{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:14:19Z","timestamp":1771697659474,"version":"3.50.1"},"publisher-location":"Cham","reference-count":69,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031223075","type":"print"},{"value":"9783031223082","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-22308-2_20","type":"book-chapter","created":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T19:55:03Z","timestamp":1669924503000},"page":"449-473","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["CLEVEREST: Accelerating CEGAR-based Neural Network Verification via\u00a0Adversarial Attacks"],"prefix":"10.1007","author":[{"given":"Zhe","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Yedi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Guangke","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Fu","family":"Song","sequence":"additional","affiliation":[]},{"given":"Taolue","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jiaxiang","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,2]]},"reference":[{"key":"20_CR1","unstructured":"Apollo: an open, reliable and secure software platform for autonomous driving systems. http:\/\/apollo.auto (2018)"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Ashok, P., Hashemi, V., Kret\u00ednsk\u00fd, J., Mohr, S.: Deepabstract: neural network abstraction for accelerating verification. In: Proceedings of the 18th International Symposium on Automated Technology for Verification and Analysis, pp. 92\u2013107 (2020)","DOI":"10.1007\/978-3-030-59152-6_5"},{"key":"20_CR3","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1109\/TSE.2010.49","volume":"36","author":"NE Beckman","year":"2010","unstructured":"Beckman, N.E., Nori, A.V., Rajamani, S.K., Simmons, R.J., Tetali, S.D., Thakur, A.V.: Proofs from tests. IEEE Trans. Softw. Eng. 36, 495\u2013508 (2010)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"5","key":"20_CR4","doi-asserted-by":"publisher","first-page":"3200","DOI":"10.1109\/TDSC.2021.3088661","volume":"19","author":"L Bu","year":"2022","unstructured":"Bu, L., Zhao, Z., Duan, Y., Song, F.: Taking care of the discretization problem: a comprehensive study of the discretization problem and a black-box adversarial attack in discrete integer domain. IEEE Trans. Dependable Secur. Comput. 19(5), 3200\u20133217 (2022)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"20_CR5","first-page":"1","volume":"21","author":"R Bunel","year":"2020","unstructured":"Bunel, R., Lu, J., Turkaslan, I., Torr, P.H.S., Kohli, P., Kumar, M.P.: Branch and bound for piecewise linear neural network verification. J. Mach. Learn. Res. 21, 1\u201339 (2020)","journal-title":"J. Mach. Learn. Res."},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D.A.: Towards evaluating the robustness of neural networks. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 39\u201357 (2017)","DOI":"10.1109\/SP.2017.49"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Chen, G., et al.: Who is real Bob? adversarial attacks on speaker recognition systems. In: Proceedings of the 42nd IEEE Symposium on Security and Privacy, pp. 694\u2013711 (2021)","DOI":"10.1109\/SP40001.2021.00004"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Chen, G., Zhao, Z., Song, F., Chen, S., Fan, L., Liu, Y.: AS2T: Arbitrary source-to-target adversarial attack on speaker recognition systems. IEEE Trans. Dependable Secur. Comput., 1\u201317 (2022)","DOI":"10.1109\/TDSC.2022.3189397"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Chen, P., Zhang, H., Sharma, Y., Yi, J., Hsieh, C.: ZOO: zeroth order optimization based black-box attacks to deep neural networks without training substitute models. In: Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security. pp. 15\u201326 (2017)","DOI":"10.1145\/3128572.3140448"},{"issue":"5","key":"20_CR10","doi-asserted-by":"publisher","first-page":"752","DOI":"10.1145\/876638.876643","volume":"50","author":"EM Clarke","year":"2003","unstructured":"Clarke, E.M., Grumberg, O., Jha, S., Lu, Y., Veith, H.: Counterexample-guided abstraction refinement for symbolic model checking. J. ACM 50(5), 752\u2013794 (2003)","journal-title":"J. ACM"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Czech, M., Jakobs, M.C., Wehrheim, H.: Just test what you cannot verify. In: Proceedings of the 18th International Conference on Fundamental Approaches to Software Engineering, pp. 100\u2013114 (2015)","DOI":"10.1007\/978-3-662-46675-9_7"},{"key":"20_CR12","unstructured":"Dimitrov, D.I., Singh, G., Gehr, T., Vechev, M.: Provably robust adversarial examples. In: Proceedings of the International Conference on Learning Representations (2021)"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Dong, Y., et al.: An empirical study on correlation between coverage and robustness for deep neural networks. In: Proceedings of the 25th International Conference on Engineering of Complex Computer Systems, pp. 73\u201382 (2020)","DOI":"10.1109\/ICECCS51672.2020.00016"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Dutta, S., Jha, S., Sankaranarayanan, S., Tiwari, A.: Output range analysis for deep feedforward neural networks. In: Proceedings of the 10th International Symposium NASA Formal Methods, pp. 121\u2013138 (2018)","DOI":"10.1007\/978-3-319-77935-5_9"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Ehlers, R.: Formal verification of piece-wise linear feed-forward neural networks. In: Proceedings of the 15th International Symposium on Automated Technology for Verification and Analysis, pp. 269\u2013286 (2017)","DOI":"10.1007\/978-3-319-68167-2_19"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Elboher, Y.Y., Gottschlich, J., Katz, G.: An abstraction-based framework for neural network verification. In: Proceedings of the 32nd International Conference on Computer Aided Verification (2020)","DOI":"10.1007\/978-3-030-53288-8_3"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Fischer, M., Sprecher, C., Dimitrov, D.I., Singh, G., Vechev, M.T.: Shared certificates for neural network verification. In: Proceedings of the 34th International Conference on Computer Aided Verification, pp. 127\u2013148 (2022)","DOI":"10.1007\/978-3-031-13185-1_7"},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"Gehr, T., Mirman, M., Drachsler-Cohen, D., Tsankov, P., Chaudhuri, S., Vechev, M.T.: AI2: safety and robustness certification of neural networks with abstract interpretation. In: Proceedings of the 2018 IEEE Symposium on Security and Privacy, pp. 3\u201318 (2018)","DOI":"10.1109\/SP.2018.00058"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Gokulanathan, S., Feldsher, A., Malca, A., Barrett, C.W., Katz, G.: Simplifying neural networks using formal verification. In: Proceedings of the 12th International Symposium NASA Formal Methods, pp. 85\u201393 (2020)","DOI":"10.1007\/978-3-030-55754-6_5"},{"key":"20_CR20","unstructured":"Goodfellow, I., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. In: Proceedings of the 3th International Conference on Learning Representations (2015)"},{"key":"20_CR21","doi-asserted-by":"crossref","unstructured":"Goubault, E., Palumby, S., Putot, S., Rustenholz, L., Sankaranarayanan, S.: Static analysis of ReLU neural networks with tropical polyhedra. In: Proceedings of the 28th International Symposium Static Analysis, pp. 166\u2013190 (2021)","DOI":"10.1007\/978-3-030-88806-0_8"},{"key":"20_CR22","doi-asserted-by":"crossref","unstructured":"Gulavani, B.S., Henzinger, T.A., Kannan, Y., Nori, A.V., Rajamani, S.K.: SYNERGY: a new algorithm for property checking. In: Proceedings of the 14th ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 117\u2013127 (2006)","DOI":"10.1145\/1181775.1181790"},{"key":"20_CR23","doi-asserted-by":"crossref","unstructured":"Guo, X., Wan, W., Zhang, Z., Zhang, M., Song, F., Wen, X.: Eager falsification for accelerating robustness verification of deep neural networks. In: Proceedings of the 32nd IEEE International Symposium on Software Reliability Engineering, pp. 345\u2013356 (2021)","DOI":"10.1109\/ISSRE52982.2021.00044"},{"key":"20_CR24","doi-asserted-by":"crossref","unstructured":"Huang, X., Kwiatkowska, M., Wang, S., Wu, M.: Safety verification of deep neural networks. In: Proceedings of the 29th International Conference on Computer Aided Verification, pp. 3\u201329 (2017)","DOI":"10.1007\/978-3-319-63387-9_1"},{"key":"20_CR25","doi-asserted-by":"crossref","unstructured":"Jalote, P., Vangala, V., Singh, T., Jain, P.: Program partitioning: a framework for combining static and dynamic analysis. In: Proceedings of the International Workshop on Dynamic Analysis (2006)","DOI":"10.1145\/1138912.1138916"},{"key":"20_CR26","doi-asserted-by":"crossref","unstructured":"Jia, K., Rinard, M.C.: Verifying low-dimensional input neural networks via input quantization. In: Proceedings of the 28th International Symposium Static Analysis, pp. 206\u2013214 (2021)","DOI":"10.1007\/978-3-030-88806-0_10"},{"key":"20_CR27","doi-asserted-by":"crossref","unstructured":"Julian, K.D., Lopez, J., Brush, J.S., Owen, M.P., Kochenderfer, M.J.: Policy compression for aircraft collision avoidance systems. In: IEEE\/AIAA Digital Avionics Systems Conference (2016)","DOI":"10.1109\/DASC.2016.7778091"},{"key":"20_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-319-63387-9_5","volume-title":"Computer Aided Verification","author":"G Katz","year":"2017","unstructured":"Katz, G., Barrett, C., Dill, D.L., Julian, K., Kochenderfer, M.J.: Reluplex: an efficient smt solver for verifying deep neural networks. In: Majumdar, R., Kun\u010dak, V. (eds.) CAV 2017. LNCS, vol. 10426, pp. 97\u2013117. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-63387-9_5"},{"key":"20_CR29","doi-asserted-by":"crossref","unstructured":"Katz, G., et al.: The marabou framework for verification and analysis of deep neural networks. In: Proceedings of the International Conference on Computer Aided Verification, pp. 443\u2013452 (2019)","DOI":"10.1007\/978-3-030-25540-4_26"},{"key":"20_CR30","doi-asserted-by":"crossref","unstructured":"Kim, J., Feldt, R., Yoo, S.: Guiding deep learning system testing using surprise adequacy. In: Proceedings of the IEEE\/ACM 41st International Conference on Software Engineering, pp. 1039\u20131049 (2019)","DOI":"10.1109\/ICSE.2019.00108"},{"issue":"6","key":"20_CR31","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/3065386","volume":"60","author":"A Krizhevsky","year":"2017","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. Commun. ACM 60(6), 84\u201390 (2017)","journal-title":"Commun. ACM"},{"key":"20_CR32","doi-asserted-by":"crossref","unstructured":"Kurakin, A., Goodfellow, I., Bengio, S.: Adversarial examples in the physical world. In: Proceedings of International Conference on Learning Representations (2017)","DOI":"10.1201\/9781351251389-8"},{"key":"20_CR33","doi-asserted-by":"crossref","unstructured":"Li, J., Liu, J., Yang, P., Chen, L., Huang, X., Zhang, L.: Analyzing deep neural networks with symbolic propagation: Towards higher precision and faster verification. In: Proceedings of the 26th International Symposium Static Analysis, pp. 296\u2013319 (2019)","DOI":"10.1007\/978-3-030-32304-2_15"},{"key":"20_CR34","doi-asserted-by":"crossref","unstructured":"Lin, W., Yang, Z., Chen, X., Zhao, Q., Li, X., Liu, Z., He, J.: Robustness verification of classification deep neural networks via linear programming. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 11418\u201311427 (2019)","DOI":"10.1109\/CVPR.2019.01168"},{"issue":"6","key":"20_CR35","doi-asserted-by":"publisher","first-page":"1365","DOI":"10.1007\/s11390-020-0546-7","volume":"35","author":"W Liu","year":"2020","unstructured":"Liu, W., Song, F., Zhang, T., Wang, J.: Verifying ReLU neural networks from a model checking perspective. J. Comput. Sci. Technol. 35(6), 1365\u20131381 (2020)","journal-title":"J. Comput. Sci. Technol."},{"key":"20_CR36","doi-asserted-by":"crossref","unstructured":"Ma, L., et al.: DeepGauge: multi-granularity testing criteria for deep learning systems. In: Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering, pp. 120\u2013131 (2018)","DOI":"10.1145\/3238147.3238202"},{"key":"20_CR37","doi-asserted-by":"crossref","unstructured":"Ma, L., et al.: DeepMutation: mutation testing of deep learning systems. In: Proceedings of the 29th IEEE International Symposium on Software Reliability Engineering, pp. 100\u2013111 (2018)","DOI":"10.1109\/ISSRE.2018.00021"},{"key":"20_CR38","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. In: Proceedings of the International Conference on Learning Representations (2018)"},{"key":"20_CR39","doi-asserted-by":"crossref","unstructured":"Mangal, R., Sarangmath, K., Nori, A.V., Orso, A.: Probabilistic Lipschitz analysis of neural networks. In: Proceedings of the 27th International Symposium Static Analysis, pp. 274\u2013309 (2020)","DOI":"10.1007\/978-3-030-65474-0_13"},{"key":"20_CR40","doi-asserted-by":"crossref","unstructured":"Mazzucato, D., Urban, C.: Reduced products of abstract domains for fairness certification of neural networks. In: Proceedings of the 28th International Symposium Static Analysis, pp. 308\u2013322 (2021)","DOI":"10.1007\/978-3-030-88806-0_15"},{"key":"20_CR41","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli, S., Fawzi, A., Frossard, P.: DeepFool: a simple and accurate method to fool deep neural networks. In: Proceedings of 2016 IEEE Conference on Computer Vision and Pattern Recognition, pp. 2574\u20132582 (2016)","DOI":"10.1109\/CVPR.2016.282"},{"key":"20_CR42","doi-asserted-by":"crossref","unstructured":"M\u00fcller, M.N., Makarchuk, G., Singh, G., P\u00fcschel, M., Vechev, M.T.: PRIMA: general and precise neural network certification via scalable convex hull approximations. Proc. ACM Program. Lang. 6(POPL), 1\u201333 (2022)","DOI":"10.1145\/3498704"},{"key":"20_CR43","doi-asserted-by":"crossref","unstructured":"Naik, M., Yang, H., Castelnuovo, G., Sagiv, M.: Abstractions from tests. In: Proceedings of the 39th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 373\u2013386 (2012)","DOI":"10.1145\/2103621.2103701"},{"key":"20_CR44","doi-asserted-by":"crossref","unstructured":"Ostrovsky, M., Barrett, C.W., Katz, G.: An abstraction-refinement approach to verifying convolutional neural networks. CoRR abs\/2201.01978 (2022)","DOI":"10.1007\/978-3-031-19992-9_25"},{"key":"20_CR45","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P.D., Jha, S., Fredrikson, M., Celik, Z.B., Swami, A.: The limitations of deep learning in adversarial settings. In: Proceedings of IEEE European Symposium on Security and Privacy, pp. 372\u2013387 (2016)","DOI":"10.1109\/EuroSP.2016.36"},{"key":"20_CR46","doi-asserted-by":"crossref","unstructured":"Pei, K., Cao, Y., Yang, J., Jana, S.: Deepxplore: automated whitebox testing of deep learning systems. In: Proceedings of the 26th Symposium on Operating Systems Principles, pp. 1\u201318 (2017)","DOI":"10.1145\/3132747.3132785"},{"key":"20_CR47","unstructured":"Prabhakar, P., Afzal, Z.R.: Abstraction based output range analysis for neural networks. In: Proceedings of the Annual Conference on Neural Information Processing Systems (2019)"},{"key":"20_CR48","doi-asserted-by":"crossref","unstructured":"Pulina, L., Tacchella, A.: An abstraction-refinement approach to verification of artificial neural networks. In: Proceedings of the 22nd International Conference on Computer Aided Verification (2010)","DOI":"10.1007\/978-3-642-14295-6_24"},{"key":"20_CR49","unstructured":"Singh, G., Gehr, T., Mirman, M., P\u00fcschel, M., Vechev, M.T.: Fast and effective robustness certification. In: Proceedings of the Annual Conference on Neural Information Processing Systems, pp. 10825\u201310836 (2018)"},{"key":"20_CR50","doi-asserted-by":"crossref","unstructured":"Singh, G., Gehr, T., P\u00fcschel, M., Vechev, M.T.: An abstract domain for certifying neural networks. Proc. ACM Program. Lang. 3(POPL), 41:1\u201341:30 (2019)","DOI":"10.1145\/3290354"},{"issue":"9","key":"20_CR51","doi-asserted-by":"publisher","first-page":"5210","DOI":"10.1002\/int.22510","volume":"36","author":"F Song","year":"2021","unstructured":"Song, F., Lei, Y., Chen, S., Fan, L., Liu, Y.: Advanced evasion attacks and mitigations on practical ml-based phishing website classifiers. Int. J. Intell. Syst. 36(9), 5210\u20135240 (2021)","journal-title":"Int. J. Intell. Syst."},{"key":"20_CR52","doi-asserted-by":"crossref","unstructured":"Sotoudeh, M., Thakur, A.V.: Abstract neural networks. In: Proceedings of the 27th International Symposium Static Analysis, pp. 65\u201388 (2020)","DOI":"10.1007\/978-3-030-65474-0_4"},{"key":"20_CR53","doi-asserted-by":"crossref","unstructured":"Sun, Y., Wu, M., Ruan, W., Huang, X., Kwiatkowska, M., Kroening, D.: Concolic testing for deep neural networks. In: Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineerin, pp. 109\u2013119 (2018)","DOI":"10.1145\/3238147.3238172"},{"key":"20_CR54","unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks. In: Proceedings of the 2nd International Conference on Learning Representations (2014)"},{"key":"20_CR55","unstructured":"Tjeng, V., Xiao, K., Tedrake, R.: Evaluating robustness of neural networks with mixed integer programming. In: Proceedings of the 7th International Conference on Learning Representations (2019)"},{"key":"20_CR56","doi-asserted-by":"crossref","unstructured":"Tran, H., et al.: Star-based reachability analysis of deep neural networks. In: Proceedings of the 3rd World Congress on Formal Methods, pp. 670\u2013686 (2019)","DOI":"10.1007\/978-3-030-30942-8_39"},{"key":"20_CR57","doi-asserted-by":"crossref","unstructured":"Urban, C., Christakis, M., W\u00fcstholz, V., Zhang, F.: Perfectly parallel fairness certification of neural networks. Proc. ACM Program. Lang. 4(OOPSLA), 185:1\u2013185:30 (2020)","DOI":"10.1145\/3428253"},{"key":"20_CR58","unstructured":"VNN-COMP: 2nd international verification of neural networks competition. https:\/\/sites.google.com\/view\/vnn2021 (2021)"},{"key":"20_CR59","unstructured":"Wang, S., Pei, K., Whitehouse, J., Yang, J., Jana, S.: Efficient formal safety analysis of neural networks. In: Proceedings of Annual Conference on Neural Information Processing Systems (2018)"},{"key":"20_CR60","unstructured":"Wang, S., Pei, K., Whitehouse, J., Yang, J., Jana, S.: Formal security analysis of neural networks using symbolic intervals. In: Proceedings of the 27th USENIX Security Symposium on Security, pp. 1599\u20131614 (2018)"},{"key":"20_CR61","unstructured":"Wong, E., Kolter, J.Z.: Provable defenses against adversarial examples via the convex outer adversarial polytope. In: Proceedings of the 35th International Conference on Machine Learning, pp. 5283\u20135292 (2018)"},{"issue":"3","key":"20_CR62","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/s00165-021-00548-1","volume":"33","author":"P Yang","year":"2021","unstructured":"Yang, P., Li, J., Liu, J., Huang, C., Li, R., Chen, L., Huang, X., Zhang, L.: Enhancing robustness verification for deep neural networks via symbolic propagation. Formal Aspects Comput. 33(3), 407\u2013435 (2021)","journal-title":"Formal Aspects Comput."},{"key":"20_CR63","doi-asserted-by":"crossref","unstructured":"Yang, P., et al.: Improving neural network verification through spurious region guided refinement. In: Proceedings of 27th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, pp. 389\u2013408 (2021)","DOI":"10.26226\/morressier.604907f41a80aac83ca25cfb"},{"key":"20_CR64","doi-asserted-by":"crossref","unstructured":"Yorsh, G., Ball, T., Sagiv, M.: Testing, abstraction, theorem proving: better together! In: Proceedings of the International Symposium on Software Testing and Analysis, pp. 145\u2013156 (2006)","DOI":"10.1145\/1146238.1146255"},{"key":"20_CR65","unstructured":"Zhang, H., Shinn, M., Gupta, A., Gurfinkel, A., Le, N., Narodytska, N.: Verification of recurrent neural networks for cognitive tasks via reachability analysis. In: Proceedings of 24th European Conference on Artificial Intelligence, pp. 1690\u20131697 (2020)"},{"key":"20_CR66","unstructured":"Zhang, H., et al.: Alpha-Beta-CROWN: a fast and scalable neural network verifier with efficient bound propagation (2021). https:\/\/github.com\/huanzhang12\/alpha-beta-CROWN"},{"key":"20_CR67","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Zhao, Z., Chen, G., Song, F., Chen, T.: BDD4BNN: a BDD-based quantitative analysis framework for binarized neural networks. In: Proceedings of the 33rd International Conference on Computer Aided Verification, pp. 175\u2013200 (2021)","DOI":"10.1007\/978-3-030-81685-8_8"},{"key":"20_CR68","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Zhao, Z., Chen, G., Song, F., Zhang, M., Chen, T.: QVIP: an ILP-based formal verification approach for quantized neural networks. In: Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering (2022)","DOI":"10.1145\/3551349.3556916"},{"key":"20_CR69","doi-asserted-by":"crossref","unstructured":"Zhao, Z., Chen, G., Wang, J., Yang, Y., Song, F., Sun, J.: Attack as defense: characterizing adversarial examples using robustness. In: Proceedings of the 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 42\u201355 (2021)","DOI":"10.1145\/3460319.3464822"}],"container-title":["Lecture Notes in Computer Science","Static Analysis"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-22308-2_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,15]],"date-time":"2023-03-15T02:35:25Z","timestamp":1678847725000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-22308-2_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031223075","9783031223082"],"references-count":69,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-22308-2_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"2 December 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Static Analysis Symposium","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Auckland","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New Zealand","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sas2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.staticanalysis.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"43","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"42% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6.1","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}