmitry Bahdanau Kyunghyun Cho and Yoshua Bengio. 2014. Neural machine translation by jointly learning to align and translate. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1409.0473 (2014)."},{"key":"e_1_3_3_2_9_2","volume-title":"Software testing techniques","author":"Beizer Boris","year":"2003","unstructured":"Boris Beizer. 2003. Software testing techniques. Dreamtech Press."},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00296-0_5"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/309847.310108"},{"key":"e_1_3_3_2_12_2","volume-title":"Testing object-oriented systems: models, patterns, and tools","author":"Binder Robert","year":"2000","unstructured":"Robert Binder. 2000. Testing object-oriented systems: models, patterns, and tools. Addison-Wesley Professional."},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"crossref","unstructured":"Marcel B\u00f6hme Van-Thuan Pham and Abhik Roychoudhury. 2017. Coverage-based greybox fuzzing as markov chain. IEEE Transactions on Software Engineering 45 5 (2017) 489\u2013506.","DOI":"10.1109\/TSE.2017.2785841"},{"key":"e_1_3_3_2_14_2","volume-title":"Linear algebra with applications","author":"Bretscher Otto","year":"1997","unstructured":"Otto Bretscher. 1997. Linear algebra with applications. Prentice Hall Eaglewood Cliffs, NJ."},{"key":"e_1_3_3_2_15_2","unstructured":"Junjie Chen Ming Yan Zan Wang Yuning Kang and Zhuo Wu. 2020. Deep neural network test coverage: How far are we? arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2010.04946 (2020)."},{"key":"e_1_3_3_2_16_2","volume-title":"Thirty-second AAAI conference on artificial intelligence","author":"Chen Pin-Yu","year":"2018","unstructured":"Pin-Yu Chen, Yash Sharma, Huan Zhang, Jinfeng Yi, and Cho-Jui Hsieh. 2018. Ead: elastic-net attacks to deep neural networks via adversarial examples. In Thirty-second AAAI conference on artificial intelligence."},{"key":"e_1_3_3_2_17_2","unstructured":"Fran\u00e7ois Chollet et\u00a0al. 2015. Keras. https:\/\/keras.io."},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"crossref","unstructured":"Joke Daems Sonia Vandepitte Robert\u00a0J Hartsuiker and Lieve Macken. 2017. Identifying the machine translation error types with the greatest impact on post-editing effort. Frontiers in Psychology 8 (2017) 1282.","DOI":"10.3389\/fpsyg.2017.01282"},{"key":"e_1_3_3_2_19_2","volume-title":"Applied nonparametric statistics","author":"Daniel Wayne\u00a0W","year":"1990","unstructured":"Wayne\u00a0W Daniel et\u00a0al. 1990. Applied nonparametric statistics. Vol.\u00a02. PWS-Kent Pub. Boston."},{"key":"e_1_3_3_2_20_2","first-page":"336","volume-title":"International Symposium On Leveraging Applications of Formal Methods, Verification and Validation","author":"Devroey Xavier","year":"2014","unstructured":"Xavier Devroey, Gilles Perrouin, Axel Legay, Maxime Cordy, Pierre-Yves Schobbens, and Patrick Heymans. 2014. Coverage criteria for behavioural testing of software product lines. In International Symposium On Leveraging Applications of Formal Methods, Verification and Validation. Springer, 336\u2013350."},{"key":"e_1_3_3_2_21_2","unstructured":"Yizhen Dong Peixin Zhang Jingyi Wang Shuang Liu Jun Sun Jianye Hao Xinyu Wang Li Wang Jin\u00a0Song Dong and Dai Ting. 2019. There is limited correlation between coverage and robustness for deep neural networks. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1911.05904 (2019)."},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338954"},{"key":"e_1_3_3_2_23_2","unstructured":"Reuben Feinman Ryan\u00a0R Curtin Saurabh Shintre and Andrew\u00a0B Gardner. 2017. Detecting adversarial samples from artifacts. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1703.00410 (2017)."},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2016.33"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397357"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510232"},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10710-017-9314-z"},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568278"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3264835"},{"key":"e_1_3_3_2_30_2","unstructured":"Jianmin Guo Yue Zhao Xueying Han Yu Jiang and Jiaguang Sun. 2019. Rnn-test: Adversarial testing framework for recurrent neural network systems. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1911.06155 (2019)."},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409754"},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_3_2_34_2","volume-title":"annual meeting of the American Educational Research Association","author":"Hess Melinda\u00a0R","year":"2004","unstructured":"Melinda\u00a0R Hess and Jeffrey\u00a0D Kromrey. 2004. Robust confidence intervals for effect sizes: A comparative study of Cohen\u2019sd and Cliff\u2019s delta under non-normality and heterogeneous variances. In annual meeting of the American Educational Research Association, Vol.\u00a01. Citeseer."},{"key":"e_1_3_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1201\/b10451"},{"key":"e_1_3_3_2_36_2","unstructured":"Rubing Huang Weifeng Sun Yinyin Xu Haibo Chen Dave Towey and Xin Xia. 2019. A survey on adaptive random testing. IEEE Transactions on Software Engineering (2019)."},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.5555\/257734.257766"},{"key":"e_1_3_3_2_38_2","volume-title":"2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE)","author":"Kim Jinhan","year":"2019","unstructured":"Jinhan Kim, Robert Feldt, and Shin Yoo. 2019. Guiding Deep Learning System Testing Using Surprise Adequacy. In 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE)."},{"key":"e_1_3_3_2_39_2","unstructured":"A. Krizhevsky and G. Hinton. 2009. Learning multiple layers of features from tiny images. Handbook of Systemic Autoimmune Diseases 1 4 (2009)."},{"key":"e_1_3_3_2_40_2","unstructured":"Alex Krizhevsky Vinod Nair and Geoffrey Hinton. 2009. CIFAR10. https:\/\/www.cs.toronto.edu\/\u00a0kriz\/cifar.html."},{"key":"e_1_3_3_2_41_2","unstructured":"Alexey Kurakin Ian Goodfellow Samy Bengio et\u00a0al. 2016. Adversarial examples in the physical world."},{"key":"e_1_3_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAICPART.2009.15"},{"key":"e_1_3_3_2_43_2","doi-asserted-by":"publisher","unstructured":"Michael\u00a0Austin Langford and Betty H.\u00a0C. Cheng. 2021. Enki: A Diversity-Driven Approach to Test and Train Robust Learning-Enabled Systems. ACM Trans. Auton. Adapt. Syst. 15 2 Article 5 (May 2021) 32\u00a0pages. 10.1145\/3460959","DOI":"10.1145\/3460959"},{"key":"e_1_3_3_2_44_2","doi-asserted-by":"crossref","unstructured":"Yann LeCun L\u00e9on Bottou Yoshua Bengio and Patrick Haffner. 1998. Gradient-based learning applied to document recognition. Proc. IEEE 86 11 (1998) 2278\u20132324.","DOI":"10.1109\/5.726791"},{"key":"e_1_3_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/CMPSAC.2004.1342705"},{"key":"e_1_3_3_2_46_2","doi-asserted-by":"crossref","unstructured":"Geert Litjens Thijs Kooi Babak\u00a0Ehteshami Bejnordi Arnaud Arindra\u00a0Adiyoso Setio Francesco Ciompi Mohsen Ghafoorian Jeroen\u00a0Awm Van Der\u00a0Laak Bram Van\u00a0Ginneken and Clara\u00a0I S\u00e1nchez. 2017. A survey on deep learning in medical image analysis. Medical image analysis 42 (2017) 60\u201388.","DOI":"10.1016\/j.media.2017.07.005"},{"key":"e_1_3_3_2_47_2","volume-title":"Introduction to Abstract Mathematics","author":"Lucas J.F.","year":"1990","unstructured":"J.F. Lucas. 1990. Introduction to Abstract Mathematics. Ardsley House. https:\/\/books.google.com.hk\/books?id=jklsb5JUgoQC"},{"key":"e_1_3_3_2_48_2","volume-title":"Individual choice behavior: A theoretical analysis","author":"Luce R\u00a0Duncan","year":"2012","unstructured":"R\u00a0Duncan Luce. 2012. Individual choice behavior: A theoretical analysis. Courier Corporation."},{"key":"e_1_3_3_2_49_2","volume-title":"2018 33rd IEEE\/ACM International Conference on Automated Software Engineering (ASE)","author":"Ma Lei","year":"2020","unstructured":"Lei Ma, Felix Juefei-Xu, Fuyuan Zhang, Jiyuan Sun, Minhui Xue, Bo Li, Chunyang Chen, Ting Su, Li Li, and Yang Liu. 2020. DeepGauge: Multi-Granularity Testing Criteria for Deep Learning Systems. In 2018 33rd IEEE\/ACM International Conference on Automated Software Engineering (ASE)."},{"key":"e_1_3_3_2_50_2","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238202"},{"key":"e_1_3_3_2_51_2","unstructured":"Aleksander Madry Aleksandar Makelov Ludwig Schmidt Dimitris Tsipras and Adrian Vladu. 2017. Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1706.06083 (2017)."},{"key":"e_1_3_3_2_52_2","doi-asserted-by":"crossref","unstructured":"Ninareh Mehrabi Fred Morstatter Nripsuta Saxena Kristina Lerman and Aram Galstyan. 2021. A survey on bias and fairness in machine learning. ACM Computing Surveys (CSUR) 54 6 (2021) 1\u201335.","DOI":"10.1145\/3457607"},{"key":"e_1_3_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1109\/IIPHDW.2018.8388338"},{"key":"e_1_3_3_2_54_2","doi-asserted-by":"crossref","unstructured":"Dinos Moundanos Jacob\u00a0A Abraham and Yatin\u00a0Vasant Hoskote. 1998. Abstraction techniques for validation coverage analysis and test generation. IEEE Trans. Comput. 47 1 (1998) 2\u201314.","DOI":"10.1109\/12.656068"},{"key":"e_1_3_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.5555\/2161638"},{"key":"e_1_3_3_2_56_2","doi-asserted-by":"crossref","unstructured":"Jaechang Nam Wei Fu Sunghun Kim Tim Menzies and Lin Tan. 2017. Heterogeneous defect prediction. IEEE Transactions on Software Engineering 44 9 (2017) 874\u2013896.","DOI":"10.1109\/TSE.2017.2720603"},{"key":"e_1_3_3_2_57_2","unstructured":"Yuval Netzer Tao Wang Adam Coates Alessandro Bissacco Bo Wu and Andrew\u00a0Y Ng. 2011. Reading digits in natural images with unsupervised feature learning. (2011)."},{"key":"e_1_3_3_2_58_2","first-page":"4901","volume-title":"International Conference on Machine Learning","author":"Odena Augustus","year":"2019","unstructured":"Augustus Odena, Catherine Olsson, David Andersen, and Ian Goodfellow. 2019. Tensorfuzz: Debugging neural networks with coverage-guided fuzzing. In International Conference on Machine Learning. PMLR, 4901\u20134911."},{"key":"e_1_3_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"e_1_3_3_2_60_2","doi-asserted-by":"crossref","unstructured":"Kexin Pei Yinzhi Cao Junfeng Yang and Suman Jana. 2017. DeepXplore: Automated Whitebox Testing of Deep Learning Systems. Getmobile Mobile Computing & Communications 22 3 (2017).","DOI":"10.1145\/3308755.3308767"},{"key":"e_1_3_3_2_61_2","first-page":"1","volume-title":"annual meeting of the Southern Association for Institutional Research","author":"Romano Jeanine","year":"2006","unstructured":"Jeanine Romano, Jeffrey\u00a0D Kromrey, Jesse Coraggio, Jeff Skowronek, and Linda Devine. 2006. Exploring methods for evaluating group differences on the NSSE and other surveys: Are the t-test and Cohen\u2019sd indices the most appropriate choices. In annual meeting of the Southern Association for Institutional Research. Citeseer, 1\u201351."},{"key":"e_1_3_3_2_62_2","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416621"},{"key":"e_1_3_3_2_63_2","doi-asserted-by":"crossref","unstructured":"Connor Shorten and Taghi\u00a0M Khoshgoftaar. 2019. A survey on image data augmentation for deep learning. Journal of Big Data 6 1 (2019) 1\u201348.","DOI":"10.1186\/s40537-019-0197-0"},{"key":"e_1_3_3_2_64_2","unstructured":"Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1409.1556 (2014)."},{"key":"e_1_3_3_2_65_2","volume-title":"Introduction to linear algebra","author":"Strang Gilbert","year":"1993","unstructured":"Gilbert Strang, Gilbert Strang, Gilbert Strang, and Gilbert Strang. 1993. Introduction to linear algebra. Vol.\u00a03. Wellesley-Cambridge Press Wellesley, MA."},{"key":"e_1_3_3_2_66_2","unstructured":"Youcheng Sun Xiaowei Huang and Daniel Kroening. 2018. Testing Deep Neural Networks. CoRR abs\/1803.04792 (2018). arxiv:https:\/\/arXiv.org\/abs\/1803.04792http:\/\/arxiv.org\/abs\/1803.04792"},{"key":"e_1_3_3_2_67_2","unstructured":"Youcheng Sun Xiaowei Huang Daniel Kroening James Sharp Matthew Hill and Rob Ashmore. 2018. Testing deep neural networks. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1803.04792 (2018)."},{"key":"e_1_3_3_2_68_2","first-page":"111","volume-title":"2019 IEEE\/ACM 41st International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)","author":"Sun Youcheng","year":"2019","unstructured":"Youcheng Sun, Xiaowei Huang, Daniel Kroening, James Sharp, Matthew Hill, and Rob Ashmore. 2019. DeepConcolic: Testing and debugging deep neural networks. In 2019 IEEE\/ACM 41st International Conference on Software Engineering: Companion Proceedings (ICSE-Companion). IEEE, 111\u2013114."},{"key":"e_1_3_3_2_69_2","doi-asserted-by":"crossref","unstructured":"Yuchi Tian Kexin Pei Suman Jana and Baishakhi Ray. 2017. DeepTest: Automated Testing of Deep-Neural-Network-driven Autonomous Cars. (2017).","DOI":"10.1145\/3180155.3180220"},{"key":"e_1_3_3_2_70_2","doi-asserted-by":"publisher","DOI":"10.1201\/b14876"},{"key":"e_1_3_3_2_71_2","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1109\/ICSE43902.2021.00038","volume-title":"2021 IEEE\/ACM 43rd International Conference on Software Engineering (ICSE)","author":"Wang Jingyi","year":"2021","unstructured":"Jingyi Wang, Jialuo Chen, Youcheng Sun, Xingjun Ma, Dongxia Wang, Jun Sun, and Peng Cheng. 2021. Robot: robustness-oriented testing for deep learning systems. In 2021 IEEE\/ACM 43rd International Conference on Software Engineering (ICSE). IEEE, 300\u2013311."},{"key":"e_1_3_3_2_72_2","volume-title":"Fashion-MNIST: a Novel Image Dataset for Benchmarking Machine Learning Algorithms","author":"Xiao Han","year":"2017","unstructured":"Han Xiao, Kashif Rasul, and Roland Vollgraf. 2017. Fashion-MNIST: a Novel Image Dataset for Benchmarking Machine Learning Algorithms. arXiv:https:\/\/arXiv.org\/abs\/cs.LG\/1708.07747\u00a0[cs.LG]"},{"key":"e_1_3_3_2_73_2","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330579"},{"key":"e_1_3_3_2_74_2","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409671"},{"key":"e_1_3_3_2_75_2","unstructured":"Christopher J.C.\u00a0Burges Yann\u00a0LeCun Corinna\u00a0Cortes. 1998. MNIST. http:\/\/yann.lecun.com\/exdb\/mnist\/."},{"key":"e_1_3_3_2_76_2","doi-asserted-by":"crossref","unstructured":"Shin Yoo and Mark Harman. 2012. Regression testing minimization selection and prioritization: a survey. Software testing verification and reliability 22 2 (2012) 67\u2013120.","DOI":"10.1002\/stvr.430"},{"key":"e_1_3_3_2_77_2","doi-asserted-by":"publisher","DOI":"10.5555\/3099718"},{"key":"e_1_3_3_2_78_2","first-page":"16","volume-title":"2019 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)","author":"Yu Jing","year":"2019","unstructured":"Jing Yu, Yao Fu, Yanan Zheng, Zheng Wang, and Xiaojun Ye. 2019. Test4Deep: an Effective White-Box Testing for Deep Neural Networks. In 2019 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC). IEEE, 16\u201323."},{"key":"e_1_3_3_2_79_2","unstructured":"Jie\u00a0M Zhang Mark Harman Lei Ma and Yang Liu. 2020. Machine learning testing: Survey landscapes and horizons. IEEE Transactions on Software Engineering (2020)."},{"key":"e_1_3_3_2_80_2","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238187"},{"key":"e_1_3_3_2_81_2","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380422"},{"key":"e_1_3_3_2_82_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSACW.2010.43"},{"key":"e_1_3_3_2_83_2","doi-asserted-by":"crossref","unstructured":"Hong Zhu Patrick\u00a0AV Hall and John\u00a0HR May. 1997. Software unit test coverage and adequacy. Acm computing surveys (csur) 29 4 (1997) 366\u2013427.","DOI":"10.1145\/267580.267590"}],"event":{"name":"Internetware 2025: the 16th International Conference on Internetware","sponsor":["SIGSOFT ACM Special Interest Group on Artificial Intelligence"],"location":"Trondheim Norway","acronym":"Internetware 2025"},"container-title":["Proceedings of the 16th International Conference on Internetware"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3755881.3755915","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T11:49:48Z","timestamp":1761565788000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3755881.3755915"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,20]]},"references-count":82,"alternative-id":["10.1145\/3755881.3755915","10.1145\/3755881"],"URL":"https:\/\/doi.org\/10.1145\/3755881.3755915","relation":{},"subject":[],"published":{"date-parts":[[2025,6,20]]},"assertion":[{"value":"2025-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}