{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T04:04:30Z","timestamp":1750737870506,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":30,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819665815","type":"print"},{"value":"9789819665822","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-6582-2_17","type":"book-chapter","created":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T14:41:09Z","timestamp":1750689669000},"page":"241-256","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Enhanced MILP-Based Verifier for\u00a0Adversary Robustness of\u00a0Neural Networks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-0605-2542","authenticated-orcid":false,"given":"Shaocong","family":"Han","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2309-9739","authenticated-orcid":false,"given":"Jingwei","family":"Ge","sequence":"additional","affiliation":[]},{"given":"Yuchen","family":"Shi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5526-866X","authenticated-orcid":false,"given":"Yi","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,24]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Bak, S.: nnenum: verification of relu neural networks with optimized abstraction refinement. In: NASA Formal Methods Symposium, pp. 19\u201336. Springer (2021)","DOI":"10.1007\/978-3-030-76384-8_2"},{"key":"17_CR2","unstructured":"Balunovic, M., Baader, M., Singh, G., Gehr, T., Vechev, M.: Certifying geometric robustness of neural networks. In: Advances in Neural Information Processing Systems. vol.\u00a032, pp. 15313\u201315323 (2019)"},{"issue":"1","key":"17_CR3","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1137\/141000671","volume":"59","author":"J Bezanson","year":"2017","unstructured":"Bezanson, J., Edelman, A., Karpinski, S., Shah, V.B.: Julia: a fresh approach to numerical computing. SIAM Rev. 59(1), 65\u201398 (2017)","journal-title":"SIAM Rev."},{"issue":"42","key":"17_CR4","first-page":"1","volume":"21","author":"R Bunel","year":"2020","unstructured":"Bunel, R., Lu, J., Turkaslan, I., Torr, P.H., Kohli, P., Kumar, M.P.: Branch and bound for piecewise linear neural network verification. J. Mach. Learn. Res. 21(42), 1\u201339 (2020)","journal-title":"J. Mach. Learn. Res."},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Ciregan, D., Meier, U., Schmidhuber, J.: Multi-column deep neural networks for image classification. In: 2012 IEEE Conference on Computer Vision and Pattern Recognition, pp. 3642\u20133649 (2012)","DOI":"10.1109\/CVPR.2012.6248110"},{"key":"17_CR6","unstructured":"Der-San\u00a0Chen, R.G.B., Dang, Y.: Applied Integer Programming, chap.\u00a01, p. 3\u201320. John Wiley & Sons, Ltd (Dec 2010)"},{"key":"17_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/978-3-319-68167-2_19","volume-title":"Automated Technology for Verification and Analysis","author":"R Ehlers","year":"2017","unstructured":"Ehlers, R.: Formal verification of piece-wise linear feed-forward neural networks. In: D\u2019Souza, D., Narayan Kumar, K. (eds.) ATVA 2017. LNCS, vol. 10482, pp. 269\u2013286. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-68167-2_19"},{"issue":"3","key":"17_CR8","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1007\/s10994-017-5663-3","volume":"107","author":"A Fawzi","year":"2018","unstructured":"Fawzi, A., Fawzi, O., Frossard, P.: Analysis of classifiers\u2019 robustness to adversarial perturbations. Mach. Learn. 107(3), 481\u2013508 (2018)","journal-title":"Mach. Learn."},{"key":"17_CR9","unstructured":"Ferrari, C., Mueller, M.N., Jovanovi\u0107, N., Vechev, M.: Complete verification via multi-neuron relaxation guided branch-and-bound. In: International Conference on Learning Representations (2022)"},{"key":"17_CR10","unstructured":"Gowal, S., et al.: On the effectiveness of interval bound propagation for training verifiably robust models. arXiv preprint arXiv:1810.12715 (2018)"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Han, S., Zhang, Y.: Enhancing branch and bound for robustness verification of neural networks via an effective branching strategy. In: SETTA 2023, vol. 14464.\u00a0LNCS, pp. 38\u201354 (2023)","DOI":"10.1007\/978-981-99-8664-4_3"},{"key":"17_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cpet.2021.09.007","volume":"17","author":"N Hasani","year":"2022","unstructured":"Hasani, N., Morris, M., Rhamim, A., Summers, R., Jones, E., Siegel, E., Saboury, B.: Trustworthy artificial intelligence in medical imaging. PET Clinics 17, 1\u201312 (2022)","journal-title":"PET Clinics"},{"key":"17_CR13","unstructured":"Jaeckle, F., Lu, J., Pawan Kumar, M.: Neural Network Branch-and-Bound for Neural Network Verification. arXiv e-prints arXiv:2107.12855 (2021)"},{"key":"17_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-319-63387-9_5","volume-title":"Computer Aided Verification","author":"G Katz","year":"2017","unstructured":"Katz, G., Barrett, C., Dill, D.L., Julian, K., Kochenderfer, M.J.: Reluplex: an efficient SMT solver for verifying deep neural networks. In: Majumdar, R., Kun\u010dak, V. (eds.) CAV 2017. LNCS, vol. 10426, pp. 97\u2013117. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-63387-9_5"},{"key":"17_CR15","unstructured":"Krizhevsky, A.: Learning multiple layers of features from tiny images (2009)"},{"key":"17_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-63882-5_1","volume-title":"Formal Methods: Foundations and Applications","author":"M Leucker","year":"2020","unstructured":"Leucker, M.: Formal verification of neural networks? In: Carvalho, G., Stolz, V. (eds.) SBMF 2020. LNCS, vol. 12475, pp. 3\u20137. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-63882-5_1"},{"key":"17_CR17","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. In: International Conference on Learning Representations (2018)"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Meng, M.H., Bai, G., Teo, S.G., Hou, Z., Xiao, Y., Lin, Y., Dong, J.S.: Adversarial robustness of deep neural networks: A survey from a formal verification perspective. IEEE Trans. Dependable Secure Comput., 1 (2022)","DOI":"10.1109\/TDSC.2022.3179131"},{"key":"17_CR19","unstructured":"Raghunathan, A., Steinhardt, J., Liang, P.: Semidefinite relaxations for certifying robustness to adversarial examples. In: Advances in Neural Information Processing Systems, vol.\u00a031, p. 10900\u201310910 (2018)"},{"key":"17_CR20","unstructured":"Singh, G., Ganvir, R., P\u00fcschel, M., Vechev, M.: Beyond the single neuron convex barrier for neural network certification. In: Advances in Neural Information Processing Systems, vol.\u00a032, pp. 15098\u201315109 (2019)"},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"Singh, G., Gehr, T., P\u00fcschel, M., Vechev, M.: An abstract domain for certifying neural networks. Proceedings of the ACM on Programming Languages 3(POPL), 1\u201330 (2019)","DOI":"10.1145\/3290354"},{"key":"17_CR22","unstructured":"Tjeng, V., Xiao, K.Y., Tedrake, R.: Evaluating robustness of neural networks with mixed integer programming. In: 7th International Conference on Learning Representations, ICLR 2019, New Orleans, LA, USA, May 6-9, 2019 (2019)"},{"key":"17_CR23","unstructured":"Wang, S., et al.: Beta-crown: efficient bound propagation with per-neuron split constraints for neural network robustness verification. In: Advances in Neural Information Processing Systems, vol.\u00a034, pp. 29909\u201329921 (2021)"},{"issue":"4","key":"17_CR24","doi-asserted-by":"publisher","first-page":"1947","DOI":"10.1109\/TITS.2021.3067396","volume":"22","author":"C Wen","year":"2021","unstructured":"Wen, C., Habib, A.F., Li, J., Toth, C.K., Wang, C., Fan, H.: Special issue on 3d sensing in intelligent transportation. IEEE Trans. Intell. Transp. Syst. 22(4), 1947\u20131949 (2021)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"17_CR25","unstructured":"Weng, T., et al.: Towards fast computation of certified robustness for relu networks. In: Proceedings of the 35th International Conference on Machine Learning, pp. 5273\u20135282 (2018)"},{"key":"17_CR26","unstructured":"Wong, E., Kolter, J.Z.: Provable defenses against adversarial examples via the convex outer adversarial polytope. In: Proceedings of the 35th International Conference on Machine Learning, pp. 5283\u20135292 (2018)"},{"key":"17_CR27","unstructured":"Xu, K., et al.: Automatic perturbation analysis for scalable certified robustness and beyond. In: Advances in Neural Information Processing Systems, vol.\u00a033, pp. 1129\u20131141 (2020)"},{"key":"17_CR28","unstructured":"Zhang, H., Weng, T.W., Chen, P.Y., Hsieh, C.J., Daniel, L.: Efficient neural network robustness certification with general activation functions. In: Advances in Neural Information Processing Systems, vol.\u00a031, p. 4944\u20134953 (2018)"},{"key":"17_CR29","doi-asserted-by":"crossref","unstructured":"Zhang, H., Zhang, P., Hsieh, C.J.: Recurjac: an efficient recursive algorithm for bounding jacobian matrix of neural networks and its applications. Proceedings of the AAAI Conference on Artificial Intelligence 33(01), pp. 5757\u20135764 (2019)","DOI":"10.1609\/aaai.v33i01.33015757"},{"issue":"5","key":"17_CR30","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MIS.2015.69","volume":"30","author":"J Zhang","year":"2015","unstructured":"Zhang, J., Zong, C.: Deep neural networks in machine translation: an overview. IEEE Intell. Syst. 30(5), 16\u201325 (2015)","journal-title":"IEEE Intell. Syst."}],"container-title":["Lecture Notes in Computer Science","Neural Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-6582-2_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T14:41:17Z","timestamp":1750689677000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-6582-2_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819665815","9789819665822"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-6582-2_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"24 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICONIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Neural Information Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Auckland","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New Zealand","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iconip2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iconip2024.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}