{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T12:58:49Z","timestamp":1778158729649,"version":"3.51.4"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030555825","type":"print"},{"value":"9783030555832","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-55583-2_29","type":"book-chapter","created":{"date-parts":[[2020,8,21]],"date-time":"2020-08-21T06:02:53Z","timestamp":1597989773000},"page":"383-394","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Structuring the Safety Argumentation for Deep Neural Network Based Perception in Automotive Applications"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2690-2478","authenticated-orcid":false,"given":"Gesina","family":"Schwalbe","sequence":"first","affiliation":[]},{"given":"Bernhard","family":"Knie","sequence":"additional","affiliation":[]},{"given":"Timo","family":"S\u00e4mann","sequence":"additional","affiliation":[]},{"given":"Timo","family":"Dobberphul","sequence":"additional","affiliation":[]},{"given":"Lydia","family":"Gauerhof","sequence":"additional","affiliation":[]},{"given":"Shervin","family":"Raafatnia","sequence":"additional","affiliation":[]},{"given":"Vittorio","family":"Rocco","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,8]]},"reference":[{"key":"29_CR1","doi-asserted-by":"crossref","unstructured":"Assion, F., et al.: The attack generator: a systematic approach towards constructing adversarial attacks. In: Proceedings of the 2019 IEEE Conference on Computer Vision and Pattern Recognition Workshops (2019)","DOI":"10.1109\/CVPRW.2019.00177"},{"key":"29_CR2","doi-asserted-by":"publisher","unstructured":"Bagschik, G., Menzel, T., Maurer, M.: Ontology based scene creation for the development of automated vehicles. In: Proceedings of the 2018 IEEE Intelligent Vehicles Symposium, pp. 1813\u20131820. IEEE (2018). https:\/\/doi.org\/10.1109\/IVS.2018.8500632","DOI":"10.1109\/IVS.2018.8500632"},{"key":"29_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1007\/978-3-030-26250-1_30","volume-title":"Computer Safety, Reliability, and Security","author":"S Burton","year":"2019","unstructured":"Burton, S., Gauerhof, L., Sethy, B.B., Habli, I., Hawkins, R.: Confidence arguments for evidence of performance in machine learning for highly automated driving functions. In: Romanovsky, A., Troubitsyna, E., Gashi, I., Schoitsch, E., Bitsch, F. (eds.) SAFECOMP 2019. LNCS, vol. 11699, pp. 365\u2013377. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-26250-1_30"},{"key":"29_CR4","doi-asserted-by":"publisher","unstructured":"Carlini, N., Wagner, D.: Adversarial examples are not easily detected: bypassing ten detection methods. In: Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, AISec 2017, pp. 3\u201314. Association for Computing Machinery (2017). https:\/\/doi.org\/10.1145\/3128572.3140444","DOI":"10.1145\/3128572.3140444"},{"key":"29_CR5","unstructured":"Cluzeau, J.M., Henriquel, X., Rebender, G., et al.: Concepts of design assurance for neural networks. Technical report, European Union Aviation Safety Agency (EASA) (2020)"},{"key":"29_CR6","doi-asserted-by":"publisher","unstructured":"Deutsches Institut f\u00fcr Normung e.V.: DIN SPEC 13266:2020-04: Guideline for the development of deep learning image recognition systems. Beuth Verlag, 2020-04 edn, April 2020. https:\/\/doi.org\/10.31030\/3134557","DOI":"10.31030\/3134557"},{"key":"29_CR7","doi-asserted-by":"crossref","unstructured":"Gauerhof, L., Gu, N.: Reverse variational autoencoder for visual attribute manipulation and anomaly detection. In: Winter Application Conference on Applications of Computer Vision (2020)","DOI":"10.1109\/WACV45572.2020.9093319"},{"key":"29_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-319-99130-6_4","volume-title":"Computer Safety, Reliability, and Security","author":"L Gauerhof","year":"2018","unstructured":"Gauerhof, L., Munk, P., Burton, S.: Structuring validation targets of a machine learning function applied to automated driving. In: Gallina, B., Skavhaug, A., Bitsch, F. (eds.) SAFECOMP 2018. LNCS, vol. 11093, pp. 45\u201358. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-99130-6_4"},{"key":"29_CR9","unstructured":"Geirhos, R., Rubisch, P., Michaelis, C., Bethge, M., Wichmann, F.A., Brendel, W.: ImageNet-trained CNNs are biased towards texture; increasing shape bias improves accuracy and robustness. In: Proceedings of the 7th International Conference on Learning Representations (2018)"},{"key":"29_CR10","unstructured":"Hailesilassie, T.: Rule extraction algorithm for deep neural networks: a review. CoRR abs\/1610.05267 (2016)"},{"key":"29_CR11","unstructured":"Henne, M., Schwaiger, A., Roscher, K., Weiss, G.: Benchmarking uncertainty estimation methods for deep learning with safety-related metrics. In: Proceedings of the Workshop on Artificial Intelligence Safety, vol. 2560, pp. 83\u201390. CEUR-WS.org (2020)"},{"key":"29_CR12","unstructured":"ISO\/IEC JTC 1\/SC 7: ISO\/IEC\/IEEE 12207:2017: Systems and Software Engineering\u2014Software Life Cycle Processes, 1 edn. (2017)"},{"key":"29_CR13","unstructured":"ISO\/TC 22\/SC 32: ISO 26262\u20131:2018(En): Road Vehicles\u2014Functional Safety\u2014Part 1: Vocabulary, ISO 26262:2018(En), vol. 1. 2 edn. (2018)"},{"key":"29_CR14","unstructured":"ISO\/TC 22\/SC 32: ISO 26262\u20134:2018(En): Road Vehicles\u2014Functional Safety\u2014Part 4: Product Development at the System Level, ISO 26262:2018(En), vol. 4. 2 edn. (2018)"},{"key":"29_CR15","unstructured":"ISO\/TC 22\/SC 32: ISO\/PAS 21448:2019(En): Road Vehicles\u2014Safety of the Intended Functionality (2019)"},{"key":"29_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-319-63387-9_5","volume-title":"Computer Aided Verification","author":"G Katz","year":"2017","unstructured":"Katz, G., Barrett, C., Dill, D.L., Julian, K., Kochenderfer, M.J.: Reluplex: an efficient SMT solver for verifying deep neural networks. In: Majumdar, R., Kun\u010dak, V. (eds.) CAV 2017. LNCS, vol. 10426, pp. 97\u2013117. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-63387-9_5"},{"key":"29_CR17","unstructured":"Kendall, A., Gal, Y.: What uncertainties do we need in Bayesian deep learning for computer vision? In: Advances in Neural Information Processing Systems, vol. 30, pp. 5580\u20135590 (2017)"},{"key":"29_CR18","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/8179.001.0001","volume-title":"Engineering a Safer World: Systems Thinking Applied to Safety. Engineering Systems","author":"N Leveson","year":"2012","unstructured":"Leveson, N.: Engineering a Safer World: Systems Thinking Applied to Safety. Engineering Systems. MIT Press, Cambridge (2012)"},{"key":"29_CR19","unstructured":"Liang, S., Li, Y., Srikant, R.: Principled detection of out-of-distribution examples in neural networks. CoRR abs\/1706.02690 (2017)"},{"key":"29_CR20","unstructured":"Lust, J., Condurache, A.: GraN: an efficient gradient-norm based detector for adversarial and misclassified examples. In: ESANN (2020). http:\/\/www.esann.org\/node\/8"},{"key":"29_CR21","doi-asserted-by":"crossref","unstructured":"Salay, R., Queiroz, R., Czarnecki, K.: An analysis of ISO 26262: using machine learning safely in automotive software. CoRR abs\/1709.02435 (2017)","DOI":"10.4271\/2018-01-1075"},{"key":"29_CR22","unstructured":"S\u00e4mann, T., Schlicht, P., H\u00fcger, F.: Strategy to increase the safety of a dnn-based perception for HAD systems. CoRR abs\/2002.08935 (2020)"},{"key":"29_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/978-3-319-99130-6_14","volume-title":"Computer Safety, Reliability, and Security","author":"C Schorn","year":"2018","unstructured":"Schorn, C., Guntoro, A., Ascheid, G.: Efficient on-line error detection and mitigation for deep neural network accelerators. In: Gallina, B., Skavhaug, A., Bitsch, F. (eds.) SAFECOMP 2018. LNCS, vol. 11093, pp. 205\u2013219. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-99130-6_14"},{"key":"29_CR24","doi-asserted-by":"crossref","unstructured":"Schwalbe, G., Schels, M.: Strategies for safety goal decomposition for neural networks. In: Abstracts 3rd ACM Computer Science in Cars Symposium (2019)","DOI":"10.20378\/irb-47274"},{"key":"29_CR25","doi-asserted-by":"crossref","unstructured":"Schwalbe, G., Schels, M.: A survey on methods for the safety assurance of machine learning based systems. In: Proceedings of the 10th European Congress on Embedded Real Time Systems (2020)","DOI":"10.20378\/irb-47275"},{"key":"29_CR26","unstructured":"SCSC Assurance Case Working Group: SCSC-141B: Goal Structuring Notation Community Standard (2018). https:\/\/scsc.uk\/scsc-141B"},{"key":"29_CR27","doi-asserted-by":"publisher","unstructured":"Sun, Y., Wu, M., Ruan, W., Huang, X., Kwiatkowska, M., Kroening, D.: Concolic testing for deep neural networks. In: Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering, pp. 109\u2013119. ACM (2018). https:\/\/doi.org\/10.1145\/3238147.3238172","DOI":"10.1145\/3238147.3238172"},{"key":"29_CR28","unstructured":"Underwriters Laboratories, Edge Case Research: UL4600: Standard for Safety of Autonomous Products. Edge Case Research (2019)"},{"key":"29_CR29","unstructured":"Voget, S., Rudolph, A., Mottok, J.: A consistent safety case argumentation for artificial intelligence in safety related automotive systems. In: Proceedings of the 9th European Congress Embedded Real Time Systems (2018)"},{"key":"29_CR30","doi-asserted-by":"crossref","unstructured":"Willers, O., Sudholt, S., Raafatnia, S., Stephanie, A.: Safety concerns and mitigation approaches regarding the use of deep learning in safety-critical perception tasks. CoRR abs\/2001.08001 (2020)","DOI":"10.1007\/978-3-030-55583-2_25"},{"key":"29_CR31","unstructured":"Wood, M., Robbel, P., Wittmann, D., et al.: Safety First for Automated Driving (2019). http:\/\/www.daimler.com\/documents\/innovation\/other\/safety-first-for-automated-driving.pdf"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-55583-2_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,6]],"date-time":"2023-10-06T03:53:27Z","timestamp":1696564407000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-55583-2_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030555825","9783030555832"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-55583-2_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"8 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAFECOMP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Safety, Reliability, and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lisbon","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"39","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"safecomp2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/safecomp2020.di.fc.ul.pt\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"116","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6.2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}