{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:18:24Z","timestamp":1774365504699,"version":"3.50.1"},"publisher-location":"Cham","reference-count":46,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030323035","type":"print"},{"value":"9783030323042","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-32304-2_14","type":"book-chapter","created":{"date-parts":[[2019,10,5]],"date-time":"2019-10-05T05:04:01Z","timestamp":1570251841000},"page":"271-295","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Robustness Verification of Support Vector Machines"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0159-0068","authenticated-orcid":false,"given":"Francesco","family":"Ranzato","sequence":"first","affiliation":[]},{"given":"Marco","family":"Zanella","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,2]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Anderson, G., Pailoor, S., Dillig, I., Chaudhuri, S.: Optimization and abstraction: a synergistic approach for analyzing neural network robustness. In: Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI2019), pp. 731\u2013744. ACM (2019)","DOI":"10.1145\/3314221.3314614"},{"key":"14_CR2","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/978-3-319-02300-7_4","volume-title":"Support Vector Machines Applications","author":"B Biggio","year":"2014","unstructured":"Biggio, B.: Security evaluation of support vector machines in adversarial environments. In: Ma, Y., Guo, G. (eds.) Support Vector Machines Applications, pp. 105\u2013153. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-02300-7_4"},{"key":"14_CR3","unstructured":"Biggio, B., Nelson, B., Laskov, P.: Support vector machines under adversarial label noise. In: Proceedings of the 3rd Asian Conference on Machine Learning (ACML2011), pp. 97\u2013112 (2011)"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D.A.: Towards evaluating the robustness of neural networks. In: Proceedings of the 2017 IEEE Symposium on Security and Privacy (SP2017), pp. 39\u201357 (2017)","DOI":"10.1109\/SP.2017.49"},{"issue":"3","key":"14_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1961189.1961199","volume":"2","author":"Chih-Chung Chang","year":"2011","unstructured":"Chang, C.-C., Lin, C.-J.: LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. 2(3):27:1\u201327:27 (2011)","journal-title":"ACM Transactions on Intelligent Systems and Technology"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Cousot, P., Cousot, R.: Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In: Proceedings of the 4th ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages (POPL1977), pp. 238\u2013252. ACM (1977)","DOI":"10.1145\/512950.512973"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Cristianini, N., Shawe-Taylor, J.: An Introduction to Support Vector Machines and OtherKernel-based Learning Methods. Cambridge University Press, Cambridge (2000)","DOI":"10.1017\/CBO9780511801389"},{"key":"14_CR8","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/978-3-319-68167-2_19","volume-title":"Automated Technology for Verification and Analysis","author":"R\u00fcdiger Ehlers","year":"2017","unstructured":"Ehlers, R.: Formal verification of piece-wise linear feed-forward neural networks. In: Proceedings of the 15th International Symposium on Automated Technology for Verification and Analysis (ATVA2017), pp. 269\u2013286 (2017)"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Gehr, T., Mirman, M., Drachsler-Cohen, D., Tsankov, P., Chaudhuri, S., Vechev, M.T.: AI2: safety and robustness certification of neural networks with abstract interpretation. In: Proceedings of the 2018 IEEE Symposium on Security and Privacy (SP2018), pp. 3\u201318 (2018)","DOI":"10.1109\/SP.2018.00058"},{"issue":"7","key":"14_CR10","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/3134599","volume":"61","author":"I Goodfellow","year":"2018","unstructured":"Goodfellow, I., McDaniel, P., Papernot, N.: Making machine learning robust against adversarial inputs. Commun. ACM 61(7), 56\u201366 (2018)","journal-title":"Commun. ACM"},{"key":"14_CR11","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. In: Proceedings of the International Conference on Learning Representations (ICLR2015) (2015)"},{"key":"14_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-01090-4_1","volume-title":"Automated Technology for Verification and Analysis","author":"D Gopinath","year":"2018","unstructured":"Gopinath, D., Katz, G., P\u0103s\u0103reanu, C.S., Barrett, C.: DeepSafe: a data-driven approach for assessing robustness of neural networks. In: Lahiri, S.K., Wang, C. (eds.) ATVA 2018. LNCS, vol. 11138, pp. 3\u201319. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01090-4_1"},{"issue":"3","key":"14_CR13","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1007\/s10703-015-0238-z","volume":"47","author":"E Goubault","year":"2015","unstructured":"Goubault, E., Putot, S.: A zonotopic framework for functional abstractions. Form. Methods Syst. Des. 47(3), 302\u2013360 (2015)","journal-title":"Form. Methods Syst. Des."},{"issue":"2","key":"14_CR14","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1109\/72.991427","volume":"13","author":"C-W Hsu","year":"2002","unstructured":"Hsu, C.-W., Lin, C.-J.: A comparison of methods for multiclass support vector machines. IEEE Trans. Neur. Netw. 13(2), 415\u2013425 (2002)","journal-title":"IEEE Trans. Neur. Netw."},{"key":"14_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-63387-9_1","volume-title":"Computer Aided Verification","author":"X Huang","year":"2017","unstructured":"Huang, X., Kwiatkowska, M., Wang, S., Wu, M.: Safety verification of deep neural networks. In: Majumdar, R., Kun\u010dak, V. (eds.) CAV 2017. LNCS, vol. 10426, pp. 3\u201329. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-63387-9_1"},{"key":"14_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-319-63387-9_5","volume-title":"Computer Aided Verification","author":"G Katz","year":"2017","unstructured":"Katz, G., Barrett, C., Dill, D.L., Julian, K., Kochenderfer, M.J.: Reluplex: an efficient SMT solver for verifying deep neural networks. In: Majumdar, R., Kun\u010dak, V. (eds.) CAV 2017. LNCS, vol. 10426, pp. 97\u2013117. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-63387-9_5"},{"key":"14_CR17","unstructured":"Kurakin, A., Goodfellow, I.J., Bengio, S.: Adversarial machine learning at scale. In: Proceedings of the 5th International Conference on Learning Representations (ICLR2017) (2017)"},{"issue":"11","key":"14_CR18","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y LeCun","year":"1998","unstructured":"LeCun, Y., Bottou, L., Bengio, Y., Haffner, P.: Gradient-based learning applied to document recognition. Proc. IEEE 86(11), 2278\u20132324 (1998)","journal-title":"Proc. IEEE"},{"key":"14_CR19","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1007\/978-3-319-49130-1_39","volume-title":"AI*IA 2016 Advances in Artificial Intelligence","author":"F Leofante","year":"2016","unstructured":"Leofante, F., Tacchella, A.: Learning in physical domains: mating safety requirements and costly sampling. In: Adorni, G., Cagnoni, S., Gori, M., Maratea, M. (eds.) AI*IA 2016. LNCS (LNAI), vol. 10037, pp. 539\u2013552. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-49130-1_39"},{"issue":"11","key":"14_CR20","first-page":"992","volume":"8","author":"F Messine","year":"2002","unstructured":"Messine, F.: Extentions of affine arithmetic: application to unconstrained global optimization. J. Univers. Comput. Sci. 8(11), 992\u20131015 (2002)","journal-title":"J. Univers. Comput. Sci."},{"key":"14_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-540-24725-8_2","volume-title":"Programming Languages and Systems","author":"A Min\u00e9","year":"2004","unstructured":"Min\u00e9, A.: Relational abstract domains for the detection of floating-point run-time errors. In: Schmidt, D. (ed.) ESOP 2004. LNCS, vol. 2986, pp. 3\u201317. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24725-8_2"},{"issue":"3\u20134","key":"14_CR22","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1561\/2500000034","volume":"4","author":"A Min\u00e9","year":"2017","unstructured":"Min\u00e9, A.: Tutorial on static inference of numeric invariants by abstract interpretation. Found. Trends Program. Lang. 4(3\u20134), 120\u2013372 (2017)","journal-title":"Found. Trends Program. Lang."},{"key":"14_CR23","unstructured":"Mirman, M., Gehr, T., Vechev, M.: Differentiable abstract interpretation for provably robust neural networks. In: Proceedings of the International Conference on Machine Learning (ICML2018), pp. 3575\u20133583 (2018)"},{"issue":"1","key":"14_CR24","doi-asserted-by":"publisher","first-page":"25","DOI":"10.3837\/tiis.2010.01.002","volume":"4","author":"GP Nam","year":"2010","unstructured":"Nam, G.P., Kang, B.J., Park, K.R.: Robustness of face recognition to variations of illumination on mobile devices based on SVM. KSII Trans. Internet Inf. Syst. 4(1), 25\u201344 (2010)","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"14_CR25","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa, F.: Scikit-learn: machine learning in Python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011)","journal-title":"J. Mach. Learn. Res."},{"key":"14_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/978-3-642-14295-6_24","volume-title":"Computer Aided Verification","author":"L Pulina","year":"2010","unstructured":"Pulina, L., Tacchella, A.: An abstraction-refinement approach to verification of artificial neural networks. In: Touili, T., Cook, B., Jackson, P. (eds.) CAV 2010. LNCS, vol. 6174, pp. 243\u2013257. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14295-6_24"},{"issue":"2","key":"14_CR27","doi-asserted-by":"crossref","first-page":"117","DOI":"10.3233\/AIC-2012-0525","volume":"25","author":"L Pulina","year":"2012","unstructured":"Pulina, L., Tacchella, A.: Challenging SMT solvers to verify neural networks. AI Commun. 25(2), 117\u2013135 (2012)","journal-title":"AI Commun."},{"key":"14_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/978-3-642-35873-9_3","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"F Ranzato","year":"2013","unstructured":"Ranzato, F.: Complete abstractions everywhere (invited paper). In: Giacobazzi, R., Berdine, J., Mastroeni, I. (eds.) VMCAI 2013. LNCS, vol. 7737, pp. 15\u201326. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-35873-9_3"},{"key":"14_CR29","doi-asserted-by":"crossref","unstructured":"Ranzato, F., Zanella, M.: Robustness verification of support vector machines. http:\/\/arxiv.org\/abs\/1904.11803 , CoRR arXiv, April 2019","DOI":"10.1007\/978-3-030-32304-2_14"},{"key":"14_CR30","unstructured":"Ranzato, F., Zanella, M.: SAVer GitHub Repository (2019). https:\/\/github.com\/svm-abstract-verifier"},{"key":"14_CR31","unstructured":"Singh, G., Gehr, T., Mirman, M., P\u00fcschel, M., Vechev, M.T.: Fast and effective robustness certification. In: Advances in Neural Information Processing Systems 31: Proceedings of the Annual Conference on Neural Information Processing Systems 2018, (NeurIPS2018), pp. 10825\u201310836 (2018)"},{"issue":"POPL","key":"14_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3290354","volume":"3","author":"Gagandeep Singh","year":"2019","unstructured":"Singh, G., Gehr, T., P\u00fcschel, M., Vechev, M.: An abstract domain for certifying neural networks. Proc. ACM Program. Lang. 3(POPL2019), 41:1\u201341:30 (2019)","journal-title":"Proceedings of the ACM on Programming Languages"},{"issue":"4","key":"14_CR33","doi-asserted-by":"publisher","first-page":"1131","DOI":"10.1007\/s11075-017-0300-6","volume":"76","author":"I Skalna","year":"2017","unstructured":"Skalna, I., Hlad\u00edk, M.: A new algorithm for Chebyshev minimum-error multiplication of reduced affine forms. Numer. Algorithms 76(4), 1131\u20131152 (2017)","journal-title":"Numer. Algorithms"},{"key":"14_CR34","unstructured":"IEEE Computer Society: IEEE standard for binary floating-point arithmetic. Institute of Electrical and Electronics Engineers, New York (1985). Note: Standard 754\u20131985"},{"key":"14_CR35","unstructured":"Stolfi, J., de Figueiredo, L.H.: Self-Validated Numerical Methods and Applications. Brazilian Mathematics Colloquium Monograph, IMPA, Rio de Janeiro, Brazil (1997)"},{"issue":"1","key":"14_CR36","first-page":"147","volume":"37","author":"J Stolfi","year":"2004","unstructured":"Stolfi, J., de Figueiredo, L.H.: Affine arithmetic: concepts and applications. Numer. Algorithms 37(1), 147\u2013158 (2004)","journal-title":"Numer. Algorithms"},{"issue":"1","key":"14_CR37","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1080\/10556780600883791","volume":"22","author":"TB Trafalis","year":"2007","unstructured":"Trafalis, T.B., Gilbert, R.C.: Robust support vector machines for classification and computational issues. Optim. Methods Softw. 22(1), 187\u2013198 (2007)","journal-title":"Optim. Methods Softw."},{"key":"14_CR38","doi-asserted-by":"crossref","unstructured":"Vorobeychik, Y., Kantarcioglu, M.: Adversarial machine learning. In: Synthesis Lectures on Artificial Intelligence and Machine Learning, vol. 12, no. 3, pp. 1\u2013169. Morgan & Claypool Publishers, August 2018","DOI":"10.2200\/S00861ED1V01Y201806AIM039"},{"key":"14_CR39","unstructured":"Wang, S., Pei, K., Whitehouse, J., Yang, J., Jana, S.: Formal security analysis of neural networks using symbolic intervals. In: Proceedings of the 27th USENIX Conference on Security Symposium, (SEC2018), pp. 1599\u20131614. USENIX Association (2018)"},{"key":"14_CR40","unstructured":"Weng, T., et al.: Towards fast computation of certified robustness for ReLU networks. In: Proceedings of the 35th International Conference on Machine Learning, (ICML2018), pp. 5273\u20135282 (2018)"},{"key":"14_CR41","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.neucom.2014.08.081","volume":"160","author":"H Xiao","year":"2015","unstructured":"Xiao, H., Biggio, B., Nelson, B., Xiao, H., Eckert, C., Roli, F.: Support vector machines under adversarial label contamination. Neurocomputing 160, 53\u201362 (2015)","journal-title":"Neurocomputing"},{"key":"14_CR42","unstructured":"Xiao, H., Rasul, K., Vollgraf, R.: Fashion-MNIST: A novel image dataset for benchmarking machine learning algorithms. CoRR arXiv, abs\/1708.07747 (2017)"},{"key":"14_CR43","first-page":"1485","volume":"10","author":"H Xu","year":"2009","unstructured":"Xu, H., Caramanis, C., Mannor, S.: Robustness and regularization of support vector machines. J. Mach. Learn. Res. 10, 1485\u20131510 (2009)","journal-title":"J. Mach. Learn. Res."},{"key":"14_CR44","doi-asserted-by":"publisher","first-page":"10077","DOI":"10.1609\/aaai.v33i01.330110077","volume":"33","author":"Micha\u0142 Zajac","year":"2019","unstructured":"Zajac, M., Zolna, K., Rostamzadeh, N., Pinheiro, P.O.: Adversarial framing for image and video classification. In: Proceedings of the 33rd AAAI Conference on Artificial Intelligence (AAAI2019) (2019)","journal-title":"Proceedings of the AAAI Conference on Artificial Intelligence"},{"key":"14_CR45","unstructured":"Zhao, Z., Dua, D., Singh, S.: Generating natural adversarial examples. In: Proceedings of the 6th International Conference on Learning Representations (ICLR2018) (2018)"},{"key":"14_CR46","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Kantarcioglu, M., Thuraisingham, B., Xi, B.: Adversarial support vector machine learning. In: Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD2012), pp. 1059\u20131067. ACM (2012)","DOI":"10.1145\/2339530.2339697"}],"container-title":["Lecture Notes in Computer Science","Static Analysis"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-32304-2_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,8]],"date-time":"2019-12-08T15:33:50Z","timestamp":1575819230000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-32304-2_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030323035","9783030323042"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-32304-2_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"2 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Static Analysis Symposium","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Porto","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sas2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/staticanalysis.org\/sas2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"50","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.44","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6.2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}