{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:00:50Z","timestamp":1729627250359,"version":"3.28.0"},"reference-count":63,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/Crown.html"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1109\/icsme.2019.00051","type":"proceedings-article","created":{"date-parts":[[2019,12,6]],"date-time":"2019-12-06T08:00:40Z","timestamp":1575619240000},"page":"333-342","source":"Crossref","is-referenced-by-count":16,"title":["Losing Confidence in Quality: Unspoken Evolution of Computer Vision Services"],"prefix":"10.1109","author":[{"given":"Alex","family":"Cummaudo","sequence":"first","affiliation":[]},{"given":"Rajesh","family":"Vasa","sequence":"additional","affiliation":[]},{"given":"John","family":"Grundy","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Abdelrazek","sequence":"additional","affiliation":[]},{"given":"Andrew","family":"Cain","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"crossref","first-page":"740","DOI":"10.1007\/978-3-319-10602-1_48","article-title":"Microsoft COCO: Common Objects in Context","author":"lin","year":"2014","journal-title":"Computer Vision – ECCV 2014"},{"year":"2018","journal-title":"RightScale 2018 State of the Cloud Report","key":"ref38"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1145\/1506409.1506424"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/MSR.2015.28"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/ESEM.2013.14"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1109\/VLHCC.2004.47","article-title":"Six learning barriers in end-user programming systems","author":"ko","year":"2004","journal-title":"2004 IEEE Symposium on Visual Languages-Human Centric Computing"},{"key":"ref37","first-page":"1","article-title":"Datasheets for datasets","author":"gebru","year":"2018","journal-title":"arXiv preprint arXiv 1803 09010"},{"key":"ref36","first-page":"220","article-title":"Model cards for model reporting","author":"mitchell","year":"2018","journal-title":"arXiv preprint arXiv 1810 06008"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1109\/VLHCC.2011.6070395"},{"key":"ref34","volume":"197","author":"boehm","year":"1981","journal-title":"Software Engineering Economics"},{"year":"2019","key":"ref60"},{"year":"2018","journal-title":"What is computer vision?","key":"ref62"},{"year":"2019","key":"ref61"},{"year":"2019","key":"ref63"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/UCC.2011.36"},{"key":"ref27","article-title":"Curating Content with Google Machine Learning Application Programming Interfaces","author":"ortiz","year":"2017","journal-title":"EIAPortugal"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1145\/1071713.1071731"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.20897\/jisem.201709"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1007\/978-3-319-77712-2_17"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/SSRR.2018.8468619"},{"year":"2007","author":"murphy","journal-title":"An approach to software testing of machine learning applications","key":"ref22"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/SEAA.2018.00018"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/ICSTW.2018.00060"},{"key":"ref23","article-title":"On testing machine learning programs","author":"braiek","year":"2018","journal-title":"arXiv preprint arXiv 1812 02588"},{"year":"2016","author":"breck","journal-title":"What's your ML Test Score? A rubric for ML production systems","key":"ref26"},{"year":"2008","author":"murphy","journal-title":"Improving the Dependability of Machine Learning Applications","key":"ref25"},{"year":"2018","journal-title":"Image recognition - talkwalker","key":"ref50"},{"year":"2019","key":"ref51"},{"year":"2019","key":"ref59"},{"year":"2019","journal-title":"Deepglint","key":"ref58"},{"year":"2018","journal-title":"How to call the Computer Vision API","key":"ref57"},{"year":"2018","journal-title":"Detecting labels in an image","key":"ref56"},{"year":"2018","journal-title":"Detect Labels –- Google Cloud Vision API Documentation –- Google Cloud","key":"ref55"},{"year":"2019","journal-title":"SENSET","key":"ref54"},{"year":"2019","journal-title":"Yitu technology","key":"ref53"},{"year":"2019","key":"ref52"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1016\/j.scico.2012.08.003"},{"year":"1999","journal-title":"Information Technology – Software Product Quality ISO\/IEC","article-title":"International Organization for Standardization","key":"ref11"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1007\/978-3-030-19274-7_28"},{"key":"ref12","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2013","journal-title":"arXiv preprint arXiv 1312 6199"},{"key":"ref13","first-page":"101","article-title":"Google’s Cloud Vision API is Not Robust to Noise","author":"hosseini","year":"2018","journal-title":"Machine Learning and Applications (ICMLA) 2017 16th IEEE International Conference on IEEE"},{"key":"ref14","article-title":"The elephant in the room","author":"rosenfeld","year":"2018","journal-title":"arXiv preprint arXiv 1808 02194"},{"key":"ref15","article-title":"With Great Training Comes Great Vulnerability - Practical Attacks against Transfer Learning","author":"wang","year":"2018","journal-title":"USENIX Security Symposium"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/TEVC.2019.2890858"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/CVPR.2018.00175"},{"key":"ref18","article-title":"Adversarial examples in the physical world","volume":"cs cv","author":"kurakin","year":"2016","journal-title":"arXiv preprint arXiv 1607 02533"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/CVPR.2018.00175"},{"year":"2011","author":"sommerville","journal-title":"Software Engineering","key":"ref4"},{"year":"2005","author":"pressman","journal-title":"Software Engineering A Practitioner’s Approach","key":"ref3"},{"year":"2008","author":"demeyer","journal-title":"Software Evolution","key":"ref6"},{"year":"2003","author":"horch","journal-title":"Practical Guide to Software Quality Management","key":"ref5"},{"key":"ref8","first-page":"131","article-title":"Evolution in open source software: A case study","author":"tu","year":"2000","journal-title":"Proc of the 2000 International Conference on Software Maintenance"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/FOSM.2008.4659256"},{"year":"2018","journal-title":"Imagga - powerful image recognition apis for automated categorization & tagging in the cloud and on-premises","key":"ref49"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/IWPSE.2005.7"},{"year":"2018","journal-title":"Image Recognition API & Visual Search Results","key":"ref46"},{"year":"2018","journal-title":"Watson visual recognition","key":"ref45"},{"year":"2018","journal-title":"Image Recognition API –- DeepAI","key":"ref48"},{"year":"2018","journal-title":"Clarifai","key":"ref47"},{"year":"2018","journal-title":"Image Processing with the Computer Vision API –- Microsoft Azure","key":"ref42"},{"year":"2018","journal-title":"Vision API - Image Content Analysis –- Cloud Vision API –- Google Cloud","key":"ref41"},{"year":"2018","journal-title":"Detecting labels in an image","key":"ref44"},{"year":"2018","journal-title":"Amazon Rekognition","key":"ref43"}],"event":{"name":"2019 IEEE International Conference on Software Maintenance and Evolution (ICSME)","start":{"date-parts":[[2019,9,29]]},"location":"Cleveland, OH, USA","end":{"date-parts":[[2019,10,4]]}},"container-title":["2019 IEEE International Conference on Software Maintenance and Evolution (ICSME)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8910135\/8918933\/08919078.pdf?arnumber=8919078","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,7]],"date-time":"2022-10-07T21:04:18Z","timestamp":1665176658000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8919078\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":63,"URL":"https:\/\/doi.org\/10.1109\/icsme.2019.00051","relation":{},"subject":[],"published":{"date-parts":[[2019,9]]}}}