{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T11:33:38Z","timestamp":1751456018169,"version":"3.40.5"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031737404"},{"type":"electronic","value":"9783031737411"}],"license":[{"start":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T00:00:00Z","timestamp":1730332800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T00:00:00Z","timestamp":1730332800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Autonomous vehicles (AV) rely on environmental perception to take manoeuvre decisions. Safety assurance for AV thus hinges\u00a0on achieving confidence in all percepts that are safe-guarding critical manoeuvres. As the safety targets for such critical manoeuvres\u00a0are considerably higher than the statistical figures for the reliability of at least current learning-enabled classification algorithms within the environmental perception, we need means for assuring\u00a0that the overall system is \u201csafer than perception\u201d in that\u00a0the frequency of erratically adopting a critical manoeuvre\u00a0is considerably lower than the frequency of individual misclassifications. We present a methodology for constructively generating reformulations of guard conditions that are\u00a0more resilient to misperception than the original condition.\u00a0The synthesized, rephrased guard conditions reconcile a given safety target, i.e. a given a societally accepted upper bound\u00a0on erratically activating a critical manoeuvre due to a false positive in guard evaluation, with maximal availability, i.e. maximal\u00a0true positive rate. By synthesizing a resilient rephrasing of the\u00a0guard condition, the constructive setting presented herein complements\u00a0the analytical setting from a previous companion\u00a0paper [6], which merely analysed a\u00a0given condition for its safety under uncertain perception.<\/jats:p>","DOI":"10.1007\/978-3-031-73741-1_25","type":"book-chapter","created":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:54:58Z","timestamp":1730300098000},"page":"415-433","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Safer Than Perception: Increasing Resilience of Automated Vehicles Against Misperception"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9138-8340","authenticated-orcid":false,"given":"Martin","family":"Fr\u00e4nzle","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8846-2282","authenticated-orcid":false,"given":"Andreas","family":"Hein","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,31]]},"reference":[{"issue":"1","key":"25_CR1","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MRA.2013.2297812","volume":"21","author":"Q Baig","year":"2014","unstructured":"Baig, Q., Perrollaz, M., Laugier, C.: A robust motion detection technique for dynamic environment monitoring: a framework for grid-based monitoring of the dynamic environment. IEEE Robot. Automat. Mag. 21(1), 40\u201348 (2014)","journal-title":"IEEE Robot. Automat. Mag."},{"key":"25_CR2","doi-asserted-by":"publisher","unstructured":"Bloem, R., K\u00f6nighofer, B., K\u00f6nighofer, R., Wang, C.: Shield synthesis: - runtime enforcement for reactive systems. In: Baier, C., Tinelli, C. (eds.) Tools and Algorithms for the Construction and Analysis of Systems - 21st International Conference, TACAS 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015. Proceedings. Lecture Notes in Computer Science, vol.\u00a09035, pp. 533\u2013548. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-662-46681-0_51","DOI":"10.1007\/978-3-662-46681-0_51"},{"issue":"8","key":"25_CR3","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1016\/j.patrec.2005.10.010","volume":"27","author":"T Fawcett","year":"2006","unstructured":"Fawcett, T.: An introduction to ROC analysis. Pattern Recogn. Lett. 27(8), 861\u2013874 (2006)","journal-title":"Pattern Recogn. Lett."},{"issue":"4","key":"25_CR4","doi-asserted-by":"publisher","first-page":"126","DOI":"10.3390\/A15040126","volume":"15","author":"B Finkbeiner","year":"2022","unstructured":"Finkbeiner, B., Fr\u00e4nzle, M., Kohn, F., Kr\u00f6ger, P.: A truly robust signal temporal logic: monitoring safety properties of interacting cyber-physical systems under uncertain observation. Algorithms 15(4), 126 (2022). https:\/\/doi.org\/10.3390\/A15040126","journal-title":"Algorithms"},{"key":"25_CR5","unstructured":"Fouopi, P.P.: Holistische Modellierung und Interpretation von Szenen und Situationen basierend auf symbolischen, probabilistischen und subsymbolischen Modellen. Ph.D. Thesis, University of Oldenburg, Germany (2019). http:\/\/oops.uni-oldenburg.de\/4601"},{"key":"25_CR6","doi-asserted-by":"publisher","unstructured":"Fr\u00e4nzle, M., Hagemann, W., Damm, W., Rakow, A., Swaminathan, M.: Safer than perception: Assuring confidence in safety-critical decisions of automated vehicles. In: Haxthausen, A.E., Huang, W., Roggenbach, M. (eds.) Applicable Formal Methods for Safe Industrial Products - Essays Dedicated to Jan Peleska on the Occasion of His 65th Birthday. Lecture Notes in Computer Science, vol. 14165, pp. 180\u2013201. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-40132-9_12","DOI":"10.1007\/978-3-031-40132-9_12"},{"issue":"4","key":"25_CR7","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1109\/TSMCC.2011.2161285","volume":"42","author":"M Galar","year":"2011","unstructured":"Galar, M., Fernandez, A., Barrenechea, E., Bustince, H., Herrera, F.: A review on ensembles for the class imbalance problem: bagging-, boosting-, and hybrid-based approaches. IEEE Trans. Syst. Man Cybernet. Part C (Appl. Rev.) 42(4), 463\u2013484 (2011)","journal-title":"IEEE Trans. Syst. Man Cybernet. Part C (Appl. Rev.)"},{"key":"25_CR8","unstructured":"Geirhos, R., Janssen, D.H.J., Sch\u00fctt, H.H., Rauber, J., Bethge, M., Wichmann, F.A.: Comparing deep neural networks against humans: object recognition when the signal gets weaker. CoRR (2017). arxiv:1706.06969"},{"key":"25_CR9","doi-asserted-by":"publisher","unstructured":"Gliesche, P., Kowalski, C., Pfingsthorn, M., Hein, A.: Geometry-based two-contact inverse kinematic solution for whole arm manipulation. In: IEEE\/RSJ International Conference on Intelligent Robots and Systems, IROS 2021, Prague, Czech Republic, September 27 - Oct. 1, 2021, pp. 8269\u20138274. IEEE (2021). https:\/\/doi.org\/10.1109\/IROS51168.2021.9636664","DOI":"10.1109\/IROS51168.2021.9636664"},{"key":"25_CR10","doi-asserted-by":"publisher","unstructured":"Huber, L.S., Geirhos, R., Wichmann, F.A.: The developmental trajectory of object recognition robustness: children are like small adults but unlike big deep neural networks. CoRR (2022). https:\/\/doi.org\/10.48550\/ARXIV.2205.10144","DOI":"10.48550\/ARXIV.2205.10144"},{"issue":"8","key":"25_CR11","doi-asserted-by":"publisher","first-page":"2732","DOI":"10.1016\/j.patcog.2010.03.006","volume":"43","author":"W Khreich","year":"2010","unstructured":"Khreich, W., Granger, E., Miri, A., Sabourin, R.: Iterative Boolean combination of classifiers in the ROC space: an application to anomaly detection with HMMs. Pattern Recogn. 43(8), 2732\u20132752 (2010). https:\/\/doi.org\/10.1016\/j.patcog.2010.03.006","journal-title":"Pattern Recogn."},{"issue":"4","key":"25_CR12","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1007\/S11334-022-00480-4","volume":"19","author":"B K\u00f6nighofer","year":"2023","unstructured":"K\u00f6nighofer, B., Rudolf, J., Palmisano, A., Tappler, M., Bloem, R.: Online shielding for reinforcement learning. Innov. Syst. Softw. Eng. 19(4), 379\u2013394 (2023). https:\/\/doi.org\/10.1007\/S11334-022-00480-4","journal-title":"Innov. Syst. Softw. Eng."},{"key":"25_CR13","doi-asserted-by":"publisher","unstructured":"Levinson, J., Montemerlo, M., Thrun, S.: Map-based precision vehicle localization in urban environments. In: Proceedings of Robotics: Science and Systems. Atlanta, GA, USA (2007). https:\/\/doi.org\/10.15607\/RSS.2007.III.016","DOI":"10.15607\/RSS.2007.III.016"},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Levinson, J., Thrun, S.: Robust vehicle localization in urban environments using probabilistic maps. In: IEEE International Conference on Robotics and Automation, pp. 4372\u20134378 (2010)","DOI":"10.1109\/ROBOT.2010.5509700"},{"key":"25_CR15","doi-asserted-by":"crossref","unstructured":"Maurer, M., Gerdes, J.C., Lenz, B., Winner, H.: Autonomous Driving: Technical, 1st edn. Legal and Social Aspects. Springer Publishing Company, Incorporated (2016)","DOI":"10.1007\/978-3-662-48847-8"},{"issue":"1\u20132","key":"25_CR16","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/S10703-016-0241-Z","volume":"49","author":"S Mitsch","year":"2016","unstructured":"Mitsch, S., Platzer, A.: Modelplex: verified runtime validation of verified cyber-physical system models. Formal Methods Syst. Des. 49(1\u20132), 33\u201374 (2016). https:\/\/doi.org\/10.1007\/S10703-016-0241-Z","journal-title":"Formal Methods Syst. Des."},{"key":"25_CR17","doi-asserted-by":"crossref","unstructured":"Moras, J., Cherfaoui, V., Bonnifait, P.: Moving objects detection by conflict analysis in evidential grids. In: IEEE Intelligent Vehicles Symposium (IV 2011), pp. 1120\u20131125 (2011)","DOI":"10.1109\/IVS.2011.5940561"},{"issue":"3","key":"25_CR18","doi-asserted-by":"publisher","first-page":"5445","DOI":"10.1109\/LRA.2021.3076968","volume":"6","author":"A Palleschi","year":"2021","unstructured":"Palleschi, A., Hamad, M., Abdolshah, S., Garabini, M., Haddadin, S., Pallottino, L.: Fast and safe trajectory planning: solving the cobot performance\/safety trade-off in human-robot shared environments. IEEE Robot. Autom. Lett. 6(3), 5445\u20135452 (2021). https:\/\/doi.org\/10.1109\/LRA.2021.3076968","journal-title":"IEEE Robot. Autom. Lett."},{"issue":"2\u20133","key":"25_CR19","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/s10514-009-9115-1","volume":"26","author":"A Petrovskaya","year":"2009","unstructured":"Petrovskaya, A., Thrun, S.: Model based vehicle detection and tracking for autonomous urban driving. Auton. Robots 26(2\u20133), 123\u2013139 (2009)","journal-title":"Auton. Robots"},{"issue":"1","key":"25_CR20","first-page":"37","volume":"2","author":"D Powers","year":"2011","unstructured":"Powers, D.: Evaluation: From precision, recall and f-measure to ROC, informedness, markedness & correlation. J. Mach. Learn. Technol. 2(1), 37\u201363 (2011)","journal-title":"J. Mach. Learn. Technol."},{"issue":"4","key":"25_CR21","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1249","volume":"8","author":"O Sagi","year":"2018","unstructured":"Sagi, O., Rokach, L.: Ensemble learning: a survey. WIREs Data Min. Knowl. Discov. 8(4), e1249 (2018). https:\/\/doi.org\/10.1002\/widm.1249","journal-title":"WIREs Data Min. Knowl. Discov."},{"key":"25_CR22","doi-asserted-by":"publisher","unstructured":"Seto, D., Krogh, B., Sha, L., Chutinan, A.: The simplex architecture for safe online control system upgrades. In: Proceedings of the 1998 American Control Conference. ACC (IEEE Cat. No.98CH36207), vol.\u00a06, pp. 3504\u20133508 (1998). https:\/\/doi.org\/10.1109\/ACC.1998.703255","DOI":"10.1109\/ACC.1998.703255"},{"key":"25_CR23","unstructured":"Thrun, S., Burgard, W., Fox, D.: Probabilistic Robotics (Intelligent Robotics and Autonomous Agents). The MIT Press (2005)"},{"issue":"4","key":"25_CR24","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1007\/S41315-022-00240-4","volume":"6","author":"AM Zanchettin","year":"2022","unstructured":"Zanchettin, A.M., Messeri, C., Cristantielli, D., Rocco, P.: Trajectory optimisation in collaborative robotics based on simulations and genetic algorithms. Int. J. Intell. Robotics Appl. 6(4), 707\u2013723 (2022). https:\/\/doi.org\/10.1007\/S41315-022-00240-4","journal-title":"Int. J. Intell. Robotics Appl."}],"container-title":["Lecture Notes in Computer Science","Bridging the Gap Between AI and Reality"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-73741-1_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:01:44Z","timestamp":1730300504000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-73741-1_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,31]]},"ISBN":["9783031737404","9783031737411"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-73741-1_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,10,31]]},"assertion":[{"value":"31 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AISoLA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Bridging the Gap between AI and Reality","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Crete","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aisola2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2023-aisola.isola-conference.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}