{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T19:10:51Z","timestamp":1763665851456,"version":"3.45.0"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783032090867"},{"type":"electronic","value":"9783032090874"}],"license":[{"start":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T00:00:00Z","timestamp":1763683200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T00:00:00Z","timestamp":1763683200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-09087-4_12","type":"book-chapter","created":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T18:21:32Z","timestamp":1763662892000},"page":"181-194","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Leveraging Inductive Logic Programming and\u00a0Deep Learning for\u00a0Trustworthy Vision"],"prefix":"10.1007","author":[{"given":"Zahra","family":"Chaghazardi","sequence":"first","affiliation":[]},{"given":"Saber","family":"Fallah","sequence":"additional","affiliation":[]},{"given":"Alireza","family":"Tamaddoni-Nezhad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,21]]},"reference":[{"key":"12_CR1","first-page":"29944","volume":"35","author":"K Ahmed","year":"2022","unstructured":"Ahmed, K., Teso, S., Chang, K.W., Van den Broeck, G., Vergari, A.: Semantic probabilistic layers for neuro-symbolic learning. Adv. Neural. Inf. Process. Syst. 35, 29944\u201329959 (2022)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"12_CR2","series-title":"Studies in Computational Intelligence","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/978-3-031-44127-1_13","volume-title":"Cutting Edge Applications of Computational Intelligence Tools and Techniques","author":"KD Apostolidis","year":"2023","unstructured":"Apostolidis, K.D., Gkouvrikos, E.V., Vrochidou, E., Papakostas, G.A.: Traffic sign recognition robustness in autonomous vehicles under physical adversarial attacks. In: Daimi, K., Alsadoon, A., Coelho, L. (eds.) Cutting Edge Applications of Computational Intelligence Tools and Techniques. Studies in Computational Intelligence, vol. 1118, pp. 287\u2013304. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-44127-1_13"},{"unstructured":"Ashwin Srinivasan: The aleph manual (2001). https:\/\/www.cs.ox.ac.uk\/activities\/programinduction\/Aleph\/aleph.html","key":"12_CR3"},{"doi-asserted-by":"publisher","unstructured":"Chaghazardi, Z., Fallah, S., Tamaddoni-Nezhad, A.: Explainable and trustworthy traffic sign detection for safe autonomous driving: an inductive logic programming approach. In: Proceedings of the 39th International Conference on Logic Programming. Electronic Proceedings in Theoretical Computer Science, vol.\u00a0385, pp. 201\u2013212. Open Publishing Association, Imperial College London, UK (2023). https:\/\/doi.org\/10.4204\/EPTCS.385.21","key":"12_CR4","DOI":"10.4204\/EPTCS.385.21"},{"unstructured":"Chaghazardi, Z., Fallah, S., Tamaddoni-Nezhad, A.: A logic-based compositional generalisation approach for robust traffic sign detection. In: International Joint Conference on Artificial Intelligence 2023 Workshop on Knowledge-Based Compositional Generalization (2023). https:\/\/openreview.net\/forum?id=jfU2Xv84_O","key":"12_CR5"},{"doi-asserted-by":"crossref","unstructured":"Chaghazardi, Z., Fallah, S., Tamaddoni-Nezhad, A.: Trustworthy vision for autonomous vehicles: a robust logic-infused deep learning approach. In: 2024 IEEE 27th International Conference on Intelligent Transportation Systems (ITSC), pp. 2869\u20132874. IEEE (2024)","key":"12_CR6","DOI":"10.1109\/ITSC58415.2024.10919652"},{"issue":"1","key":"12_CR7","doi-asserted-by":"publisher","first-page":"1040","DOI":"10.1038\/s41598-021-04590-0","volume":"12","author":"T Dash","year":"2022","unstructured":"Dash, T., Chitlangia, S., Ahuja, A., Srinivasan, A.: A review of some techniques for inclusion of domain-knowledge into deep neural networks. Sci. Rep. 12(1), 1040 (2022)","journal-title":"Sci. Rep."},{"doi-asserted-by":"crossref","unstructured":"Eykholt, K., et al.: Robust physical-world attacks on deep learning visual classification. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1625\u20131634 (2018)","key":"12_CR8","DOI":"10.1109\/CVPR.2018.00175"},{"unstructured":"Fischer, M., Balunovic, M., Drachsler-Cohen, D., Gehr, T., Zhang, C., Vechev, M.: DL2: training and querying neural networks with logic. In: International Conference on Machine Learning, pp. 1931\u20131941. PMLR (2019)","key":"12_CR9"},{"key":"12_CR10","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1613\/jair.1.12850","volume":"72","author":"E Giunchiglia","year":"2021","unstructured":"Giunchiglia, E., Lukasiewicz, T.: Multi-label classification neural networks with hard logical constraints. J. Artif. Intell. Res. 72, 759\u2013818 (2021)","journal-title":"J. Artif. Intell. Res."},{"doi-asserted-by":"crossref","unstructured":"Giunchiglia, E., Stoian, M.C., Khan, S., Cuzzolin, F., Lukasiewicz, T.: ROAD-R: the autonomous driving dataset with logical requirements. Mach. Learn. 1\u201331 (2023)","key":"12_CR11","DOI":"10.1007\/s10994-023-06322-z"},{"doi-asserted-by":"crossref","unstructured":"Giunchiglia, E., Stoian, M.C., Lukasiewicz, T.: Deep learning with logical constraints. arXiv preprint arXiv:2205.00523 (2022)","key":"12_CR12","DOI":"10.24963\/ijcai.2022\/767"},{"unstructured":"Gui, J., Sun, Z., Wen, Y., Tao, D., Ye, J.: A review on generative adversarial networks: algorithms, theory, and applications. IEEE Trans. Knowl. Data Eng. (2021)","key":"12_CR13"},{"doi-asserted-by":"crossref","unstructured":"Hoernle, N., Karampatsis, R.M., Belle, V., Gal, K.: MultiplexNet: towards fully satisfied logical constraints in neural networks. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a036, pp. 5700\u20135709 (2022)","key":"12_CR14","DOI":"10.1609\/aaai.v36i5.20512"},{"key":"12_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1007\/3-540-63494-0_65","volume-title":"Inductive Logic Programming","author":"S Muggleton","year":"1997","unstructured":"Muggleton, S.: Learning from positive data. In: Muggleton, S. (ed.) ILP 1996. LNCS, vol. 1314, pp. 358\u2013376. Springer, Heidelberg (1997). https:\/\/doi.org\/10.1007\/3-540-63494-0_65"},{"unstructured":"Sitawarin, C., Bhagoji, A.N., Mosenia, A., Chiang, M., Mittal, P.: DARTS: deceiving autonomous cars with toxic signs. arXiv preprint arXiv:1802.06430 (2018)","key":"12_CR16"},{"doi-asserted-by":"crossref","unstructured":"Stallkamp, J., Schlipsing, M., Salmen, J., Igel, C.: Man vs. computer: benchmarking machine learning algorithms for traffic sign recognition. Neural Netw. 32, 323\u2013332 (2012)","key":"12_CR17","DOI":"10.1016\/j.neunet.2012.02.016"},{"unstructured":"Yadav, V.: German sign classification using deep learning neural networks (2016). https:\/\/github.com\/vxy10\/p2-TrafficSigns","key":"12_CR18"},{"doi-asserted-by":"crossref","unstructured":"Wang, W., Pan, S.J.: Integrating deep learning with logic fusion for information extraction. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a034, pp. 9225\u20139232 (2020)","key":"12_CR19","DOI":"10.1609\/aaai.v34i05.6460"},{"unstructured":"Xie, Y., Xu, Z., Kankanhalli, M.S., Meel, K.S., Soh, H.: Embedding symbolic knowledge into deep networks. Adv. Neural Inf. Process. Syst. 32 (2019)","key":"12_CR20"},{"unstructured":"Xu, J., Zhang, Z., Friedman, T., Liang, Y., Broeck, G.: A semantic loss function for deep learning with symbolic knowledge. In: International Conference on Machine Learning, pp. 5502\u20135511. PMLR (2018)","key":"12_CR21"},{"doi-asserted-by":"crossref","unstructured":"Zhong, Y., Liu, X., Zhai, D., Jiang, J., Ji, X.: Shadows can be dangerous: stealthy and effective physical-world adversarial attack by natural phenomenon. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 15345\u201315354 (2022)","key":"12_CR22","DOI":"10.1109\/CVPR52688.2022.01491"}],"container-title":["Lecture Notes in Computer Science","Learning and Reasoning"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-09087-4_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T19:03:28Z","timestamp":1763665408000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-09087-4_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,21]]},"ISBN":["9783032090867","9783032090874"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-09087-4_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,11,21]]},"assertion":[{"value":"21 November 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ILP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Joint Conference on Learning and Reasoning","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"33","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ilp2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.lamda.nju.edu.cn\/ijclr24\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}