{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T14:37:04Z","timestamp":1768487824229,"version":"3.49.0"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031442667","type":"print"},{"value":"9783031442674","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-44267-4_24","type":"book-chapter","created":{"date-parts":[[2023,10,1]],"date-time":"2023-10-01T00:03:27Z","timestamp":1696118607000},"page":"428-446","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Runtime Monitoring DNN-Based Perception"],"prefix":"10.1007","author":[{"given":"Chih-Hong","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Michael","family":"Luttenberger","sequence":"additional","affiliation":[]},{"given":"Rongjie","family":"Yan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,1]]},"reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"Balakrishnan, A., Deshmukh, J., Hoxha, B., Yamaguchi, T., Fainekos, G.: Percemon: online monitoring for perception systems. In: International Conference on Runtime Verification (RV), pp. 297\u2013308 (2021)","DOI":"10.1007\/978-3-030-88494-9_18"},{"issue":"3","key":"24_CR2","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1145\/136035.136043","volume":"24","author":"RE Bryant","year":"1992","unstructured":"Bryant, R.E.: Symbolic boolean manipulation with ordered binary-decision diagrams. ACM Comput. Surv. (CSUR) 24(3), 293\u2013318 (1992)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"Chen, Y., Cheng, C.-H., Yan, J., Yan, R.: Monitoring object detection abnormalities via data-label and post-algorithm abstractions. In: IEEE\/RSJ International Conference on Intelligent Robots and Systems (IROS), pp. 6688\u20136693 (2021)","DOI":"10.1109\/IROS51168.2021.9636713"},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"Cheng, C.-H.: Provably-robust runtime monitoring of neuron activation patterns. In: Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 1310\u20131313 (2021)","DOI":"10.23919\/DATE51398.2021.9473957"},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"Cheng, C.-H., Huang, C.-H., Brunner, T., Hashemi, V.: Towards safety verification of direct perception neural networks. In: Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 1640\u20131643 (2020)","DOI":"10.23919\/DATE48585.2020.9116205"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Cheng, C.-H., N\u00fchrenberg, G., Yasuoka, H.: Runtime monitoring neuron activation patterns. In: Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 300\u2013303 (2019)","DOI":"10.23919\/DATE.2019.8714971"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Donz\u00e9, A., Maler, O.: Robust satisfaction of temporal logic over real-valued signals. In: International Conference on Formal Modeling and Analysis of Timed Systems (FORMATS), pp. 92\u2013106 (2010)","DOI":"10.1007\/978-3-642-15297-9_9"},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"Gawlitza, T.M., Seidl, H.: Solving systems of rational equations through strategy iteration. ACM Trans. Program. Lang. Syst. (TOPLAS) 33(3), 11:1\u201311:48 (2011)","DOI":"10.1145\/1961204.1961207"},{"key":"24_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/978-3-030-88494-9_14","volume-title":"Runtime Verification","author":"V Hashemi","year":"2021","unstructured":"Hashemi, V., K\u0159et\u00ednsk\u00fd, J., Mohr, S., Seferis, E.: Gaussian-based runtime detection of\u00a0out-of-distribution inputs for neural networks. In: Feng, L., Fisman, D. (eds.) RV 2021. LNCS, vol. 12974, pp. 254\u2013264. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-88494-9_14"},{"key":"24_CR10","unstructured":"Hendrycks, D.,, Gimpel, K.: A baseline for detecting misclassified and out-of-distribution examples in neural networks. In: International Conference on Learning Representations (ICLR) (2017)"},{"key":"24_CR11","unstructured":"Henzinger, T.A., Lukina, A., Schilling, C.: Outside the box: abstraction-based monitoring of neural networks. arXiv preprint arXiv:1911.09032 (2019)"},{"issue":"4","key":"24_CR12","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/BF01995674","volume":"2","author":"R Koymans","year":"1990","unstructured":"Koymans, R.: Specifying real-time properties with metric temporal logic. Real-Time Syst. 2(4), 255\u2013299 (1990)","journal-title":"Real-Time Syst."},{"key":"24_CR13","unstructured":"LeCun, Y.: The MNIST database of handwritten digits. http:\/\/yann.lecun.com\/exdb\/most\/ (1998)"},{"key":"24_CR14","unstructured":"Lee, K., Lee, K., Lee, H., Shin, J.: A simple unified framework for detecting out-of-distribution samples and adversarial attacks. In: Conference on Neural Information Processing Systems (NeurIPS), vol. 31 (2018)"},{"key":"24_CR15","unstructured":"Liang, S., Li, Y., Srikant, R.: Enhancing the reliability of out-of-distribution image detection in neural networks. In: International Conference on Learning Representations (ICLP) (2018)"},{"key":"24_CR16","doi-asserted-by":"crossref","unstructured":"Lindemann, L., Qin, X., Deshmukh, J. V., Pappas, G.J.: Conformal prediction for STL runtime verification. In: International Conference on Cyber-Physical Systems (ICCPS), pp. 142\u2013153 (2023)","DOI":"10.1145\/3576841.3585927"},{"key":"24_CR17","doi-asserted-by":"crossref","unstructured":"Liu, X., Lochman, Y., Zach, C.: Gen: pushing the limits of softmax-based out-of-distribution detection. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 23946\u201323955 (2023)","DOI":"10.1109\/CVPR52729.2023.02293"},{"key":"24_CR18","doi-asserted-by":"crossref","unstructured":"Ni\u010dkovi\u0107, D., Yamaguchi, T.: RTAMT: online robustness monitors from STL. In: International Symposium on Automated Technology for Verification and Analysis (ATVA), pp. 564\u2013571 (2020)","DOI":"10.1007\/978-3-030-59152-6_34"},{"key":"24_CR19","doi-asserted-by":"crossref","unstructured":"Olber, B., Radlak, K., Popowicz, A., Szczepankiewicz, M., Chachu\u0142a, K.: Detection of out-of-distribution samples using binary neuron activation patterns. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 3378\u20133387 (2023)","DOI":"10.1109\/CVPR52729.2023.00329"},{"key":"24_CR20","doi-asserted-by":"crossref","unstructured":"Pnueli, A.: The temporal logic of programs. In: Annual Symposium on Foundations of Computer Science (FOCS), pp. 46\u201357 (1977)","DOI":"10.1109\/SFCS.1977.32"},{"key":"24_CR21","doi-asserted-by":"crossref","unstructured":"Qutub, S., et al.: Hardware faults that matter: understanding and estimating the safety impact of hardware faults on object detection dnns. In: International Conference on Computer Safety, Reliability, and Security (SafeComp), pp. 298\u2013318 (2022)","DOI":"10.1007\/978-3-031-14835-4_20"},{"key":"24_CR22","doi-asserted-by":"crossref","unstructured":"Torfah, H., Xie, C., Junges, S., Vazquez-Chanlatte, M., Seshia, S.A.: Learning monitorable operational design domains for assured autonomy. In: International Symposium on Automated Technology for Verification and Analysis (ATVA), pp. 3\u201322 (2022)","DOI":"10.1007\/978-3-031-19992-9_1"},{"key":"24_CR23","doi-asserted-by":"crossref","unstructured":"Waga, M., Castellano, E., Pruekprasert, S., Klikovits, S., Takisaka, T., Hasuo, I.: Dynamic shielding for reinforcement learning in black-box environments. In: International Symposium on Automated Technology for Verification and Analysis (ATVA), pp. 25\u201341 (2022)","DOI":"10.1007\/978-3-031-19992-9_2"},{"key":"24_CR24","unstructured":"Wu, C., Falcone, Y., Bensalem, S.: Customizable reference runtime monitoring of neural networks using resolution boxes. arXiv preprint arXiv:2104.14435 (2021)"},{"key":"24_CR25","unstructured":"Xiao, H., Rasul, K., Vollgraf, R.: Fashion-MNIST: a novel image dataset for benchmarking machine learning algorithms. arXiv preprint arXiv:1708.07747 (2017)"},{"key":"24_CR26","doi-asserted-by":"crossref","unstructured":"Yan, R., Chen, Y., Gao, H., Yan, J.: Test case prioritization with neuron valuation based pattern. Sci. Comput. Program. (SCP) 215, 102761 (2022)","DOI":"10.1016\/j.scico.2021.102761"},{"key":"24_CR27","doi-asserted-by":"crossref","unstructured":"Zhang, K., Zhang, Y., Zhang, L., Gao, H., Yan, R., Yan, J.: Neuron activation frequency based test case prioritization. In: International Symposium on Theoretical Aspects of Software Engineering (TASE), pp. 81\u201388 (2020)","DOI":"10.1109\/TASE49443.2020.00020"}],"container-title":["Lecture Notes in Computer Science","Runtime Verification"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-44267-4_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,1]],"date-time":"2023-10-01T00:15:40Z","timestamp":1696119340000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-44267-4_24"}},"subtitle":["(via the Lens of Formal Methods)"],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031442667","9783031442674"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-44267-4_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"1 October 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"RV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Runtime Verification","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Thessaloniki","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"rv2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/rv23.csd.auth.gr","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,15","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The proceedings includes also 4 Tutorial Papers and  2 Invited Papers","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}