{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T06:45:20Z","timestamp":1773384320977,"version":"3.50.1"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319681665","type":"print"},{"value":"9783319681672","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-68167-2_18","type":"book-chapter","created":{"date-parts":[[2017,9,26]],"date-time":"2017-09-26T03:50:53Z","timestamp":1506397853000},"page":"251-268","source":"Crossref","is-referenced-by-count":127,"title":["Maximum Resilience of Artificial Neural Networks"],"prefix":"10.1007","author":[{"given":"Chih-Hong","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Georg","family":"N\u00fchrenberg","sequence":"additional","affiliation":[]},{"given":"Harald","family":"Ruess","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,27]]},"reference":[{"key":"18_CR1","volume-title":"Learning from Data","author":"YS Abu-Mostafa","year":"2012","unstructured":"Abu-Mostafa, Y.S., Magdon-Ismail, M., Lin, H.-T.: Learning from Data, vol. 4. AMLBook, New York (2012)"},{"key":"18_CR2","unstructured":"Amodei, D., Olah, C., Steinhardt, J., Christiano, P., Schulman, J., Man\u00e9, D.: Concrete problems in Ai safety. arXiv preprint arXiv:1606.06565 (2016)"},{"key":"18_CR3","unstructured":"Bastani, O., Ioannou, Y., Lampropoulos, L., Vytiniotis, D., Nori, A., Criminisi, A.: Measuring neural net robustness with constraints. CoRR, abs\/1605.07262 (2016)"},{"key":"18_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/978-3-662-46681-0_14","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"N Bj\u00f8rner","year":"2015","unstructured":"Bj\u00f8rner, N., Phan, A.-D., Fleckenstein, L.: vZ-an optimizing SMT solver. In: Baier, C., Tinelli, C. (eds.) TACAS 2015. LNCS, vol. 9035, pp. 194\u2013199. Springer, Heidelberg (2015). doi: 10.1007\/978-3-662-46681-0_14"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Bhattacharyya, S., Cofer, D., Musliner, D., Mueller, J., Engstrom, E.: Certification considerations for adaptive systems. In ICUAS, pp. 270\u2013279. IEEE (2015)","DOI":"10.1109\/ICUAS.2015.7152300"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Cousot, P., Cousot, R.: Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In POPL, pp. 238\u2013252. ACM (1977)","DOI":"10.1145\/512950.512973"},{"key":"18_CR7","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)"},{"issue":"3","key":"18_CR8","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1023\/A:1021039126272","volume":"3","author":"IE Grossmann","year":"2002","unstructured":"Grossmann, I.E.: Review of nonlinear mixed-integer and disjunctive programming techniques. Optim. Eng. 3(3), 227\u2013252 (2002)","journal-title":"Optim. Eng."},{"key":"18_CR9","unstructured":"Huang, X., Kwiatkowska, M., Wang, S., Wu, M.: Safety verification of deep neural networks. CoRR, abs\/1610.06940 (2016)"},{"key":"18_CR10","unstructured":"Karpathy, A.: ConvNetJS: deep learning in your browser (2014). URL http:\/\/cs.stanford.edu\/people\/karpathy\/convnetjs"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Katz, G., Barrett, C.W., Dill, D.L., Julian, K., Kochenderfer, M.J.: Reluplex: an efficient SMT solver for verifying deep neural networks. CoRR, abs\/1702.01135 (2017)","DOI":"10.1007\/978-3-319-63387-9_5"},{"key":"18_CR12","unstructured":"Kurakin, A., Goodfellow, I., Bengio, S.: Adversarial examples in the physical world. arXiv preprint arXiv:1607.02533 (2016)"},{"key":"18_CR13","unstructured":"LeCun, Y., Cortes, C., Burges, C.J.: The MNIST database of handwritten digits (1998)"},{"key":"18_CR14","unstructured":"Mnih, V., Kavukcuoglu, K., Silver, D., Graves, A., Antonoglou, I., Wierstra, D., Riedmiller, M.: Playing atari with deep reinforcement learning. arXiv preprint arXiv:1312.5602 (2013)"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Nguyen, A., Yosinski, J., Clune, J.: Deep neural networks are easily fooled: high confidence predictions for unrecognizable images. In CPVR, pp. 427\u2013436 (2015)","DOI":"10.1109\/CVPR.2015.7298640"},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P., Goodfellow, I., Jha, S., Celik, Z.B., Swami, A.: Practical black-box attacks against deep learning systems using adversarial examples. arXiv preprint arXiv:1602.02697 (2016)","DOI":"10.1145\/3052973.3053009"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P., Wu, X., Jha, S., Swami, A.: Distillation as a defense to adversarial perturbations against deep neural networks. In: Oakland, pp. 582\u2013597. IEEE (2016)","DOI":"10.1109\/SP.2016.41"},{"key":"18_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/978-3-642-14295-6_24","volume-title":"Computer Aided Verification","author":"L Pulina","year":"2010","unstructured":"Pulina, L., Tacchella, A.: An abstraction-refinement approach to verification of artificial neural networks. In: Touili, T., Cook, B., Jackson, P. (eds.) CAV 2010. LNCS, vol. 6174, pp. 243\u2013257. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-14295-6_24"},{"issue":"2","key":"18_CR19","doi-asserted-by":"crossref","first-page":"117","DOI":"10.3233\/AIC-2012-0525","volume":"25","author":"L Pulina","year":"2012","unstructured":"Pulina, L., Tacchella, A.: Challenging SMT solvers to verify neural networks. AI Commun. 25(2), 117\u2013135 (2012)","journal-title":"AI Commun."},{"issue":"3","key":"18_CR20","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1109\/MSP.2006.1628884","volume":"23","author":"S Rajan","year":"2006","unstructured":"Rajan, S., Wang, S., Inkol, R., Joyal, A.: Efficient approximations for the arctangent function. IEEE Signal Process. Mag. 23(3), 108\u2013111 (2006)","journal-title":"IEEE Signal Process. Mag."},{"key":"18_CR21","unstructured":"Scheibler, K., Winterer, L., Wimmer, R., Becker, B.: Towards verification of artificial neural networks. In: MBMV, pp. 30\u201340 (2015)"},{"key":"18_CR22","doi-asserted-by":"crossref","unstructured":"Ukil, A., Shah, V.H., Deck, B.: Fast computation of arctangent functions for embedded applications: a comparative analysis. In ISIE, pp. 1206\u20131211. IEEE (2011)","DOI":"10.1109\/ISIE.2011.5984330"},{"issue":"3","key":"18_CR23","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1287\/ijoc.1090.0347","volume":"21","author":"Y Xu","year":"2009","unstructured":"Xu, Y., Ralphs, T.K., Lad\u00e1nyi, L., Saltzman, M.J.: Computational experience with a software framework for parallel integer programming. INFORMS J. Comput. 21(3), 383\u2013397 (2009)","journal-title":"INFORMS J. Comput."}],"container-title":["Lecture Notes in Computer Science","Automated Technology for Verification and Analysis"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68167-2_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,18]],"date-time":"2020-10-18T07:16:51Z","timestamp":1603005411000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-68167-2_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319681665","9783319681672"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68167-2_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}