{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T01:43:25Z","timestamp":1772070205682,"version":"3.50.1"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030839024","type":"print"},{"value":"9783030839031","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-83903-1_3","type":"book-chapter","created":{"date-parts":[[2021,8,24]],"date-time":"2021-08-24T23:05:04Z","timestamp":1629846304000},"page":"34-48","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Towards Certification of a Reduced Footprint ACAS-Xu System: A Hybrid ML-Based Solution"],"prefix":"10.1007","author":[{"given":"Mathieu","family":"Damour","sequence":"first","affiliation":[]},{"given":"Florence","family":"De Grancey","sequence":"additional","affiliation":[]},{"given":"Christophe","family":"Gabreau","sequence":"additional","affiliation":[]},{"given":"Adrien","family":"Gauffriau","sequence":"additional","affiliation":[]},{"given":"Jean-Brice","family":"Ginestet","sequence":"additional","affiliation":[]},{"given":"Alexandre","family":"Hervieu","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Huraux","sequence":"additional","affiliation":[]},{"given":"Claire","family":"Pagetti","sequence":"additional","affiliation":[]},{"given":"Ludovic","family":"Ponsolle","sequence":"additional","affiliation":[]},{"given":"Arthur","family":"Clavi\u00e8re","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,25]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Asaadi, E., et al.: Assured integration of machine learning-based autonomy on aviation platforms. In: 39th Digital Avionics Systems Conference (DASC 2020) (2020)","DOI":"10.1109\/DASC50938.2020.9256475"},{"key":"3_CR2","unstructured":"AVSI: Final Report AFE 87 - Machine Learning (2020)"},{"key":"3_CR3","unstructured":"Hawkins, R., Calinescu, R., Picardi, C., Paterson, C., Habli, I.: Argument patterns and processes for machine learning in safety-related systems. University of York, York, U.K. (2020)"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Clavi\u00e8re, A., Asselin, E., Garion, C., Pagetti, C.: Safety verification of neural network controlled systems. In: 7th International Workshop on Safety and Security of Intelligent Vehicles (SSIV 2021) (2021)","DOI":"10.1109\/DSN-W52860.2021.00019"},{"key":"3_CR5","unstructured":"Diederik, J.B., Kingma, P.: Adam: a method for stochastic optimization. In: 3rd International Conference for Learning Representations (2015)"},{"key":"3_CR6","unstructured":"EASA: Artificial Intelligence Roadmap: A human-centric approach to AI in aviation (2020)"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Ehlers, R.: Formal verification of piece-wise linear feed-forward neural networks. CoRR, abs\/1705.01320 (2017)","DOI":"10.1007\/978-3-319-68167-2_19"},{"key":"3_CR8","unstructured":"EUROCAE\/RTCA: DO-178C\/ED-12C - Software Considerations in Airborne Systems and Equipment Certification (2011)"},{"key":"3_CR9","unstructured":"EUROCAE WG-114\/SAE Joint Group: Certification\/approval of aeronautical systems based on AI (2021). On going standardization"},{"key":"3_CR10","unstructured":"EUROCAE WG 75.1 \/RTCA SC-147: Minimum Operational Performance Standards For Airborne Collision Avoidance System Xu (ACAS Xu) (2020)"},{"key":"3_CR11","unstructured":"Han, S., Mao, H., Dally, W.J.: Deep compression: compressing deep neural networks with pruning, trained quantization and Huffman coding (2016)"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Julian, K.D., Kochenderfer, M.J., Owen, M.P.: Deep neural network compression for aircraft collision avoidance systems. arXiv:1810.04240 (2018)","DOI":"10.2514\/1.G003724"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Julian, K.D., Lopezy, J., Brushy, J.S., Owenz, M.P., Kochenderfer, M.J.: Deep neural network compression for aircraft collision avoidance systems. In: 35th Digital Avionics Systems Conference (DASC) (2016)","DOI":"10.1109\/DASC.2016.7778091"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Katz, G., Barrett, C.W., Dill, D.L., Julian, K., Kochenderfer, M.J.: Reluplex: An efficient SMT solver for verifying deep neural networks. CoRR, abs\/1702.01135 (2017)","DOI":"10.1007\/978-3-319-63387-9_5"},{"key":"3_CR15","unstructured":"Kelly, T., Weaver, R.: The goal structuring notation \/- a safety argument notation. In: Workshop on Assurance Cases (2004)"},{"key":"3_CR16","first-page":"17","volume":"19","author":"M Kochenderfer","year":"2012","unstructured":"Kochenderfer, M., Holland, J., Chryssanthacopoulos, J.: Next generation airborne collision avoidance system. Lincoln Lab. J. 19, 17\u201333 (2012)","journal-title":"Lincoln Lab. J."},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"LeCun, Y., Bottou, L., Orr, G., M\u00fcller, K.: Efficient backprop. In: Neural Networks: Tricks of the Trade, chap. 2, p. 546 (1998)","DOI":"10.1007\/3-540-49430-8_2"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Leoni, A., Marinkovi\u0107, Z., Pantoli, L.: On the introduction of neural network-based optimization algorithm in an automated calibration system. In: 14th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS), pp. 323\u2013326 (2019)","DOI":"10.1109\/TELSIKS46999.2019.9002264"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Manfredi, G., Jestin, Y.: An introduction to ACAS Xu and the challenges ahead. In: 35th Digital Avionics Systems Conference (DASC 2016), pp. 1\u20139 (2016)","DOI":"10.1109\/DASC.2016.7778055"},{"key":"3_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-030-55583-2_6","volume-title":"Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops","author":"R Kaur","year":"2020","unstructured":"Kaur, R., Ivanov, R., Cleaveland, M., Sokolsky, O., Lee, I.: Assurance case patterns for cyber-physical systems with deep neural networks. In: Casimiro, A., Ortmeier, F., Schoitsch, E., Bitsch, F., Ferreira, P. (eds.) SAFECOMP 2020. LNCS, vol. 12235, pp. 82\u201397. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-55583-2_6"},{"key":"3_CR21","unstructured":"Ren, L., et al.: Integration and flight test of small UAS detect and avoid on a miniaturized avionics platform (2019)"},{"key":"3_CR22","unstructured":"RESSAC: Recommendations for the use of assurance cases for demonstrating and assessing overarching properties. Technical report, LIV-S026-D4-199 (2019)"},{"key":"3_CR23","unstructured":"RTCA, Inc.: DO-254 - Design Assurance Guidance For Airborne Electronic Hardware (2005)"},{"key":"3_CR24","unstructured":"Rushby, J.: The interpretation and evaluation of assurance cases. Technical report (2015). Technical Report SRI-CSL-15-01"},{"key":"3_CR25","unstructured":"E. SAE: Aerospace Recommended Practices ARP4754a\/ed-79a- development of civil aircraft and systems (2010)"},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Schwalbe, G., et al.: Safety argumentation for deep neural network based perception in automotive applications. In: SAFECOMP 2020 Workshops (2020)","DOI":"10.1007\/978-3-030-55583-2_29"},{"key":"3_CR27","doi-asserted-by":"publisher","first-page":"03","DOI":"10.1515\/amcs-2015-0002","volume":"25","author":"C Seren","year":"2015","unstructured":"Seren, C., Ezerzere, P., Hardier, G.: Model-based techniques for virtual sensing of longitudinal flight parameters. Int. J. Appl. Math. Comput. Sci. 25, 03 (2015)","journal-title":"Int. J. Appl. Math. Comput. Sci."},{"key":"3_CR28","doi-asserted-by":"crossref","unstructured":"Singh, G., Gehr, T., P\u00fcschel, M., Vechev, M.: An abstract domain for certifying neural networks. Proc. ACM Program. Lang. 3(POPL) (2019)","DOI":"10.1145\/3290354"},{"key":"3_CR29","unstructured":"Toulmin, S.E.: The Uses of Argument. Cambridge University Press, Cambridge (2003). Updated Edition, first published in 1958"},{"key":"3_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1007\/978-3-030-55583-2_28","volume-title":"Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops","author":"E Wozniak","year":"2020","unstructured":"Wozniak, E., C\u00e2rlan, C., Acar-Celik, E., Putzer, H.J.: a safety case pattern for systems with machine learning components. In: Casimiro, A., Ortmeier, F., Schoitsch, E., Bitsch, F., Ferreira, P. (eds.) SAFECOMP 2020. LNCS, vol. 12235, pp. 370\u2013382. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-55583-2_28"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-83903-1_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T17:47:30Z","timestamp":1710352050000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-83903-1_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030839024","9783030839031"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-83903-1_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"25 August 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAFECOMP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Safety, Reliability, and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"York","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"40","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"safecomp2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/safecomp2021.hosted.york.ac.uk\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"76","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"From the workshops 26 full and 4 short papers were accepted for publication.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}