{"id":"https://openalex.org/W4389162110","doi":"https://doi.org/10.1145/3611643.3613867","title":"AG3: Automated Game GUI Text Glitch Detection Based on Computer Vision","display_name":"AG3: Automated Game GUI Text Glitch Detection Based on Computer Vision","publication_year":2023,"publication_date":"2023-11-30","ids":{"openalex":"https://openalex.org/W4389162110","doi":"https://doi.org/10.1145/3611643.3613867"},"language":"en","primary_location":{"id":"doi:10.1145/3611643.3613867","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3611643.3613867","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073209218","display_name":"Xiaoyun Liang","orcid":"https://orcid.org/0000-0001-5129-1459"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Xiaoyun Liang","raw_affiliation_strings":["ByteDance, Shenzhen, China"],"raw_orcid":"https://orcid.org/0000-0001-5129-1459","affiliations":[{"raw_affiliation_string":"ByteDance, Shenzhen, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089452421","display_name":"Jiayi Qi","orcid":"https://orcid.org/0009-0000-7536-0244"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jiayi Qi","raw_affiliation_strings":["ByteDance, Beijing, China"],"raw_orcid":"https://orcid.org/0009-0000-7536-0244","affiliations":[{"raw_affiliation_string":"ByteDance, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101456384","display_name":"Yongqiang Gao","orcid":"https://orcid.org/0009-0001-2984-0770"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yongqiang Gao","raw_affiliation_strings":["ByteDance, Shenzhen, China"],"raw_orcid":"https://orcid.org/0009-0001-2984-0770","affiliations":[{"raw_affiliation_string":"ByteDance, Shenzhen, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103231827","display_name":"Chao Peng","orcid":"https://orcid.org/0000-0003-2843-0689"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chao Peng","raw_affiliation_strings":["ByteDance, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0003-2843-0689","affiliations":[{"raw_affiliation_string":"ByteDance, Beijing, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101531776","display_name":"Ping Yang","orcid":"https://orcid.org/0009-0003-9862-6983"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ping Yang","raw_affiliation_strings":["ByteDance, Beijing, China"],"raw_orcid":"https://orcid.org/0009-0003-9862-6983","affiliations":[{"raw_affiliation_string":"ByteDance, Beijing, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5073209218"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.9595,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.7627979,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1879","last_page":"1890"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11439","display_name":"Video Analysis and Summarization","score":0.9850000143051147,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9794999957084656,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/glitch","display_name":"Glitch","score":0.8071805238723755},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7651854157447815},{"id":"https://openalex.org/keywords/tree-traversal","display_name":"Tree traversal","score":0.6679060459136963},{"id":"https://openalex.org/keywords/pipeline","display_name":"Pipeline (software)","score":0.6657588481903076},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5421158075332642},{"id":"https://openalex.org/keywords/fragmentation","display_name":"Fragmentation (computing)","score":0.5142995715141296},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5098556876182556},{"id":"https://openalex.org/keywords/game-design","display_name":"Game design","score":0.4160163402557373},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.349534273147583},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.26427602767944336},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.21514678001403809},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.12154361605644226},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.11277490854263306}],"concepts":[{"id":"https://openalex.org/C191287063","wikidata":"https://www.wikidata.org/wiki/Q543281","display_name":"Glitch","level":3,"score":0.8071805238723755},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7651854157447815},{"id":"https://openalex.org/C140745168","wikidata":"https://www.wikidata.org/wiki/Q1210082","display_name":"Tree traversal","level":2,"score":0.6679060459136963},{"id":"https://openalex.org/C43521106","wikidata":"https://www.wikidata.org/wiki/Q2165493","display_name":"Pipeline (software)","level":2,"score":0.6657588481903076},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5421158075332642},{"id":"https://openalex.org/C191015642","wikidata":"https://www.wikidata.org/wiki/Q1132459","display_name":"Fragmentation (computing)","level":2,"score":0.5142995715141296},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5098556876182556},{"id":"https://openalex.org/C503285160","wikidata":"https://www.wikidata.org/wiki/Q858057","display_name":"Game design","level":2,"score":0.4160163402557373},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.349534273147583},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.26427602767944336},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.21514678001403809},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.12154361605644226},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.11277490854263306},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3611643.3613867","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3611643.3613867","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W2013856010","https://openalex.org/W2060528272","https://openalex.org/W2241093273","https://openalex.org/W2356780433","https://openalex.org/W2514303331","https://openalex.org/W2620672884","https://openalex.org/W2620897946","https://openalex.org/W2740742367","https://openalex.org/W2762638234","https://openalex.org/W2787746902","https://openalex.org/W2794475704","https://openalex.org/W2794908093","https://openalex.org/W2803691889","https://openalex.org/W2883419767","https://openalex.org/W2884943471","https://openalex.org/W2890086692","https://openalex.org/W2916905798","https://openalex.org/W2955215835","https://openalex.org/W2956017828","https://openalex.org/W2962992787","https://openalex.org/W2963620568","https://openalex.org/W2970965447","https://openalex.org/W2989724224","https://openalex.org/W3036505300","https://openalex.org/W3048516901","https://openalex.org/W3049276000","https://openalex.org/W3082687416","https://openalex.org/W3100314869","https://openalex.org/W3101412407","https://openalex.org/W3104955806","https://openalex.org/W3121348934","https://openalex.org/W3122319236","https://openalex.org/W3175425861","https://openalex.org/W3180984751","https://openalex.org/W3184439416","https://openalex.org/W3196116509","https://openalex.org/W4206935805","https://openalex.org/W4237993802","https://openalex.org/W4241078940","https://openalex.org/W4243593507","https://openalex.org/W4248950571","https://openalex.org/W4255634804","https://openalex.org/W4296426214","https://openalex.org/W4312439759","https://openalex.org/W4313563733","https://openalex.org/W6600755281"],"related_works":["https://openalex.org/W2140328632","https://openalex.org/W170547082","https://openalex.org/W2136735429","https://openalex.org/W2541225405","https://openalex.org/W2587876411","https://openalex.org/W2358332176","https://openalex.org/W2149184458","https://openalex.org/W3145001198","https://openalex.org/W2128664904","https://openalex.org/W2066319026"],"abstract_inverted_index":{"With":[0],"the":[1,10,29,38,42,73],"advancement":[2],"of":[3,12,18,41],"device":[4,43,60],"software":[5],"and":[6,9,44,66,90,108,117],"hardware":[7],"performance,":[8],"evolution":[11],"game":[13,24,49,101],"engines,":[14],"an":[15,62],"increasing":[16],"number":[17],"emerging":[19],"high-quality":[20],"games":[21],"are":[22,88],"captivating":[23],"players":[25],"from":[26],"all":[27],"around":[28],"world":[30],"who":[31],"speak":[32],"different":[33],"languages.":[34],"However,":[35],"due":[36],"to":[37],"vast":[39],"fragmentation":[40],"platform":[45],"market,":[46],"a":[47,58],"well-tested":[48],"may":[50],"still":[51],"experience":[52],"text":[53,86,105,129],"glitches":[54,87,130],"when":[55],"installed":[56],"on":[57],"new":[59],"with":[61,131],"unseen":[63],"screen":[64],"resolution":[65],"system":[67],"version,":[68],"which":[69,98],"can":[70,124],"significantly":[71],"impact":[72],"user":[74],"experience.":[75],"In":[76,92],"our":[77],"testing":[78,81],"pipeline,":[79],"current":[80],"techniques":[82],"for":[83],"identifying":[84],"multilingual":[85,128],"laborious":[89],"inefficient.":[91],"this":[93],"paper,":[94],"we":[95],"present":[96],"AG3,":[97],"offers":[99],"intelligent":[100],"traversal,":[102],"precise":[103],"visual":[104],"glitch":[106],"detection,":[107],"integrated":[109],"quality":[110],"report":[111],"generation":[112],"capabilities.":[113],"Our":[114],"empirical":[115],"evaluation":[116],"internal":[118],"industrial":[119],"deployment":[120],"demonstrate":[121],"that":[122],"AG3":[123],"detect":[125],"various":[126],"real-world":[127],"minimal":[132],"human":[133],"involvement.":[134]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
