{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T05:39:38Z","timestamp":1761543578674,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031999901","type":"print"},{"value":"9783031999918","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:00:00Z","timestamp":1761609600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:00:00Z","timestamp":1761609600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-031-99991-8_15","type":"book-chapter","created":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T05:36:23Z","timestamp":1761543383000},"page":"260-265","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["NNV: A Star Set Reachability Approach (Competition Contribution)"],"prefix":"10.1007","author":[{"given":"Diego Manzanas","family":"Lopez","sequence":"first","affiliation":[]},{"given":"Samuel","family":"Sasaki","sequence":"additional","affiliation":[]},{"given":"Taylor T.","family":"Johnson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,28]]},"reference":[{"key":"15_CR1","unstructured":"Althoff, M.: An introduction to CORA 2015. In: Proceedings of the Workshop on Applied Verification for Continuous and Hybrid Systems (2015)"},{"key":"15_CR2","doi-asserted-by":"publisher","unstructured":"Bak, S., Bogomolov, S., Johnson, T.T.: Hyst: a source transformation and translation tool for hybrid automaton models. In: Proceedings of the 18th International Conference on Hybrid Systems: Computation and Control. p. 128\u2013133. HSCC \u201915, Association for Computing Machinery, New York, NY, USA (2015). https:\/\/doi.org\/10.1145\/2728606.2728630","DOI":"10.1145\/2728606.2728630"},{"key":"15_CR3","doi-asserted-by":"publisher","unstructured":"Ivashchenko, M., Choi, S.W., Nguyen, L.V., Tran, H.D.: Verifying binary neural networks on continuous input space using star reachability. In: 2023 IEEE\/ACM 11th International Conference on Formal Methods in Software Engineering (FormaliSE), pp. 7\u201317 (2023). https:\/\/doi.org\/10.1109\/FormaliSE58978.2023.00009","DOI":"10.1109\/FormaliSE58978.2023.00009"},{"key":"15_CR4","doi-asserted-by":"publisher","unstructured":"Johnson, T.T., Lopez, D.M., Tran, H.D.: Tutorial: Safe, secure, and trustworthy artificial intelligence (ai) via formal verification of neural networks and autonomous cyber-physical systems (cps) with nnv. In: 2024 54th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S), pp. 65\u201366 (2024). https:\/\/doi.org\/10.1109\/DSN-S60304.2024.00027","DOI":"10.1109\/DSN-S60304.2024.00027"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Kvasnica, M., Grieder, P., Baoti\u0107, M., Morari, M.: Multi-parametric toolbox (mpt). In: Alur, R., Pappas, G.J. (eds.) Hybrid Systems: Computation and Control, pp. 448\u2013462. Springer, Berlin Heidelberg, Berlin, Heidelberg (2004)","DOI":"10.1007\/978-3-540-24743-2_30"},{"key":"15_CR6","unstructured":"Lopez, D.M., Johnson, T.T., Bak, S., Tran, H.D., Hobbs, K.: Evaluation of neural network verification methods for air to air collision avoidance. AIAA J. Air Transp. (JAT) (2022)"},{"key":"15_CR7","unstructured":"L\u00f6fberg, J.Y.: A toolbox for modeling and optimization in matlab. In: Proceedings of the CACSD Conference. Taipei, Taiwan (2004)"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Manzanas\u00a0Lopez, D., Choi, S.W., Tran, H.D., Johnson, T.T.: Nnv 2.0: The neural network verification tool. In: Enea, C., Lal, A. (eds.) Computer Aided Verification, pp. 397\u2013412. Springer Nature Switzerland, Cham (2023)","DOI":"10.1007\/978-3-031-37703-7_19"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Manzanas\u00a0Lopez, D., Musau, P., Hamilton, N., Johnson, T.: Reachability analysis of a general class of neural ordinary differential equation. In: Proceedings of the 20th International Conference on Formal Modeling and Analysis of Timed Systems (FORMATS 2022), Co-Located with CONCUR, FMICS, and QEST as part of CONFEST 2022. Warsaw, Poland (September 2022)","DOI":"10.1007\/978-3-031-15839-1_15"},{"key":"15_CR10","unstructured":"Oki, E.: GLPK (gnu linear programming kit) (2012)"},{"key":"15_CR11","unstructured":"(ONNX), O.N.N.E.: https:\/\/github.com\/onnx\/"},{"key":"15_CR12","doi-asserted-by":"publisher","unstructured":"Robinette, P.K., Lopez, M.D., Serbinowska, S., Leach, K., Johnson, T.T.: Case study: neural network malware detection verification for feature and image datasets. In: Proceedings of the 2024 IEEE\/ACM 12th International Conference on Formal Methods in Software Engineering (FormaliSE), pp. 127\u2013137. FormaliSE \u201924, Association for Computing Machinery, New York, NY, USA (2024). https:\/\/doi.org\/10.1145\/3644033.3644372","DOI":"10.1145\/3644033.3644372"},{"key":"15_CR13","unstructured":"The\u00a0MathWorks, I.: Deep Learning Toolbox Converter for ONNX Model Format. Natick, Massachusetts, United State (2024). https:\/\/www.mathworks.com\/matlabcentral\/fileexchange\/67296-deep-learning-toolbox-converter-for-onnx-model-format"},{"key":"15_CR14","unstructured":"The\u00a0MathWorks, I.: Optimization Toolbox. Natick, Massachusetts, United State (2024). https:\/\/www.mathworks.com\/products\/optimization.html"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Tran, H.D., Bak, S., Xiang, W., Johnson, T.T.: Verification of deep convolutional neural networks using imagestars. In: 32nd International Conference on Computer-Aided Verification (CAV). Springer (2020)","DOI":"10.1007\/978-3-030-53288-8_2"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Tran, H.D., Cei, F., Lopez, D.M., Johnson, T.T., Koutsoukos, X.: Safety verification of cyber-physical systems with reinforcement learning control. In: ACM SIGBED International Conference on Embedded Software (EMSOFT\u201919). ACM (2019)","DOI":"10.1145\/3358230"},{"key":"15_CR17","doi-asserted-by":"publisher","unstructured":"Tran, H.D., Manzanas\u00a0Lopez, D., Johnson, T.: Tutorial: Neural network and autonomous cyber-physical systems formal verification for trustworthy AI and safe autonomy. In: Proceedings of the International Conference on Embedded Software, pp. 1\u20132. EMSOFT \u201923, Association for Computing Machinery, New York, NY, USA (2024). https:\/\/doi.org\/10.1145\/3607890.3608454","DOI":"10.1145\/3607890.3608454"},{"key":"15_CR18","doi-asserted-by":"publisher","unstructured":"Tran, H.D., et al.: Parallelizable reachability analysis algorithms for feed-forward neural networks. In: Proceedings of the 7th International Workshop on Formal Methods in Software Engineering (FormaliSE\u201919), pp. 31\u201340. FormaliSE \u201919, IEEE Press, Piscataway, NJ, USA (2019). https:\/\/doi.org\/10.1109\/FormaliSE.2019.00012","DOI":"10.1109\/FormaliSE.2019.00012"},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Tran, H.D., et al.: Star-based reachability analysis for deep neural networks. In: 23rd International Symposium on Formal Methods (FM\u201919). Springer International Publishing (2019)","DOI":"10.1007\/978-3-030-30942-8_39"},{"issue":"4\u20135","key":"15_CR20","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1007\/s00165-021-00553-4","volume":"33","author":"HD Tran","year":"2021","unstructured":"Tran, H.D.: Verification of piecewise deep neural networks: a star set approach with zonotope pre-filter. Form. Asp. Comput. 33(4\u20135), 519\u2013545 (2021). https:\/\/doi.org\/10.1007\/s00165-021-00553-4","journal-title":"Form. Asp. Comput."},{"key":"15_CR21","doi-asserted-by":"publisher","unstructured":"Tran, H.-D., et al.: Robustness verification of semantic segmentation neural networks using relaxed reachability. In: Silva, A., Leino, K.R.M. (eds.) CAV 2021. LNCS, vol. 12759, pp. 263\u2013286. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-81685-8_12","DOI":"10.1007\/978-3-030-81685-8_12"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Tran, H.D., et al.: NNV: The neural network verification tool for deep neural networks and learning-enabled cyber-physical systems. In: 32nd International Conference on Computer-Aided Verification (CAV) (2020)","DOI":"10.1007\/978-3-030-53288-8_1"},{"key":"15_CR23","doi-asserted-by":"publisher","unstructured":"Tumlin, A.M., et al.: The neural network verification tool for certifying fairness. In: Proceedings of the 5th ACM International Conference on AI in Finance, pp. 36\u201344. ICAIF \u201924, Association for Computing Machinery, New York, NY, USA (2024). https:\/\/doi.org\/10.1145\/3677052.3698677","DOI":"10.1145\/3677052.3698677"}],"container-title":["Lecture Notes in Computer Science","AI Verification"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-99991-8_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T05:36:28Z","timestamp":1761543388000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-99991-8_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,28]]},"ISBN":["9783031999901","9783031999918"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-99991-8_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,28]]},"assertion":[{"value":"28 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAIV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on AI Verification","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zagreb","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Croatia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"saiv2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.aiverification.org\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}