skip to main content
10.1145/3377811.3380370acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article

Approximation-refinement testing of compute-intensive cyber-physical models: an approach based on system identification

Published: 01 October 2020 Publication History

Abstract

Black-box testing has been extensively applied to test models of Cyber-Physical systems (CPS) since these models are not often amenable to static and symbolic testing and verification. Black-box testing, however, requires to execute the model under test for a large number of candidate test inputs. This poses a challenge for a large and practically-important category of CPS models, known as compute-intensive CPS (CI-CPS) models, where a single simulation may take hours to complete. We propose a novel approach, namely ARIsTEO, to enable effective and efficient testing of CI-CPS models. Our approach embeds black-box testing into an iterative approximation-refinement loop. At the start, some sampled inputs and outputs of the CI-CPS model under test are used to generate a surrogate model that is faster to execute and can be subjected to black-box testing. Any failure-revealing test identified for the surrogate model is checked on the original model. If spurious, the test results are used to refine the surrogate model to be tested again. Otherwise, the test reveals a valid failure. We evaluated ARIsTEO by comparing it with S-Taliro, an open-source and industry-strength tool for testing CPS models. Our results, obtained based on five publicly-available CPS models, show that, on average, ARIsTEO is able to find 24% more requirements violations than S-Taliro and is 31% faster than S-Taliro in finding those violations. We further assessed the effectiveness and efficiency of ARIsTEO on a large industrial case study from the satellite domain. In contrast to S-Taliro, ARIsTEO successfully tested two different versions of this model and could identify three requirements violations, requiring four hours, on average, for each violation.

References

[1]
2019. ARIsTEO. https://github.com/SNTSVV/ARIsTEO
[2]
2019. Cyber-Physical Systems and Internet-of-Things Week. http://cpslab.cs.mcgill.ca/cpsiotweek2019/
[3]
2019. Deep Learning Toolbox. https://it.mathworks.com/products/deep-learning.html
[4]
2019. Luxspace. https://luxspace.lu/
[5]
2019. Mathworks. https://mathworks.com. Accessed: 2019-08-07.
[6]
2019. Model Structure Selection: Determining Model Order and Input Delay. https://nl.mathworks.com/help/ident/ug/model-structure-selection-determining-model-order-and-input-delay.html
[7]
2019. Modeling Dynamic Systems in Simulink. https://nl.mathworks.com/help/simulink/ug/modeling-dynamic-systems.html Accessed: 2019-08-07.
[8]
2019. Pareto Frontier. https://en.wikipedia.org/wiki/Pareto_efficiency
[9]
2019. Resample. https://nl.mathworks.com/help/signal/ref/resample.html
[10]
2019. Setting for the baseline (S-Taliro) for the considered benchmark models. https://sites.google.com/a/asu.edu/s-taliro/s-taliro/download
[11]
2019. Stateflow. https://nl.mathworks.com/products/stateflow.html
[12]
Houssam Abbas, Andrew Winn, Georgios Fainekos, and A. Agung Julius. 2014. Functional gradient descent method for metric temporal logic specifications. In 2014 American Control Conference. IEEE, 2312--2317.
[13]
Takumi Akazaki, Shuang Liu, Yoriyuki Yamagata, Yihai Duan, and Jianye Hao. 2018. Falsification of cyber-physical systems using deep reinforcement learning. In International Symposium on Formal Methods. Springer, 456--465.
[14]
R. Alur. 2011. Formal verification of hybrid systems. In International Conference on Embedded Software (EMSOFT). ACM, 273--278.
[15]
Rajeev Alur. 2015. Principles of Cyber-Physical Systems. MIT Press.
[16]
Rajeev Alur, Costas Courcoubetis, Nicolas Halbwachs, Thomas A. Henzinger, P-H Ho, Xavier Nicollin, Alfredo Olivero, Joseph Sifakis, and Sergio Yovine. 1995. The algorithmic analysis of hybrid systems. Theoretical computer science 138, 1 (1995), 3--34.
[17]
Rajeev Alur, Thao Dang, and Franjo Ivančić. 2003. Counter-example guided predicate abstraction of hybrid systems. In International Conference on Tools and Algorithms for the Construction and Analysis of Systems. Springer, 208--223.
[18]
Rajeev Alur, Thao Dang, and Franjo Ivančić. 2006. Predicate abstraction for reachability analysis of hybrid systems. ACM transactions on embedded computing systems (TECS) 5, 1 (2006), 152--199.
[19]
Yashwanth Annpureddy, Che Liu, Georgios Fainekos, and Sriram Sankaranarayanan. 2011. S-TaLiRo: A Tool for Temporal Logic Falsification for Hybrid Systems. In Tools and Algorithms for the Construction and Analysis of Systems. Springer.
[20]
Andrea Arcuri and Lionel C. Briand. 2014. A Hitchhiker's guide to statistical tests for assessing randomized algorithms in software engineering. Softw. Test., Verif. Reliab. 24, 3 (2014), 219--250.
[21]
Aitor Arrieta, Goiuria Sagardui, Leire Etxeberria, and Justyna Zander. 2017. Automatic generation of test system instances for configurable cyber-physical systems. Software Quality Journal 3 (2017), 1041--1083.
[22]
Aitor Arrieta, Shuai Wang, Ainhoa Arruabarrena, Urtzi Markiegi, Goiuria Sagardui, and Leire Etxeberria. 2018. Multi-objective Black-box Test Case Selection for Cost-effectively Testing Simulation Models. In Genetic and Evolutionary Computation Conference (GECCO). ACM, 1411--1418.
[23]
Aitor Arrieta, Shuai Wang, Urtzi Markiegi, Ainhoa Arruabarrena, Leire Etxeberria, and Goiuria Sagardui. 2019. Pareto efficient multi-objective black-box test case selection for simulation-based testing. Information and Software Technology (2019).
[24]
Aitor Arrieta, Shuai Wang, Goiuria Sagardui, and Leire Etxeberria. 2016. Search-based test case selection of cyber-physical system product lines for simulation-based validation. In International Systems and Software Product Line Conference. ACM, 297--306.
[25]
Thomas Ball, Orna Kupferman, and Greta Yorsh. 2005. Abstraction for falsification. In International Conference on Computer Aided Verification. Springer, 67--81.
[26]
Ezio Bartocci, Jyotirmoy Deshmukh, Alexandre Donzé, Georgios Fainekos, Oded Maler, Dejan Ničković, and Sriram Sankaranarayanan. 2018. Specification-Based Monitoring of Cyber-Physical Systems: A Survey on Theory, Tools and Applications. In Lectures on Runtime Verification: Introductory and Advanced Topics. Springer, 135--175.
[27]
R. Ben Abdessalem, S. Nejati, L. C. Briand, and T. Stifter. 2018. Testing Vision-Based Control Systems Using Learnable Evolutionary Algorithms. In International Conference on Software Engineering (ICSE). 1016--1026.
[28]
Christopher M Bishop. 2006. Pattern recognition and machine learning. springer.
[29]
Sergio Bittanti. 2019. Model Identification and Data Analysis. Wiley.
[30]
Sergiy Bogomolov, Mirco Giacobbe, Thomas A. Henzinger, and Hui Kong. 2017. Conic Abstractions for Hybrid Systems. In Formal Modeling and Analysis of Timed Systems, Alessandro Abate and Gilles Geeraerts (Eds.). Springer, 116--132.
[31]
Devendra K Chaturvedi. 2009. Modeling and simulation of systems using MATLAB and Simulink. CRC press.
[32]
Xin Chen, Erika Ábrahám, and Sriram Sankaranarayanan. 2013. Flow*: An analyzer for non-linear hybrid systems. In International Conference on Computer Aided Verification. Springer, 258--263.
[33]
Shafiul Azam Chowdhury, Soumik Mohian, Sidharth Mehra, Siddhant Gawsane, Taylor T Johnson, and Christoph Csallner. 2018. Automatically finding bugs in a commercial cyber-physical system development tool chain with SLforge. In International Conference on Software Engineering. ACM, 981--992.
[34]
Edmund Clarke, Ansgar Fehnker, Zhi Han, Bruce Krogh, Joël Ouaknine, Olaf Stursberg, and Michael Theobald. 2003. Abstraction and counterexample-guided refinement in model checking of hybrid systems. International journal of foundations of computer science 14, 04 (2003), 583--604.
[35]
Edmund Clarke, Ansgar Fehnker, Zhi Han, Bruce Krogh, Olaf Stursberg, and Michael Theobald. 2003. Verification of Hybrid Systems Based on Counterexample-Guided Abstraction Refinement. In Tools and Algorithms for the Construction and Analysis of Systems. Springer, 192--207.
[36]
Edmund Clarke, Orna Grumberg, Somesh Jha, Yuan Lu, and Helmut Veith. 2000. Counterexample-guided abstraction refinement. In International Conference on Computer Aided Verification. Springer, 154--169.
[37]
Edmund M Clarke, Orna Grumberg, and David E Long. 1994. Model checking and abstraction. Transactions on Programming Languages and Systems (TOPLAS) 16, 5 (1994), 1512--1542.
[38]
Cas J. F. Cremers. 2008. The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols. In International Conference on Computer Aided Verification. Springer, 414--418.
[39]
Yanja Dajsuren, Mark G.J. van den Brand, Alexander Serebrenik, and Serguei Roubtsov. 2013. Simulink Models Are Also Software: Modularity Assessment. In International ACM Sigsoft Conference on Quality of Software Architectures. ACM.
[40]
Thao Dang, Alexandre Donzé, and Oded Maler. 2004. Verification of analog and mixed-signal circuits using hybrid system techniques. In International Conference on Formal Methods in Computer-Aided Design. Springer, 21--36.
[41]
Thao Dang and Tarik Nahhal. 2009. Coverage-guided test generation for continuous and hybrid systems. Formal Methods in System Design 34, 2 (2009), 183--213.
[42]
Jyotirmoy Deshmukh, Xiaoqing Jin, James Kapinski, and Oded Maler. 2015. Stochastic Local Search for Falsification of Hybrid Systems. In Automated Technology for Verification and Analysis, Bernd Finkbeiner, Geguang Pu, and Lijun Zhang (Eds.). Springer, 500--517.
[43]
Henning Dierks, Sebastian Kupferschmid, and Kim G Larsen. 2007. Automatic abstraction refinement for timed automata. In International Conference on Formal Modeling and Analysis of Timed Systems. Springer, 114--129.
[44]
Dong Wang, Pei-Hsin Ho, Jiang Long, J. Kukula, Yunshan Zhu, T. Ma, and R. Damiano. 2001. Formal property verification by abstraction refinement with formal, simulation and hybrid engines. In Design Automation Conference. IEEE, 35--40.
[45]
Alexandre Donzé. 2010. Breach, a toolbox for verification and parameter synthesis of hybrid systems. In International Conference on Computer Aided Verification. Springer, 167--170.
[46]
Tommaso Dreossi, Thao Dang, Alexandre Donzé, James Kapinski, Xiaoqing Jin, and Jyotirmoy V Deshmukh. 2015. Efficient guiding strategies for testing of temporal properties of hybrid systems. In NASA Formal Methods Symposium. Springer, 127--142.
[47]
Gidon Ernst, Paolo Arcaini, Alexandre Donze, Georgios Fainekos, Logan Mathesen, Giulia Pedrielli, Shakiba Yaghoubi, Yoriyuki Yamagata, and Zhenya Zhang. 2019. ARCH-COMP 2019 Category Report: Falsification. EPiC Series in Computing 61 (2019), 129--140.
[48]
Georgios E Fainekos and George J Pappas. 2008. A user guide for TaLiRo. Technical Report. Technical report, Dept. of CIS, Univ. of Pennsylvania.
[49]
Georgios E Fainekos and George J Pappas. 2009. Robustness of temporal logic specifications for continuous-time signals. Theoretical Computer Science 410, 42 (2009), 4262--4291.
[50]
Chuchu Fan, Bolun Qi, Sayan Mitra, and Mahesh Viswanathan. 2017. DryVR: Data-Driven Verification and Compositional Reasoning for Automotive Systems. In International Conference on Computer Aided Verification. Springer, 441--461.
[51]
Ansgar Fehnker and Franjo Ivancic. 2004. Benchmarks for hybrid systems verification. In International Workshop on Hybrid Systems: Computation and Control. Springer, 326--341.
[52]
Goran Frehse. 2008. PHAVer: algorithmic verification of hybrid systems past HyTech. International Journal on Software Tools for Technology Transfer 10, 3 (2008), 263--279.
[53]
Goran Frehse, Colas Le Guernic, Alexandre Donzé, Scott Cotton, Rajarshi Ray, Olivier Lebeltel, Rodolfo Ripado, Antoine Girard, Thao Dang, and Oded Maler. 2011. SpaceEx: Scalable verification of hybrid systems. In International Conference on Computer Aided Verification. Springer, 379--395.
[54]
Sicun Gao, Soonho Kong, and Edmund M Clarke. 2013. dReal: An SMT solver for nonlinear theories over the reals. In International conference on automated deduction. Springer, 208--214.
[55]
Carlos A González, Mojtaba Varmazyar, Shiva Nejati, Lionel C Briand, and Yago Isasi. 2018. Enabling model testing of cyber-physical systems. In International Conference on Model Driven Engineering Languages and Systems. ACM, 176--186.
[56]
Robert L Grossman, Anil Nerode, Anders P Ravn, and Hans Rischel. 1993. Hybrid systems. Vol. 736. Springer.
[57]
Thomas A Henzinger, Pei-Hsin Ho, and Howard Wong-Toi. 1997. HyTech: A model checker for hybrid systems. In International Conference on Computer Aided Verification. Springer, 460--463.
[58]
Thomas A. Henzinger, Pei-Hsin Ho, and Howard Wong-Toi. 1997. HYTECH: a model checker for hybrid systems. International Journal on Software Tools for Technology Transfer 1, 1 (1997), 110--122.
[59]
Thomas A. Henzinger, Peter W. Kopke, Anuj Puri, and Pravin Varaiya. 1998. What's decidable about hybrid automata? Journal of computer and system sciences 57, 1 (1998), 94--124.
[60]
Sumit K Jha, Bruce H Krogh, James E Weimer, and Edmund M Clarke. 2007. Reachability for linear hybrid automata using iterative relaxation abstraction. In International Workshop on Hybrid Systems: Computation and Control. Springer, 287--300.
[61]
Xiaoqing Jin, Jyotirmoy V Deshmukh, James Kapinski, Koichi Ueda, and Ken Butts. 2014. Powertrain control verification benchmark. In International conference on Hybrid systems: computation and control. ACM, 253--262.
[62]
A. Agung Julius, Georgios E. Fainekos, Madhukar Anand, Insup Lee, and George J. Pappas. 2007. Robust Test Generation and Coverage for Hybrid Systems. In Hybrid Systems: Computation and Control. Springer, 329--342.
[63]
Rudolph Emil Kalman. 1960. A new approach to linear filtering and prediction problems. Journal of basic Engineering 82, 1 (1960), 35--45.
[64]
J. Kapinski, J. V. Deshmukh, X. Jin, H. Ito, and K. Butts. 2016. Simulation-Based Approaches for Verification of Embedded Control Systems: An Overview of Traditional and Advanced Modeling, Testing, and Verification Techniques. IEEE Control Systems Magazine 36, 6 (2016), 45--64.
[65]
Soonho Kong, Sicun Gao, Wei Chen, and Edmund Clarke. 2015. dReach: Δ-reachability analysis for hybrid systems. In International Conference on TOOLS and Algorithms for the Construction and Analysis of Systems. Springer, 200--205.
[66]
Daniel Kroening and Georg Weissenbacher. 2010. Verification and falsification of programs with loops using predicate abstraction. Formal Aspects of Computing 22, 2 (2010), 105--128.
[67]
RP Kurshan. 1994. Computer-Aided Verification of Coordinating Processes: The Automata.
[68]
Grischa Liebel, Nadja Marko, Matthias Tichy, Andrea Leitner, and Jörgen Hansson. 2018. Model-based engineering in the embedded systems domain: an industrial survey on the state-of-practice. Software & Systems Modeling 17, 1 (2018), 91--113.
[69]
Lennart Ljung. 2008. System identification toolbox 7: Getting started guide. The MathWorks.
[70]
Sean Luke. 2013. Essentials of Metaheuristics. Lulu, Fairfax, Virginie, USA.
[71]
Oded Maler and Dejan Nickovic. 2004. Monitoring temporal properties of continuous signals. In Formal Techniques, Modelling and Analysis of Timed and Fault-Tolerant Systems. Springer, 152--166.
[72]
Reza Matinnejad, Shiva Nejati, Lionel Briand, Thomas Bruckmann, and Claude Poull. 2013. Automated model-in-the-loop testing of continuous controllers using search. In International Symposium on Search Based Software Engineering. Springer, 141--157.
[73]
Reza Matinnejad, Shiva Nejati, Lionel Briand, Thomas Bruckmann, and Claude Poull. 2015. Search-based automated testing of continuous controllers: Framework, tool support, and case studies. Information and Software Technology 57 (2015), 705--722.
[74]
Reza Matinnejad, Shiva Nejati, Lionel C. Briand, and Thomas Bruckmann. 2016. Automated Test Suite Generation for Time-continuous Simulink Models. In International Conference on Software Engineering (ICSE). ACM, 595--606.
[75]
John H McDonald. 2009. Handbook of biological statistics. Vol. 2.
[76]
Claudio Menghi, Shiva Nejati, Khouloud Gaaloul, and Lionel C. Briand. 2019. Generating Automated and Online Test Oracles for Simulink Models with Continuous and Uncertain Behaviors. In Foundations of Software Engineering (FSE). ACM.
[77]
Shiva Nejati. 2019. Testing Cyber-physical Systems via Evolutionary Algorithms and Machine Learning. In International Workshop on Search-Based Software Testing (SBST). IEEE.
[78]
Shiva Nejati, Khouloud Gaaloul, Claudio Menghi, Lionel C. Briand, Stephen Foster, and David Wolfe. 2019. Evaluating Model Testing and Model Checking for Finding Requirements Violations in Simulink Models. In Foundations of Software Engineering (FSE).
[79]
Johanna Nellen, Kai Driessen, Martin Neuhäußer, Erika Ábrahám, and Benedikt Wolters. 2016. Two CEGAR-based approaches for the safety verification of PLC-controlled plants. Information Systems Frontiers 18, 5 (2016), 927--952.
[80]
Truong Nghiem, Sriram Sankaranarayanan, Georgios Fainekos, Franjo Ivancić, Aarti Gupta, and George J. Pappas. 2010. Monte-carlo Techniques for Falsification of Temporal Properties of Non-linear Hybrid Systems. In International Conference on Hybrid Systems: Computation and Control. ACM.
[81]
Marta Olszewska. 2011. Simulink-specific design quality metrics. Turku Centre for Computer Science (2011).
[82]
Erion Plaku, Lydia E Kavraki, and Moshe Y Vardi. 2007. Hybrid systems: From verification to falsification. In International Conference on Computer Aided Verification. Springer, 463--476.
[83]
Marta Pląska, Mikko Huova, Marina Waldén, Kaisa Sere, and Matti Linjama. 2009. Quality analysis of simulink models. In International Conference on Quality Engineering in Software Technology. Verlag.
[84]
Seth Popinchalk. 2012. Improving Simulation Performance in Simulink. The MathWorks, Inc (2012), 1--10.
[85]
Pavithra Prabhakar, Parasara Sridhar Duggirala, Sayan Mitra, and Mahesh Viswanathan. 2015. Hybrid automata-based cegar for rectangular hybrid systems. Formal Methods in System Design 46, 2 (2015), 105--134.
[86]
Stefan Ratschan and Zhikun She. 2007. Safety verification of hybrid systems by constraint propagation-based abstraction refinement. Transactions on Embedded Computing Systems (TECS) 6, 1 (2007), 8.
[87]
Nima Roohi, Pavithra Prabhakar, and Mahesh Viswanathan. 2016. Hybridization Based CEGAR for Hybrid Automata with Affine Dynamics. In Tools and Algorithms for the Construction and Analysis of Systems. Springer, 752--769.
[88]
Goiuria Sagardui, Joseba Agirre, Urtzi Markiegi, Aitor Arrieta, Carlos Fernando Nicolás, and Jose María Martín. 2017. Multiplex: A co-simulation architecture for elevators validation. In International Workshop of Electronics, Control, Measurement, Signals and their application to Mechatronics (ECMSM). IEEE, 1--6.
[89]
Sriram Sankaranarayanan and Georgios Fainekos. 2012. Falsification of temporal properties of hybrid systems using the cross-entropy method. In International conference on Hybrid Systems: Computation and Control. ACM, 125--134.
[90]
Sriram Sankaranarayanan and Georgios Fainekos. 2012. Simulating insulin infusion pump risks by in-silico modeling of the insulin-glucose regulatory system. In International Conference on Computational Methods in Systems Biology. Springer, 322--341.
[91]
Marc Segelken. 2007. Abstraction and counterexample-guided construction of ω-automata for model checking of step-discrete linear hybrid models. In International Conference on Computer Aided Verification. Springer, 433--448.
[92]
Gaddadevara Matt Siddesh, Ganesh Chandra Deka, Krishnarajanagar GopalaIyengar Srinivasa, and Lalit Mohan Patnaik. 2015. Cyber-Physical Systems: A Computational Perspective. Chapman & Hall/CRC.
[93]
Torsten Söderström and Petre Stoica. 1989. System identification. (1989).
[94]
Maria Sorea. 2004. Lazy approximation for dense real-time systems. In Formal Techniques, Modelling and Analysis of Timed and Fault-Tolerant Systems. Springer, 363--378.
[95]
Cumhur Erkan Tuncali, Bardh Hoxha, Guohui Ding, Georgios Fainekos, and Sriram Sankaranarayanan. 2018. Experience Report: Application of Falsification Methods on the UxAS System. In NASA Formal Methods. Springer, 452--459.
[96]
S. Varrette, P. Bouvry, H. Cartiaux, and F. Georgatos. 2014. Management of an Academic HPC Cluster: The UL Experience. In Proc. of the 2014 Intl. Conf. on High Performance Computing & Simulation (HPCS 2014). IEEE, Bologna, Italy, 959--967.
[97]
S. Yaghoubi and G. Fainekos. 2017. Hybrid approximate gradient and stochastic descent for falsification of nonlinear systems. In 2017 American Control Conference (ACC). 529--534.
[98]
Shakiba Yaghoubi and Georgios Fainekos. 2017. Local descent for temporal logic falsification of cyber-physical systems. In Workshop on Design, Modeling and Evaluation of Cyber Physical Systems.
[99]
Wenji Zhang, Pavithra Prabhakar, and Balasubramaniam Natarajan. 2017. Abstraction based reachability analysis for finite branching stochastic hybrid systems. In International Conference on Cyber-Physical Systems (ICCPS). IEEE, 121--130.
[100]
Zhenya Zhang, Gidon Ernst, Sean Sedwards, Paolo Arcaini, and Ichiro Hasuo. 2018. Two-layered falsification of hybrid systems guided by monte carlo tree search. Transactions on Computer-Aided Design of Integrated Circuits and Systems 37, 11 (2018), 2894--2905.
[101]
Qianchuan Zhao, Bruce H Krogh, and Paul Hubbard. 2003. Generating test inputs for embedded control systems. Control Systems Magazine 23, 4 (2003), 49--57.
[102]
Aditya Zutshi, Jyotirmoy V. Deshmukh, Sriram Sankaranarayanan, and James Kapinski. 2014. Multiple Shooting, CEGAR-based Falsification for Hybrid Systems. In International Conference on Embedded Software (EMSOFT). ACM, 5:1--5:10.
[103]
Aditya Zutshi, Sriram Sankaranarayanan, Jyotirmoy V. Deshmukh, James Kapinski, and Xiaoqing Jin. 2015. Falsification of Safety Properties for Closed Loop Control Systems. In International Conference on Hybrid Systems: Computation and Control (HSCC). ACM, 299--300.

Cited By

View all

Index Terms

  1. Approximation-refinement testing of compute-intensive cyber-physical models: an approach based on system identification

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      ICSE '20: Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering
      June 2020
      1640 pages
      ISBN:9781450371216
      DOI:10.1145/3377811
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      In-Cooperation

      • KIISE: Korean Institute of Information Scientists and Engineers
      • IEEE CS

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 01 October 2020

      Permissions

      Request permissions for this article.

      Check for updates

      Badges

      Author Tags

      1. cyber-physical systems
      2. falsification
      3. model testing
      4. robustness
      5. search-based testing

      Qualifiers

      • Research-article

      Funding Sources

      Conference

      ICSE '20
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 276 of 1,856 submissions, 15%

      Upcoming Conference

      ICSE 2025

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)92
      • Downloads (Last 6 weeks)9
      Reflects downloads up to 25 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media