{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T13:44:54Z","timestamp":1742996694262,"version":"3.40.3"},"publisher-location":"Cham","reference-count":40,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031747755"},{"type":"electronic","value":"9783031747762"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-74776-2_13","type":"book-chapter","created":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T05:34:56Z","timestamp":1737351296000},"page":"327-351","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Robustness Verification of Multi-label Neural Network Classifiers"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-0916-3793","authenticated-orcid":false,"given":"Julian","family":"Mour","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6644-5377","authenticated-orcid":false,"given":"Dana","family":"Drachsler-Cohen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,21]]},"reference":[{"unstructured":"Balunovic, M., Baader, M., Singh, G., Gehr, T., Vechev, M.T.: Certifying geometric robustness of neural networks. In: Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems NeurIPS, pp. 15287\u201315297 (2019)","key":"13_CR1"},{"doi-asserted-by":"crossref","unstructured":"Benussi, E., Patan\u00e8, A., Wicker, M., Laurenti, L., Kwiatkowska, M.: Individual fairness guarantees for neural networks. In: Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, IJCAI, pp. 651\u2013658 (2022)","key":"13_CR2","DOI":"10.24963\/ijcai.2022\/92"},{"issue":"1","key":"13_CR3","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1137\/141000671","volume":"59","author":"J Bezanson","year":"2017","unstructured":"Bezanson, J., Edelman, A., Karpinski, S., Shah, V.B.: Julia: a fresh approach to numerical computing. SIAM Rev. 59(1), 65\u201398 (2017)","journal-title":"SIAM Rev."},{"unstructured":"Chen, M., Zheng, A.X., Weinberger, K.Q.: Fast image tagging. In: Proceedings of the 30th International Conference on Machine Learning, ICML. JMLR Workshop and Conference Proceedings, vol.\u00a028, pp. 1274\u20131282 (2013)","key":"13_CR4"},{"doi-asserted-by":"crossref","unstructured":"Croce, F., Andriushchenko, M., Singh, N.D., Flammarion, N., Hein, M.: Sparse-rs: a versatile framework for query-efficient sparse black-box adversarial attacks. In: Thirty-Sixth AAAI Conference on Artificial Intelligence, AAAI, Thirty-Fourth Conference on Innovative Applications of Artificial Intelligence, IAAI, The Twelveth Symposium on Educational Advances in Artificial Intelligence, EAAI, pp. 6437\u20136445. AAAI Press (2022)","key":"13_CR5","DOI":"10.1609\/aaai.v36i6.20595"},{"issue":"1","key":"13_CR6","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/s11263-014-0733-5","volume":"111","author":"M Everingham","year":"2015","unstructured":"Everingham, M., Eslami, S.M.A., Van Gool, L., Williams, C.K.I., Winn, J., Zisserman, A.: The pascal visual object classes challenge: a retrospective. Int. J. Comput. Vis. 111(1), 98\u2013136 (2015)","journal-title":"Int. J. Comput. Vis."},{"doi-asserted-by":"crossref","unstructured":"Gehr, T., Mirman, M., Drachsler-Cohen, D., Tsankov, P., Chaudhuri, S., Vechev, M.T.: AI2: safety and robustness certification of neural networks with abstract interpretation. In: IEEE Symposium on Security and Privacy, SP, pp. 3\u201318. IEEE Computer Society (2018)","key":"13_CR7","DOI":"10.1109\/SP.2018.00058"},{"unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. In: 3rd International Conference on Learning Representations, ICLR (2015)","key":"13_CR8"},{"key":"13_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/978-3-540-87700-4_41","volume-title":"Parallel Problem Solving from Nature \u2013 PPSN X","author":"R Grodzicki","year":"2008","unstructured":"Grodzicki, R., Ma\u0144dziuk, J., Wang, L.: Improved multilabel classification with neural networks. In: Rudolph, G., Jansen, T., Beume, N., Lucas, S., Poloni, C. (eds.) PPSN 2008. LNCS, vol. 5199, pp. 409\u2013416. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-87700-4_41"},{"unstructured":"Hsieh, C., Lin, Y., Lin, H.: A deep model with local surrogate loss for general cost-sensitive multi-label learning. In: Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, (AAAI-18), the 30th innovative Applications of Artificial Intelligence (IAAI-18), and the 8th AAAI Symposium on Educational Advances in Artificial Intelligence (EAAI-18), pp. 3239\u20133246. AAAI Press (2018)","key":"13_CR10"},{"doi-asserted-by":"crossref","unstructured":"Hu, S., Ke, L., Wang, X., Lyu, S.: Tkml-ap: adversarial attacks to top-k multi-label learning. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 7649\u20137657 (2021)","key":"13_CR11","DOI":"10.1109\/ICCV48922.2021.00755"},{"key":"13_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-3-030-59152-6_3","volume-title":"Automated Technology for Verification and Analysis","author":"Y Jacoby","year":"2020","unstructured":"Jacoby, Y., Barrett, C., Katz, G.: Verifying recurrent neural networks using invariant inference. In: Hung, D.V., Sokolsky, O. (eds.) ATVA 2020. LNCS, vol. 12302, pp. 57\u201374. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-59152-6_3"},{"doi-asserted-by":"crossref","unstructured":"Ji, S., Wang, K., Peng, X., Yang, J., Zeng, Z., Qiao, Y.: Multiple transfer learning and multi-label balanced training strategies for facial AU detection in the wild. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition, CVPR Workshops, pp. 1657\u20131661. Computer Vision Foundation \/ IEEE (2020)","key":"13_CR13","DOI":"10.1109\/CVPRW50498.2020.00215"},{"unstructured":"Jia, J., Qu, W., Gong, N.Z.: Multiguard: Provably robust multi-label classification against adversarial examples. In: Advances in Neural Information Processing Systems NeurIPS (2022)","key":"13_CR14"},{"doi-asserted-by":"crossref","unstructured":"Kabaha, A., Drachsler-Cohen, D.: Boosting robustness verification of semantic feature neighborhoods. In: Static Analysis - 29th International Symposium, SAS, vol. 13790, pp. 299\u2013324. Springer (2022)","key":"13_CR15","DOI":"10.1007\/978-3-031-22308-2_14"},{"doi-asserted-by":"publisher","unstructured":"Kong, L., Luo, W., Zhang, H., Liu, Y., Shi, Y.: Evolutionary multi-label adversarial examples: an effective black-box attack. IEEE Trans. Artif. Intell. 1\u201312 (2022). https:\/\/doi.org\/10.1109\/TAI.2022.3198629","key":"13_CR16","DOI":"10.1109\/TAI.2022.3198629"},{"doi-asserted-by":"crossref","unstructured":"Kurata, G., Xiang, B., Zhou, B.: Improved neural network-based multi-label classification with better initialization leveraging label co-occurrence. In: The Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies NAACL HLT, pp. 521\u2013526 (2016)","key":"13_CR17","DOI":"10.18653\/v1\/N16-1063"},{"unstructured":"Mahmood, H., Elhamifar, E.: Towards effective multi-label recognition attacks via knowledge graph consistency. CoRR abs\/2207.05137 (2022)","key":"13_CR18"},{"unstructured":"Melacci, S., et al.: Can domain knowledge alleviate adversarial attacks in multi-label classifiers? CoRR abs\/2006.03833 (2020)","key":"13_CR19"},{"issue":"12","key":"13_CR20","doi-asserted-by":"publisher","first-page":"9944","DOI":"10.1109\/TPAMI.2021.3137564","volume":"44","author":"S Melacci","year":"2022","unstructured":"Melacci, S., et al.: Domain knowledge alleviates adversarial attacks in multi-label classifiers. IEEE Trans. Pattern Anal. Mach. Intell. 44(12), 9944\u20139959 (2022)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"1","key":"13_CR21","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1023\/A:1008162616689","volume":"38","author":"C Papageorgiou","year":"2000","unstructured":"Papageorgiou, C., Poggio, T.A.: A trainable system for object detection. Int. J. Comput. Vis. 38(1), 15\u201333 (2000)","journal-title":"Int. J. Comput. Vis."},{"doi-asserted-by":"crossref","unstructured":"Reshef, R., Kabaha, A., Seleznova, O., Drachsler-Cohen, D.: Verification of neural networks local differential classification privacy. CoRR abs\/2310.20299 (2023)","key":"13_CR22","DOI":"10.1007\/978-3-031-50521-8_5"},{"issue":"OOPSLA1","key":"13_CR23","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1145\/3586042","volume":"7","author":"Y Shapira","year":"2023","unstructured":"Shapira, Y., Avneri, E., Drachsler-Cohen, D.: Deep learning robustness verification for few-pixel attacks. Proc. ACM Program. Lang. 7(OOPSLA1), 434\u2013461 (2023)","journal-title":"Proc. ACM Program. Lang."},{"unstructured":"Singh, G., Gehr, T., Mirman, M., P\u00fcschel, M., Vechev, M.: Fast and effective robustness certification. In: Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems NeurIPS (2018)","key":"13_CR24"},{"doi-asserted-by":"crossref","unstructured":"Singh, G., Gehr, T., P\u00fcschel, M., Vechev, M.: An abstract domain for certifying neural networks. Proc. ACM Program. Lang. 3(POPL) (2019)","key":"13_CR25","DOI":"10.1145\/3290354"},{"doi-asserted-by":"crossref","unstructured":"Song, Q., Jin, H., Huang, X., Hu, X.: Multi-label adversarial perturbations. In: IEEE International Conference on Data Mining, ICDM, pp. 1242\u20131247. IEEE Computer Society (2018)","key":"13_CR26","DOI":"10.1109\/ICDM.2018.00166"},{"doi-asserted-by":"crossref","unstructured":"Sumbul, G., Charfuelan, M., Demir, B., Markl, V.: Bigearthnet: a large-scale benchmark archive for remote sensing image understanding. CoRR abs\/1902.06148 (2019)","key":"13_CR27","DOI":"10.1109\/IGARSS.2019.8900532"},{"unstructured":"Sun, S.H.: Multi-digit mnist for few-shot learning (2019). https:\/\/github.com\/shaohua0116\/MultiDigitMNIST","key":"13_CR28"},{"doi-asserted-by":"crossref","unstructured":"Sun, Y., Usman, M., Gopinath, D., Pasareanu, C.S.: VPN: verification of poisoning in neural networks. In: Software Verification and Formal Methods for ML-Enabled Autonomous Systems - 5th International Workshop, FoMLAS, and 15th International Workshop, NSV, vol. 13466, pp. 3\u201314. Springer (2022)","key":"13_CR29","DOI":"10.1007\/978-3-031-21222-2_1"},{"unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks. In: 2nd International Conference on Learning Representations, ICLR (2014)","key":"13_CR30"},{"unstructured":"Tjeng, V., Xiao, K.Y., Tedrake, R.: Evaluating robustness of neural networks with mixed integer programming. In: 7th International Conference on Learning Representations, ICLR. OpenReview.net (2019)","key":"13_CR31"},{"key":"13_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/978-3-030-81685-8_12","volume-title":"Computer Aided Verification","author":"H-D Tran","year":"2021","unstructured":"Tran, H.-D., et al.: Robustness verification of semantic segmentation neural networks using relaxed reachability. In: Silva, A., Leino, K.R.M. (eds.) CAV 2021. LNCS, vol. 12759, pp. 263\u2013286. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-81685-8_12"},{"issue":"3","key":"13_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/jdwm.2007070101","volume":"3","author":"G Tsoumakas","year":"2007","unstructured":"Tsoumakas, G., Katakis, I.: Multi-label classification: an overview. Int. J. Data Warehous. Min. 3(3), 1\u201313 (2007)","journal-title":"Int. J. Data Warehous. Min."},{"doi-asserted-by":"crossref","unstructured":"Urban, C., Christakis, M., W\u00fcstholz, V., Zhang, F.: Perfectly parallel fairness certification of neural networks. Proc. ACM Program. Lang. 4(OOPSLA), 185:1\u2013185:30 (2020)","key":"13_CR34","DOI":"10.1145\/3428253"},{"unstructured":"Weston, J., Bengio, S., Usunier, N.: WSABIE: scaling up to large vocabulary image annotation. In: Proceedings of the 22nd International Joint Conference on Artificial Intelligence IJCAI, pp. 2764\u20132770. IJCAI\/AAAI (2011)","key":"13_CR35"},{"doi-asserted-by":"crossref","unstructured":"Wu, Y., Bamman, D., Russell, S.: Adversarial training for relation extraction. In: Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing, EMNLP, pp. 1778\u20131783. Association for Computational Linguistics (2017)","key":"13_CR36","DOI":"10.18653\/v1\/D17-1187"},{"unstructured":"Xu, K., et al.: Fast and complete: enabling complete neural network verification with rapid and massively parallel incomplete verifiers. In: 9th International Conference on Learning Representations, ICLR. OpenReview.net (2021)","key":"13_CR37"},{"doi-asserted-by":"publisher","unstructured":"Yang, Z., Han, Y., Zhang, X.: Characterizing the evasion attackability of multi-label classifiers. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 35. no. 12, pp. 10647\u201310655 (2021). https:\/\/doi.org\/10.1609\/aaai.v35i12.17273, https:\/\/ojs.aaai.org\/index.php\/AAAI\/article\/view\/17273","key":"13_CR38","DOI":"10.1609\/aaai.v35i12.17273"},{"issue":"10","key":"13_CR39","doi-asserted-by":"publisher","first-page":"1338","DOI":"10.1109\/TKDE.2006.162","volume":"18","author":"M Zhang","year":"2006","unstructured":"Zhang, M., Zhou, Z.: Multi-label neural networks with applications to functional genomics and text categorization. IEEE Trans. Knowl. Data Eng. 18(10), 1338\u20131351 (2006)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"doi-asserted-by":"crossref","unstructured":"Zhou, N., Luo, W., Lin, X., Xu, P., Zhang, Z.: Generating multi-label adversarial examples by linear programming. In: International Joint Conference on Neural Networks, IJCNN, pp.\u00a01\u20138. IEEE (2020)","key":"13_CR40","DOI":"10.1109\/IJCNN48605.2020.9206614"}],"container-title":["Lecture Notes in Computer Science","Static Analysis"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-74776-2_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T05:35:22Z","timestamp":1737351322000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-74776-2_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031747755","9783031747762"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-74776-2_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"21 January 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Static Analysis Symposium","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pasadena, CA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sas2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2024.splashcon.org\/home\/sas-2024","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}