{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:56:07Z","timestamp":1730321767829,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,28]],"date-time":"2019-10-28T00:00:00Z","timestamp":1572220800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,28]]},"DOI":"10.1145\/3361242.3361259","type":"proceedings-article","created":{"date-parts":[[2019,10,24]],"date-time":"2019-10-24T19:04:48Z","timestamp":1571943888000},"page":"1-6","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["A Preliminary Study on Data Augmentation of Deep Learning for Image Classification"],"prefix":"10.1145","author":[{"given":"Cheng","family":"Lei","sequence":"first","affiliation":[{"name":"State Key Laboratory of Novel Software Technology, Nanjing University, Software Testing Engineering Laboratory of Jiangsu Province"}]},{"given":"Benlin","family":"Hu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Novel Software Technology, Nanjing University, Software Testing Engineering Laboratory of Jiangsu Province"}]},{"given":"Dong","family":"Wang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Novel Software Technology, Nanjing University, Software Testing Engineering Laboratory of Jiangsu Province"}]},{"given":"Shu","family":"Zhang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Novel Software Technology, Nanjing University, Software Testing Engineering Laboratory of Jiangsu Province"}]},{"given":"Zhenyu","family":"Chen","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Novel Software Technology, Nanjing University, Software Testing Engineering Laboratory of Jiangsu Province"}]}],"member":"320","published-online":{"date-parts":[[2019,10,28]]},"reference":[{"volume-title":"Le","year":"2018","author":"Cubuk Ekin Dogus","key":"e_1_3_2_1_1_1"},{"volume-title":"2016 6th International Conference on Information Communication and Management (ICICM). 141--145","author":"Dellana R.","key":"e_1_3_2_1_2_1"},{"volume-title":"Taylor","year":"2017","author":"Devries Terrance","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.668"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00745"},{"volume-title":"Advances in Neural Information Processing Systems 25","author":"Krizhevsky Alex","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","unstructured":"Yann LeCun. 1998. The MNIST database of handwritten digits. http:\/\/yann. lecun.com\/exdb\/mnist\/ (1998). Yann LeCun. 1998. The MNIST database of handwritten digits. http:\/\/yann. lecun.com\/exdb\/mnist\/ (1998)."},{"volume-title":"Deep learning. nature 521, 7553","year":"2015","author":"LeCun Yann","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33014780"},{"volume-title":"Recent Advances in Recurrent Neural Networks. CoRR abs\/1801.01078","year":"2018","author":"Salehinejad Hojjat","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8462241"},{"volume-title":"MuNN: Mutation Analysis of Neural Networks. In 2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C). IEEE, 108--115","year":"2018","author":"Shen Weijun","key":"e_1_3_2_1_14_1"},{"volume-title":"DeepGini: Prioritizing Massive Tests to Reduce Labeling Cost. arXiv preprint arXiv:1903.00661","year":"2019","author":"Shi Qingkai","key":"e_1_3_2_1_15_1"},{"volume-title":"Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556","year":"2014","author":"Simonyan Karen","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","first-page":"475","article-title":"Method for 2-D affine transformation of images","volume":"5","author":"Stearns Charles C","year":"1995","journal-title":"US Patent"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/3298023.3298188"},{"volume-title":"Going Deeper With Convolutions. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR).","year":"2015","author":"Szegedy Christian","key":"e_1_3_2_1_19_1"},{"volume-title":"Improving Deep Learning using Generic Data Augmentation. CoRR abs\/1708.06020","year":"2017","author":"Taylor Luke","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/3298483.3298625"},{"volume-title":"DeepPath: Path-Driven Testing Criteria for Deep Neural Networks. In 2019 IEEE International Conference On Artificial Intelligence Testing (AITest). IEEE, 119--120","year":"2019","author":"Wang Dong","key":"e_1_3_2_1_22_1"},{"volume-title":"Fashion-MNIST: a Novel Image Dataset for Benchmarking Machine Learning Algorithms. CoRR abs\/1708.07747","year":"2017","author":"Xiao Han","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.634"},{"volume-title":"mixup: Beyond empirical risk minimization. arXiv preprint arXiv:1710.09412","year":"2017","author":"Zhang Hongyi","key":"e_1_3_2_1_25_1"},{"volume-title":"NeuralVis: Visualizing and Interpreting Deep Learning Models. arXiv preprint arXiv:1906.00690","year":"2019","author":"Zhang Xufan","key":"e_1_3_2_1_26_1"},{"volume-title":"Random Erasing Data Augmentation. CoRR abs\/1708.04896","year":"2017","author":"Zhong Zhun","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2006.17"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00907"}],"event":{"name":"Internetware '19: The 11th Asia-Pacific Symposium on Internetware","sponsor":["ACM Association for Computing Machinery","SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Fukuoka Japan","acronym":"Internetware '19"},"container-title":["Proceedings of the 11th Asia-Pacific Symposium on Internetware"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3361242.3361259","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,14]],"date-time":"2023-01-14T02:05:13Z","timestamp":1673661913000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3361242.3361259"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,28]]},"references-count":28,"alternative-id":["10.1145\/3361242.3361259","10.1145\/3361242"],"URL":"https:\/\/doi.org\/10.1145\/3361242.3361259","relation":{},"subject":[],"published":{"date-parts":[[2019,10,28]]},"assertion":[{"value":"2019-10-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}