{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T22:36:08Z","timestamp":1778193368953,"version":"3.51.4"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031150074","type":"print"},{"value":"9783031150081","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-15008-1_3","type":"book-chapter","created":{"date-parts":[[2022,9,4]],"date-time":"2022-09-04T23:02:47Z","timestamp":1662332567000},"page":"15-31","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Formal Monotony Analysis of\u00a0Neural Networks with\u00a0Mixed Inputs: An Asset for\u00a0Certification"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4367-457X","authenticated-orcid":false,"given":"Guillaume","family":"Vidot","sequence":"first","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8440-8764","authenticated-orcid":false,"given":"M\u00e9lanie","family":"Ducoffe","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Christophe","family":"Gabreau","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Ileana","family":"Ober","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9057-1883","authenticated-orcid":false,"given":"Iulian","family":"Ober","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,9,5]]},"reference":[{"key":"3_CR1","unstructured":"Biannic, J., Hardier, G., Roos, C., Seren, C., Verdier, L.: Surrogate models for aircraft flight control: some off-line and embedded applications. Aerospace Lab (12), 1 (2016)"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D.A.: Towards evaluating the robustness of neural networks. In: IEEE SP, pp. 39\u201357. IEEE Computer Society (2017)","DOI":"10.1109\/SP.2017.49"},{"key":"3_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/978-3-319-68167-2_18","volume-title":"Automated Technology for Verification and Analysis","author":"C-H Cheng","year":"2017","unstructured":"Cheng, C.-H., N\u00fchrenberg, G., Ruess, H.: Maximum resilience of artificial neural networks. In: D\u2019Souza, D., Narayan Kumar, K. (eds.) ATVA 2017. LNCS, vol. 10482, pp. 251\u2013268. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-68167-2_18"},{"key":"3_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-030-83903-1_3","volume-title":"Computer Safety, Reliability, and Security","author":"M Damour","year":"2021","unstructured":"Damour, M., et al.: Towards certification of a reduced footprint ACAS-Xu system: a hybrid ML-based solution. In: Habli, I., Sujan, M., Bitsch, F. (eds.) SAFECOMP 2021. LNCS, vol. 12852, pp. 34\u201348. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-83903-1_3"},{"key":"3_CR5","unstructured":"EASA: Concept paper first usable guidance for level 1 machine learning applications (2021). https:\/\/www.easa.europa.eu\/downloads\/134357\/en"},{"key":"3_CR6","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/3-540-45372-5_42","volume-title":"Principles of Data Mining and Knowledge Discovery","author":"AJ Feelders","year":"2000","unstructured":"Feelders, A.J.: Prior knowledge in economic applications of data mining. In: Zighed, D.A., Komorowski, J., \u017bytkow, J. (eds.) PKDD 2000. LNCS (LNAI), vol. 1910, pp. 395\u2013400. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-45372-5_42"},{"key":"3_CR7","unstructured":"Gauffriau, A., Malgouyres, F., Ducoffe, M.: Overestimation learning with guarantees. arXiv preprint arXiv:2101.11717 (2021)"},{"issue":"3","key":"3_CR8","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1023\/A:1021039126272","volume":"3","author":"IE Grossmann","year":"2002","unstructured":"Grossmann, I.E.: Review of nonlinear mixed-integer and disjunctive programming techniques. Optim. Eng. 3(3), 227\u2013252 (2002)","journal-title":"Optim. Eng."},{"key":"3_CR9","unstructured":"Gupta, A., Shukla, N., Marla, L., Kolbeinsson, A., Yellepeddi, K.: How to incorporate monotonicity in deep networks while preserving flexibility? arXiv preprint arXiv:1909.10662 (2019)"},{"key":"3_CR10","unstructured":"Gurobi Optimization, LLC: Gurobi Optimizer Reference Manual (2022). https:\/\/www.gurobi.com"},{"key":"3_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.aei.2021.101342","volume":"49","author":"J Hao","year":"2021","unstructured":"Hao, J., Ye, W., Jia, L., Wang, G., Allen, J.: Building surrogate models for engineering problems by integrating limited simulation data and monotonic engineering knowledge. Adv. Eng. Inform. 49, 101342 (2021)","journal-title":"Adv. Eng. Inform."},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Jian, Z.D., Chang, H.J., Hsu, T.S., Wang, D.W.: Learning from simulated world - surrogates construction with deep neural network. In: SIMULTECH 2017: Proceedings of the 7th International Conference on Simulation and Modeling Methodologies, Technologies and Applications. SCITEPRESS (2017)","DOI":"10.5220\/0006418100830092"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Karpf, J.: Inductive modelling in law: example based expert systems in administrative law. In: Proceedings of the 3rd International Conference on Artificial Intelligence and Law, pp. 297\u2013306 (1991)","DOI":"10.1145\/112646.112684"},{"key":"3_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/978-3-030-25540-4_26","volume-title":"Computer Aided Verification","author":"G Katz","year":"2019","unstructured":"Katz, G., et al.: The marabou framework for verification and analysis of deep neural networks. In: Dillig, I., Tasiran, S. (eds.) CAV 2019. LNCS, vol. 11561, pp. 443\u2013452. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-25540-4_26"},{"key":"3_CR15","first-page":"15427","volume":"33","author":"X Liu","year":"2020","unstructured":"Liu, X., Han, X., Zhang, N., Liu, Q.: Certified monotonic neural networks. Adv. Neural. Inf. Process. Syst. 33, 15427\u201315438 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"3_CR16","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. In: ICLR. OpenReview.net (2018)"},{"key":"3_CR17","unstructured":"Mamalet, F., et al.: White paper machine learning in certified systems. IRT Saint Exup\u00e9ry - ANITI (2021)"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"M\u00fcller, M.N., Makarchuk, G., Singh, G., P\u00fcschel, M., Vechev, M.: PRIMA: general and precise neural network certification via scalable convex hull approximations. Proc. ACM Program. Lang. 6(POPL), 1\u201333 (2022)","DOI":"10.1145\/3498704"},{"key":"3_CR19","unstructured":"Nguyen, A.P., Mart\u00ednez, M.R.: Mononet: towards interpretable models by learning monotonic features. arXiv preprint arXiv:1909.13611 (2019)"},{"key":"3_CR20","unstructured":"Peterson, E., DeVore, M., Cooper, J., Carr, G.: Run time assurance as an alternate concept to contemporary development assurance processes. NASA\/CR-2020-220586 (2020)"},{"key":"3_CR21","unstructured":"Raghunathan, A., Steinhardt, J., Liang, P.S.: Semidefinite relaxations for certifying robustness to adversarial examples. In: Advances in Neural Information Processing Systems, pp. 10877\u201310887 (2018)"},{"key":"3_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/978-3-030-22808-8_24","volume-title":"Advances in Neural Networks \u2013 ISNN 2019","author":"O Sudakov","year":"2019","unstructured":"Sudakov, O., Koroteev, D., Belozerov, B., Burnaev, E.: Artificial neural network surrogate modeling of oil reservoir: a case study. In: Lu, H., Tang, H., Wang, Z. (eds.) ISNN 2019. LNCS, vol. 11555, pp. 232\u2013241. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-22808-8_24"},{"key":"3_CR23","unstructured":"Tjeng, V., Xiao, K.Y., Tedrake, R.: Evaluating robustness of neural networks with mixed integer programming. In: ICLR (2019)"},{"key":"3_CR24","unstructured":"Tsuzuku, Y., Sato, I., Sugiyama, M.: Lipschitz-margin training: scalable certification of perturbation invariance for deep neural networks. In: NeurIPS, pp. 6542\u20136551 (2018)"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Urban, C., Christakis, M., W\u00fcstholz, V., Zhang, F.: Perfectly parallel fairness certification of neural networks. Proc. ACM Program. Lang. 4(OOPSLA), 1\u201330 (2020)","DOI":"10.1145\/3428253"},{"key":"3_CR26","unstructured":"Urban, C., Min\u00e9, A.: A review of formal methods applied to machine learning. arXiv preprint arXiv:2104.02466 (2021)"},{"key":"3_CR27","unstructured":"Wang, S., Pei, K., Whitehouse, J., Yang, J., Jana, S.: Formal security analysis of neural networks using symbolic intervals. In: 27th USENIX Security Symposium (USENIX Security 2018), Baltimore, MD, pp. 1599\u20131614. USENIX Association, August 2018"},{"key":"3_CR28","unstructured":"Wang, S., et al.: Beta-CROWN: efficient bound propagation with per-neuron split constraints for neural network robustness verification. In: Advances in Neural Information Processing Systems (2021)"},{"key":"3_CR29","unstructured":"Weng, T.W., et al.: Towards fast computation of certified robustness for ReLU networks. arXiv preprint arXiv:1804.09699 (2018)"},{"issue":"11","key":"3_CR30","doi-asserted-by":"publisher","first-page":"5777","DOI":"10.1109\/TNNLS.2018.2808470","volume":"29","author":"W Xiang","year":"2018","unstructured":"Xiang, W., Tran, H.D., Johnson, T.T.: Output reachable set estimation and verification for multilayer neural networks. IEEE Trans. Neural Netw. Learn. Syst. 29(11), 5777\u20135783 (2018)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"3_CR31","unstructured":"Xu, K., et al.: Automatic perturbation analysis for scalable certified robustness and beyond. In: NeurIPS (2020)"},{"key":"3_CR32","unstructured":"Zhang, H., Weng, T.W., Chen, P.Y., Hsieh, C.J., Daniel, L.: Efficient neural network robustness certification with general activation functions. In: Advances in Neural Information Processing Systems, pp. 4939\u20134948 (2018)"},{"key":"3_CR33","doi-asserted-by":"crossref","unstructured":"Zhang, H., Zhang, P., Hsieh, C.J.: Recurjac: an efficient recursive algorithm for bounding jacobian matrix of neural networks and its applications. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 33, pp. 5757\u20135764 (2019)","DOI":"10.1609\/aaai.v33i01.33015757"}],"container-title":["Lecture Notes in Computer Science","Formal Methods for Industrial Critical Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-15008-1_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,4]],"date-time":"2022-09-04T23:08:42Z","timestamp":1662332922000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-15008-1_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031150074","9783031150081"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-15008-1_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"5 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FMICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Formal Methods for Industrial Critical Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Warsaw","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fmics2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fmics2022.fsa.win.tue.nl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"59% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}