{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T04:09:33Z","timestamp":1744862973328,"version":"3.40.4"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031853555","type":"print"},{"value":"9783031853562","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-85356-2_7","type":"book-chapter","created":{"date-parts":[[2025,4,16]],"date-time":"2025-04-16T11:44:44Z","timestamp":1744803884000},"page":"97-112","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Formal Security Analysis of\u00a0Deep Neural Network Architecture"],"prefix":"10.1007","author":[{"given":"Marwa","family":"Zeroual","sequence":"first","affiliation":[]},{"given":"Brahim","family":"Hamid","sequence":"additional","affiliation":[]},{"given":"Morayo","family":"Adedjouma","sequence":"additional","affiliation":[]},{"given":"Jason","family":"Jaskolka","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,17]]},"reference":[{"key":"7_CR1","unstructured":"ISO-IEC. information technology - security techniques - information security management systems - overview and vocabulary. IEC, 2018"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Baluta, T., Shen, S., Shinde, S., Meel, K.S., Saxena, P.: Quantitative verification of neural networks and its security applications. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 1249\u20131264, 2019","DOI":"10.1145\/3319535.3354245"},{"key":"7_CR3","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1016\/j.ins.2021.06.073","volume":"576","author":"M Botta","year":"2021","unstructured":"Botta, M., Cavagnino, D., Esposito, R.: Neunac: a novel fragile watermarking algorithm for integrity protection of neural networks. Inf. Sci. 576, 228\u2013241 (2021)","journal-title":"Inf. Sci."},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D.: Towards evaluating the robustness of neural networks. In: 2017 IEEE Symposium on Security and Privacy, pp. 39\u201357. IEEE (2017)","DOI":"10.1109\/SP.2017.49"},{"key":"7_CR5","unstructured":"Caroline, B., et al.: Securing machine learning algorithms (2021)"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Hanif, M.A., Khalid, F., Putra, R.V.W., Rehman, S., Shafique, M.: Robust machine learning systems: reliability and security for deep neural networks. In: 2018 IEEE 24th International Symposium on On-Line Testing And Robust System Design, pp. 257\u2013260. IEEE, 2018","DOI":"10.1109\/IOLTS.2018.8474192"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Xiaowei Huang, Marta Kwiatkowska, Sen Wang, and Min Wu. Safety verification of deep neural networks. In: Computer Aided Verification: 29th International Conference, CAV 2017, Heidelberg, Germany, 24\u201328 July 2017, Proceedings, Part I 30, pages 3\u201329. Springer, 2017","DOI":"10.1007\/978-3-319-63387-9_1"},{"key":"7_CR8","unstructured":"Jackson, D.: Software Abstractions: Logic, Language, and Analysis. MIT press, Cambridge (2012)"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Joud, R., Mo\u00ebllic, P.A., Bernhard, R., Rigaud, J.B.: A review of confidentiality threats against embedded neural network models. In: 2021 IEEE 7th World Forum on Internet of Things, pp. 610\u2013615. IEEE (2021)","DOI":"10.1109\/WF-IoT51360.2021.9595434"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Katz, G., Barrett, C., Dill, D.L., Julian, K., Kochenderfer, M.J.: Reluplex: an efficient SMT solver for verifying deep neural networks. In: Computer Aided Verification: 29th International Conference, CAV 2017, Heidelberg, Germany, 24\u201328 July 2017, Proceedings, Part I 30, pp. 97\u2013117. Springer, 2017","DOI":"10.1007\/978-3-319-63387-9_5"},{"key":"7_CR11","unstructured":"Kumar, R.S.S., Brien, D.O., Albert, K., Vilj\u00f6en, S., Snover, J.: Failure modes in machine learning systems. arXiv preprint arXiv:1911.11034, 2019"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Lechevalier, D., Hudak, S., Ak, R., Lee, Y.T., Foufou, S.: A neural network meta-model and its application for manufacturing. In: 2015 IEEE International Conference on Big Data (Big Data), pp. 1428\u20131435. IEEE, 2015","DOI":"10.1109\/BigData.2015.7363903"},{"key":"7_CR13","unstructured":"Li, S., Xue, M., Zhao, B.Z.H., Zhu, H., Zhang, X.: Invisible backdoor attacks against deep neural networks. arXiv preprint arXiv:1909.02742, 2019"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Pi\u00f1eyro, L., Pardo, A., Viera, M.: Structure verification of deep neural networks at compilation time using dependent types. In: Proceedings of the XXIII Brazilian Symposium on Programming Languages, pp. 46\u201353, 2019","DOI":"10.1145\/3355378.3355379"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Shumailov, I., Zhao, Y., Bates, D., Papernot, N., Mullins, R., Anderson, R.: Sponge examples: energy-latency attacks on neural networks. In: 2021 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 212\u2013231. IEEE, 2021","DOI":"10.1109\/EuroSP51992.2021.00024"},{"key":"7_CR16","unstructured":"Wang, S., Pei, K., Whitehouse, J., Yang, J., Jana, S.: Efficient formal safety analysis of neural networks. Adv. Neural Inf. Process. Syst. 31 (2018)"},{"key":"7_CR17","unstructured":"Wang, S., Pei, K., Whitehouse, J., Yang, J., Jana, S.: Formal security analysis of neural networks using symbolic intervals. In: 27th USENIX Security Symposium (USENIX Security 18), pp. 1599\u20131614, 2018"},{"key":"7_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.107899","volume":"115","author":"S-K Yeom","year":"2021","unstructured":"Yeom, S.-K., et al.: Pruning by explaining: a novel criterion for deep neural network pruning. Pattern Recogn. 115, 107899 (2021)","journal-title":"Pattern Recogn."}],"container-title":["Lecture Notes in Computer Science","Verification and Evaluation of Computer and Communication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-85356-2_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,16]],"date-time":"2025-04-16T11:44:56Z","timestamp":1744803896000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-85356-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031853555","9783031853562"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-85356-2_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"17 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"VECoS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Verification and Evaluation of Computer and Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Djerba","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tunisia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"vecos2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.vecos-world.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}