{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T06:44:38Z","timestamp":1743057878730,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030839055"},{"type":"electronic","value":"9783030839062"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-83906-2_25","type":"book-chapter","created":{"date-parts":[[2021,8,24]],"date-time":"2021-08-24T23:05:04Z","timestamp":1629846304000},"page":"297-310","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Certification Game for the Safety Analysis of AI-Based CPS"],"prefix":"10.1007","author":[{"given":"Imane","family":"Lamrani","sequence":"first","affiliation":[]},{"given":"Ayan","family":"Banerjee","sequence":"additional","affiliation":[]},{"given":"Sandeep K. S.","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,25]]},"reference":[{"key":"25_CR1","doi-asserted-by":"crossref","unstructured":"Banerjee, A., Lamrani, I., Gupta, S.K.: Faultex: explaining operational changes in terms of design variables in cps control code. In: Proceeding of the 4th IEEE International Conference on Industrial Cyber-Physical Systems (ICPS). IEEE Press (2021)","DOI":"10.1109\/ICPS49255.2021.9468161"},{"key":"25_CR2","unstructured":"Chen, R.T., Rubanova, Y., Bettencourt, J., Duvenaud, D.: Neural ordinary differential equations. arXiv preprint arXiv:1806.07366 (2018)"},{"key":"25_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1007\/978-3-319-63387-9_22","volume-title":"Computer Aided Verification","author":"C Fan","year":"2017","unstructured":"Fan, C., Qi, B., Mitra, S., Viswanathan, M.: DryVR: data-driven verification and compositional reasoning for automotive systems. In: Majumdar, R., Kun\u010dak, V. (eds.) CAV 2017. LNCS, vol. 10426, pp. 441\u2013461. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-63387-9_22"},{"key":"25_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1007\/978-3-319-41528-4_29","volume-title":"Computer Aided Verification","author":"C Fan","year":"2016","unstructured":"Fan, C., Qi, B., Mitra, S., Viswanathan, M., Duggirala, P.S.: Automatic reachability analysis for nonlinear hybrid models with C2E2. In: Chaudhuri, S., Farzan, A. (eds.) CAV 2016. LNCS, vol. 9779, pp. 531\u2013538. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-41528-4_29"},{"key":"25_CR5","unstructured":"FDA: Developing a software precertification program: a working model (2019)"},{"key":"25_CR6","unstructured":"FDA: Proposed regulatory framework for modifications to artificial intelligence\/machine learning (AI\/ML)-based software as a medical device (2019)"},{"key":"25_CR7","doi-asserted-by":"publisher","unstructured":"Henzinger, T.A.: The theory of hybrid automata. In: Inan, M.K., Kurshan, R.P. (eds.)Verification of Digital and Hybrid Systems, NATO ASI Series (Series F: Computer and Systems Sciences), pp. 265\u2013292. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/978-3-642-59615-5_13","DOI":"10.1007\/978-3-642-59615-5_13"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Henzinger, T.A., Ho, P.H., Wong-Toi, H.: Hytech: a model checker for hybrid systems. Int. J. Softw. Tools Technol. Transf. (1997)","DOI":"10.1007\/3-540-63166-6_48"},{"key":"25_CR9","unstructured":"Kanderian Jr, S.S., Steil, G.M.: Apparatus and method for controlling insulin infusion with state variable feedback, 5 October 2010. US Patent 7,806,886"},{"key":"25_CR10","unstructured":"Koopman, P.: A case study of Toyota unintended acceleration and software safety. Presentation (2014)"},{"key":"25_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/978-3-030-26250-1_26","volume-title":"Computer Safety, Reliability, and Security","author":"P Koopman","year":"2019","unstructured":"Koopman, P., Ferrell, U., Fratrik, F., Wagner, M.: A safety standard approach for fully autonomous vehicles. In: Romanovsky, A., Troubitsyna, E., Gashi, I., Schoitsch, E., Bitsch, F. (eds.) SAFECOMP 2019. LNCS, vol. 11699, pp. 326\u2013332. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-26250-1_26"},{"key":"25_CR12","unstructured":"Koopman, P., Fratrik, F.: How many operational design domains, objects, and events? SafeAI@ AAAI 4 (2019)"},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Lamrani, I., Banerjee, A., Gupta, S.K.: Hymn: mining linear hybrid automata from input output traces of cyber-physical systems. In: 2018 IEEE Industrial Cyber-Physical Systems (ICPS), pp. 264\u2013269. IEEE (2018)","DOI":"10.1109\/ICPHYS.2018.8387670"},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Lamrani, I., Banerjee, A., Gupta, S.K.: Operational data driven feedback for safety evaluation of agent-based cps. IEEE Trans. Ind. Inform. (2020)","DOI":"10.1109\/TII.2020.3009985"},{"key":"25_CR15","doi-asserted-by":"crossref","unstructured":"Medhat, R., Ramesh, S., Bonakdarpour, B., Fischmeister, S.: A framework for mining hybrid automata from input\/output traces. In: Proceedings of the 12th International Conference on Embedded Software, pp. 177\u2013186. IEEE Press (2015)","DOI":"10.1109\/EMSOFT.2015.7318273"},{"key":"25_CR16","doi-asserted-by":"crossref","unstructured":"Summerville, A., Osborn, J., Mateas, M.: Charda: causal hybrid automata recovery via dynamic analysis. arXiv preprint arXiv:1707.03336 (2017)","DOI":"10.24963\/ijcai.2017\/390"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security. SAFECOMP 2021 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-83906-2_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T17:42:59Z","timestamp":1710265379000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-83906-2_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030839055","9783030839062"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-83906-2_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"25 August 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAFECOMP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Safety, Reliability, and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"York","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"40","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"safecomp2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/safecomp2021.hosted.york.ac.uk\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"76","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"From the workshops 26 full and 4 short papers were accepted for publication.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}