{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T05:52:52Z","timestamp":1744869172776,"version":"3.28.0"},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1109\/icst49551.2021.00016","type":"proceedings-article","created":{"date-parts":[[2021,5,24]],"date-time":"2021-05-24T16:32:22Z","timestamp":1621873942000},"page":"36-46","source":"Crossref","is-referenced-by-count":34,"title":["A Search-Based Testing Framework for Deep Neural Networks of Source Code Embedding"],"prefix":"10.1109","author":[{"given":"Maryam Vahdat","family":"Pour","sequence":"first","affiliation":[{"name":"University of Calgary,Schulich School of Engineering,Canada"}]},{"given":"Zhuo","family":"Li","sequence":"additional","affiliation":[{"name":"Kyushu University,Department of Information Science and Electrical Engineering,Japan"}]},{"given":"Lei","family":"Ma","sequence":"additional","affiliation":[{"name":"Kyushu University,Department of Information Science and Electrical Engineering,Japan"}]},{"given":"Hadi","family":"Hemmati","sequence":"additional","affiliation":[{"name":"University of Calgary,Schulich School of Engineering,Canada"}]}],"member":"263","reference":[{"year":"2019","author":"yefet","article-title":"Adversarial examples for models of code","key":"ref39"},{"year":"2019","author":"wang","article-title":"Coset: A benchmark for evaluating neural program embeddings","key":"ref38"},{"year":"2019","author":"husain","article-title":"Codesearchnet challenge: Evaluating the state of semantic code search","key":"ref33"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/APS.2000.875398"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/ASE.2019.00126"},{"year":"2019","author":"zhang","article-title":"Generating textual adversarial examples for deep learning models: A survey","key":"ref30"},{"year":"2020","author":"bielik","article-title":"Adversarial robustness for code","key":"ref37"},{"key":"ref36","first-page":"311","article-title":"Bleu: a method for automatic evaluation of machine translation","author":"papineni","year":"2002","journal-title":"Proceedings of the 40th Annual Meeting on Association for Computational Linguistics - ACL '02"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.3115\/1073445.1073465"},{"key":"ref34","first-page":"74","article-title":"Rouge: A package for automatic evaluation of summaries","author":"lin","year":"2004","journal-title":"Text Summarization Branches Out"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1145\/3132747.3132785"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1609\/aaai.v34i01.5469"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1145\/3238147.3238202"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1145\/3238147.3238172"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/SANER.2019.8668044"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/3338906.3338954"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1145\/3324884.3416564","article-title":"Marble: Model-based Robustness Analysis of Stateful Deep Learning Systems","author":"du","year":"2020","journal-title":"IEEE\/ACM Int Conference on Automated Software Engineering (ASE)"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/ICSE.2019.00108"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1145\/3377811.3380368"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"1041","DOI":"10.1145\/3324884.3416609","article-title":"Cats Are Not Fish: Deep Learning Testing Calls for Out-Of-Distribution Awareness","author":"berend","year":"2020","journal-title":"IEEE\/ACM Int Conference on Automated Software Engineering (ASE)"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1016\/bs.adcom.2018.03.015","article-title":"Chapter six - mutation testing advances: An analysis and survey","volume":"112","year":"2019","journal-title":"Advances in Computers"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1145\/3133956.3134018"},{"year":"2014","author":"goodfellow","article-title":"Explaining and harnessing adversarial examples","key":"ref4"},{"key":"ref27","first-page":"756","article-title":"Mapping API Elements for Code Migration with Vector Representations","author":"nguyen","year":"2016","journal-title":"2016 IEEE\/ACM 38th International Conference on Software Engineering Companion (ICSE-C) ICSE-C"},{"year":"2018","author":"alon","article-title":"code2seq: Generating sequences from structured representations of code","key":"ref3"},{"year":"2020","author":"rabin","article-title":"Evaluation of generalizability of neural program analyzers under semantic-preserving transformations","key":"ref6"},{"year":"2018","author":"chakraborty","article-title":"Adversarial attacks and defences: A survey","key":"ref29"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/EuroSP.2016.36"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/TSE.2019.2962027"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.18653\/v1\/2020.findings-emnlp.139","article-title":"Codebert: A pre-trained model for programming and natural languages","author":"feng","year":"2020"},{"year":"2020","author":"ramakrishnan","article-title":"Semantic robustness of models of source code","key":"ref2"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1145\/3133916"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1145\/3290353"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1016\/0096-0551(85)90011-6"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/ASE.2019.00126"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/ISSRE.2018.00021"},{"year":"1947","author":"wald","journal-title":"Sequential Analysis","key":"ref24"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/ICSE.2019.00126"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/SANER.2019.8668043"},{"year":"2019","author":"chen","article-title":"A literature study of embeddings on source code","key":"ref25"}],"event":{"name":"2021 14th IEEE Conference on Software Testing, Verification and Validation (ICST)","start":{"date-parts":[[2021,4,12]]},"location":"Porto de Galinhas, Brazil","end":{"date-parts":[[2021,4,16]]}},"container-title":["2021 14th IEEE Conference on Software Testing, Verification and Validation (ICST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9438541\/9438542\/09438605.pdf?arnumber=9438605","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,28]],"date-time":"2022-12-28T07:10:49Z","timestamp":1672211449000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9438605\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/icst49551.2021.00016","relation":{},"subject":[],"published":{"date-parts":[[2021,4]]}}}