{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T21:08:34Z","timestamp":1725916114911},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319703886"},{"type":"electronic","value":"9783319703893"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-70389-3_19","type":"book-chapter","created":{"date-parts":[[2017,11,11]],"date-time":"2017-11-11T09:42:30Z","timestamp":1510393350000},"page":"237-240","source":"Crossref","is-referenced-by-count":0,"title":["More Adaptive Does not Imply Less Safe (with Formal Verification)"],"prefix":"10.1007","author":[{"given":"Luca","family":"Pulina","sequence":"first","affiliation":[]},{"given":"Armando","family":"Tacchella","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,12]]},"reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Lee, E.A.: Cyber physical systems: design challenges. In: 11th IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2008), May 5\u20137, 2008, Orlando, Florida, USA, pp. 363\u2013369 (2008)","DOI":"10.1109\/ISORC.2008.25"},{"issue":"2","key":"19_CR2","doi-asserted-by":"crossref","first-page":"117","DOI":"10.3233\/AIC-2012-0525","volume":"25","author":"L Pulina","year":"2012","unstructured":"Pulina, L., Tacchella, A.: Challenging SMT solvers to verify neural networks. AI Commun. 25(2), 117\u2013135 (2012)","journal-title":"AI Commun."},{"issue":"3\u20134","key":"19_CR3","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1007\/s10472-011-9243-0","volume":"62","author":"L Pulina","year":"2011","unstructured":"Pulina, L., Tacchella, A.: NeVer: a tool for artificial neural networks verification. Ann. Math. Artif. Intell. 62(3\u20134), 403\u2013425 (2011)","journal-title":"Ann. Math. Artif. Intell."},{"key":"19_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/978-3-642-14295-6_24","volume-title":"Computer Aided Verification","author":"L Pulina","year":"2010","unstructured":"Pulina, L., Tacchella, A.: An abstraction-refinement approach to verification of artificial neural networks. In: Touili, T., Cook, B., Jackson, P. (eds.) CAV 2010. LNCS, vol. 6174, pp. 243\u2013257. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14295-6_24"},{"key":"19_CR5","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1007\/978-3-319-49130-1_39","volume-title":"AI*IA 2016 Advances in Artificial Intelligence","author":"F Leofante","year":"2016","unstructured":"Leofante, F., Tacchella, A.: Learning in physical domains: mating safety requirements and costly sampling. In: Adorni, G., Cagnoni, S., Gori, M., Maratea, M. (eds.) AI*IA 2016. LNCS (LNAI), vol. 10037, pp. 539\u2013552. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-49130-1_39"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Metta, G., Natale, L., Pathak, S., Pulina, L., Tacchella, A.: Safe and effective learning: a case study. In: IEEE International Conference on Robotics and Automation, ICRA 2010, May 3\u20137, 2010, Anchorage, Alaska, USA, pp. 4809\u20134814 (2010)","DOI":"10.1109\/ROBOT.2010.5509892"},{"issue":"2","key":"19_CR7","doi-asserted-by":"crossref","first-page":"287","DOI":"10.3233\/AIC-150689","volume":"29","author":"S Pathak","year":"2016","unstructured":"Pathak, S., Pulina, L., Tacchella, A.: Evaluating probabilistic model checking tools for verification of robot control policies. AI Commun. 29(2), 287\u2013299 (2016)","journal-title":"AI Commun."},{"key":"19_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"496","DOI":"10.1007\/978-3-319-47166-2_34","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques","author":"F Leofante","year":"2016","unstructured":"Leofante, F., Vuotto, S., \u00c1brah\u00e1m, E., Tacchella, A., Jansen, N.: Combining static and runtime methods to achieve safe standing-up for humanoid robots. In: Margaria, T., Steffen, B. (eds.) ISoLA 2016. LNCS, vol. 9952, pp. 496\u2013514. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-47166-2_34"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Pathak, S., Pulina, L., Metta, G., Tacchella, A.: Ensuring safety of policies learned by reinforcement: reaching objects in the presence of obstacles with the iCub. In: 2013 IEEE\/RSJ International Conference on Intelligent Robots and Systems, November 3\u20137, 2013, Tokyo, Japan, pp. 170\u2013175 (2013)","DOI":"10.1109\/IROS.2013.6696349"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Pathak, S., Pulina, L., Tacchella, A.: Verification and Repair of Control Policies for Safe Reinforcement Learning. Applied Intelligence (2017, to appear)","DOI":"10.1007\/s10489-017-0999-8"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Huang, X., Kwiatkowska, M., Wang, S., Wu, M.: Safety verification of deep neural networks. arXiv preprint arXiv:1610.06940 (2016). To appear as invited paper at CAV 2017","DOI":"10.1007\/978-3-319-63387-9_1"},{"key":"19_CR12","unstructured":"Katz, G., Barrett, C., Dill, D., Julian, K., Kochenderfer, M.: Reluplex: An efficient smt solver for verifying deep neural networks. arXiv preprint arXiv:1702.01135 (2017). To appear in the proc. of CAV 2017"},{"issue":"3","key":"19_CR13","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1007\/s10703-006-0031-0","volume":"30","author":"M Fr\u00e4nzle","year":"2007","unstructured":"Fr\u00e4nzle, M., Herde, C.: Hysat: An efficient proof engine for bounded model checking of hybrid systems. Formal Methods in System Design 30(3), 179\u2013198 (2007)","journal-title":"Formal Methods in System Design"}],"container-title":["Lecture Notes in Computer Science","Hardware and Software: Verification and Testing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-70389-3_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T13:45:31Z","timestamp":1603287931000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-70389-3_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319703886","9783319703893"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-70389-3_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}