{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T02:23:19Z","timestamp":1742955799782,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031148347"},{"type":"electronic","value":"9783031148354"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-14835-4_18","type":"book-chapter","created":{"date-parts":[[2022,8,24]],"date-time":"2022-08-24T12:05:36Z","timestamp":1661342736000},"page":"269-283","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Formally Compensating Performance Limitations for\u00a0Imprecise 2D Object Detection"],"prefix":"10.1007","author":[{"given":"Tobias","family":"Schuster","sequence":"first","affiliation":[]},{"given":"Emmanouil","family":"Seferis","sequence":"additional","affiliation":[]},{"given":"Simon","family":"Burton","sequence":"additional","affiliation":[]},{"given":"Chih-Hong","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,25]]},"reference":[{"issue":"4","key":"18_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3450356","volume":"5","author":"S Abrecht","year":"2021","unstructured":"Abrecht, S., Gauerhof, L., Gladisch, C., Groh, K., Heinzemann, C., Woehrle, M.: Testing deep learning-based visual perception for automated driving. ACM Trans. Cyber-Phys. Syst. 5(4), 1\u201328 (2021)","journal-title":"ACM Trans. Cyber-Phys. Syst."},{"key":"18_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/978-3-319-66284-8_1","volume-title":"Computer Safety, Reliability, and Security","author":"S Burton","year":"2017","unstructured":"Burton, S., Gauerhof, L., Heinzemann, C.: Making the case for safety of machine learning in highly automated driving. In: Tonetta, S., Schoitsch, E., Bitsch, F. (eds.) SAFECOMP 2017. LNCS, vol. 10489, pp. 5\u201316. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66284-8_1"},{"key":"18_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/978-3-030-01090-4_8","volume-title":"Automated Technology for Verification and Analysis","author":"C-H Cheng","year":"2018","unstructured":"Cheng, C.-H., Huang, C.-H., Yasuoka, H.: Quantitative Projection Coverage for Testing ML-enabled Autonomous Systems. In: Lahiri, S.K., Wang, C. (eds.) ATVA 2018. LNCS, vol. 11138, pp. 126\u2013142. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01090-4_8"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Cheng, C.H., Schuster, T., Burton, S.: Logically sound arguments for the effectiveness of ML safety measures. arXiv preprint arXiv:2111.02649 (2021)","DOI":"10.1007\/978-3-031-14862-0_25"},{"key":"18_CR5","unstructured":"Houben, S., et al.: Inspect, understand, overcome: a survey of practical methods for AI safety. arXiv preprint arXiv:2104.14235 (2021)"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Huang, X., et al.: A survey of safety and trustworthiness of deep neural networks: Verification, testing, adversarial attack and defence, and interpretability. Comput. Sci. Rev. 37, 100270 (2020)","DOI":"10.1016\/j.cosrev.2020.100270"},{"key":"18_CR7","unstructured":"Safety of the intended functionality - SOTIF (ISO\/DIS 21448). Standard, International Organization for Standardization (2021)"},{"key":"18_CR8","unstructured":"Jia, Y., Lawton, T., McDermid, J., Rojas, E., Habli, I.: A framework for assurance of medication safety using machine learning. arXiv preprint arXiv:2101.05620 (2021)"},{"key":"18_CR9","unstructured":"Jocher, G., et al.: ultralytics\/yolov5: v4.0 - nn.SiLU() activations, weights & biases logging, PyTorch hub integration, https:\/\/zenodo.org\/record\/4418161"},{"key":"18_CR10","doi-asserted-by":"publisher","unstructured":"Koopman, P., Ferrell, U., Fratrik, F., Wagner, M.: A safety standard approach for fully autonomous vehicles. In: Romanovsky, A., Troubitsyna, E., Gashi, I., Schoitsch, E., Bitsch, F. (eds.) SAFECOMP 2019. LNCS, vol. 11699, pp. 326\u2013332. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-26250-1_26","DOI":"10.1007\/978-3-030-26250-1_26"},{"key":"18_CR11","doi-asserted-by":"publisher","unstructured":"Lin, T., et al.: Microsoft COCO: common objects in context. In: Fleet, D., Pajdla, T., Schiele, B., Tuytelaars, T. (eds.) ECCV 2014. LNCS, vol. 8693, pp. 740\u2013755. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10602-1_48","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Lyssenko, M., Gladisch, C., Heinzemann, C., Woehrle, M., Triebel, R.: From evaluation to verification: towards task-oriented relevance metrics for pedestrian detection in safety-critical domains. In: CVPR Workshop, pp. 38\u201345. IEEE (2021)","DOI":"10.1109\/CVPRW53098.2021.00013"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Pei, K., Cao, Y., Yang, J., Jana, S.: DeepXplore: automated whitebox testing of deep learning systems. In: SOSP, pp. 1\u201318. ACM (2017)","DOI":"10.1145\/3132747.3132785"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Pezzementi, Z., et al.: Putting image manipulations in context: robustness testing for safe perception. In: SSRR. pp. 1\u20138. IEEE (2018)","DOI":"10.1109\/SSRR.2018.8468619"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Salay, R., Czarnecki, K., Kuwajima, H., Yasuoka, H., Nakae, T., Abdelzad, V., Huang, C., Kahn, M., Nguyen, V.D.: The missing link: Developing a safety case for perception components in automated driving. arXiv preprint arXiv:2108.13294 (2021)","DOI":"10.4271\/2022-01-0818"},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"Schuster, T., Seferis, E., Burton, S., Cheng, C.H.: Unaligned but safe-formally compensating performance limitations for imprecise 2D object detection. arXiv preprint arXiv:2202.05123 (2022)","DOI":"10.1007\/978-3-031-14835-4_18"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Sun, Y., Huang, X., Kroening, D., Sharp, J., Hill, M., Ashmore, R.: Structural test coverage criteria for deep neural networks. In: ACM TECS, vol. 18, pp. 1\u201323 (2019)","DOI":"10.1145\/3358233"},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Volk, G., Gamerdinger, J., Bernuth, A.v., Bringmann, O.: A comprehensive safety metric to evaluate perception in autonomous systems. In: ITSC, pp. 1\u20138. IEEE (2020)","DOI":"10.1109\/ITSC45102.2020.9294708"},{"key":"18_CR19","doi-asserted-by":"publisher","unstructured":"Zhao, X., et al.: A Safety Framework for Critical Systems Utilising Deep Neural Networks. In: Casimiro, A., Ortmeier, F., Bitsch, F., Ferreira, P. (eds.) SAFECOMP 2020. LNCS, vol. 12234, pp. 244\u2013259. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-54549-9_16","DOI":"10.1007\/978-3-030-54549-9_16"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-14835-4_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T20:04:32Z","timestamp":1676491472000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-14835-4_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031148347","9783031148354"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-14835-4_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"25 August 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAFECOMP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Safety, Reliability, and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Munich","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 June 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"41","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"safecomp2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/safecomp22.iks.fraunhofer.de\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"93","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3, 2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5, 5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The review process was thorough with at least 3 reviewers with ensured independency (single blind). In April 2022 an on-line meeting took place for the final discussion and selection.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}