{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T15:09:09Z","timestamp":1774883349876,"version":"3.50.1"},"reference-count":89,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T00:00:00Z","timestamp":1770422400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T00:00:00Z","timestamp":1770422400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100010785","name":"Canada First Research Excellence Fund","doi-asserted-by":"publisher","award":["NSERC No.RGPIN-2021-02549"],"award-info":[{"award-number":["NSERC No.RGPIN-2021-02549"]}],"id":[{"id":"10.13039\/501100010785","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Canada CIFAR AI Chairs Program","award":["No.RGPAS-2021-00034"],"award-info":[{"award-number":["No.RGPAS-2021-00034"]}]},{"DOI":"10.13039\/501100000038","name":"the Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"crossref","award":["No.DGECR-2021-00019"],"award-info":[{"award-number":["No.DGECR-2021-00019"]}],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"crossref"}]},{"name":"JSPS KAKENHI Grant","award":["No.JP20H04168"],"award-info":[{"award-number":["No.JP20H04168"]}]},{"name":"JSPS KAKENHI Grant","award":["No.JP21H04877"],"award-info":[{"award-number":["No.JP21H04877"]}]},{"DOI":"10.13039\/501100020959","name":"JST-Mirai Program","doi-asserted-by":"publisher","award":["No.JPMJMI20B8"],"award-info":[{"award-number":["No.JPMJMI20B8"]}],"id":[{"id":"10.13039\/501100020959","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2026,5]]},"DOI":"10.1007\/s10664-025-10778-z","type":"journal-article","created":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T11:02:19Z","timestamp":1770462139000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Mosaic: model-based safety analysis for AI-enabled cyber physical system"],"prefix":"10.1007","volume":"31","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3981-8515","authenticated-orcid":false,"given":"Xuan","family":"Xie","sequence":"first","affiliation":[]},{"given":"Jiayang","family":"Song","sequence":"additional","affiliation":[]},{"given":"Zhehua","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Fuyuan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,7]]},"reference":[{"key":"10778_CR1","doi-asserted-by":"crossref","unstructured":"Abdessalem RB, Nejati S, Briand LC, Stifter T (2018) Testing vision-based control systems using learnable evolutionary algorithms. In: Proceedings of the 40th international conference on software engineering, pp 1016\u20131026","DOI":"10.1145\/3180155.3180160"},{"issue":"4","key":"10778_CR2","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1002\/wics.101","volume":"2","author":"H Abdi","year":"2010","unstructured":"Abdi H, Williams LJ (2010) Principal component analysis. Wiley interdisciplinary reviews computational statistics 2(4):433\u2013459","journal-title":"Wiley interdisciplinary reviews computational statistics"},{"key":"10778_CR3","doi-asserted-by":"crossref","unstructured":"Annpureddy Y, Liu C, Fainekos G, Sankaranarayanan S (2011) S-TaLiRo: A Tool for Temporal Logic Falsification for Hybrid Systems. In: Tools and algorithms for the construction and analysis of systems. Berlin, Heidelberg: Springer Berlin Heidelberg, pp 254\u2013257","DOI":"10.1007\/978-3-642-19835-9_21"},{"key":"10778_CR4","unstructured":"Arrieta A, Valle P, Ali S (2024) Search-based Automated Program Repair of CPS Controllers Modeled in Simulink-Stateflow. arXiv:2404.04688"},{"issue":"6","key":"10778_CR5","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MSP.2017.2743240","volume":"34","author":"K Arulkumaran","year":"2017","unstructured":"Arulkumaran K, Deisenroth MP, Brundage M, Bharath AA (2017) Deep reinforcement learning: A brief survey. IEEE Signal Process Mag 34(6):26\u201338","journal-title":"IEEE Signal Process Mag"},{"issue":"3","key":"10778_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3550271","volume":"32","author":"M Attaoui","year":"2023","unstructured":"Attaoui M, Fahmy H, Pastore F, Briand L (2023) Black-box safety analysis and retraining of DNNs based on feature extraction and clustering. ACM Trans Softw Eng Methodol 32(3):1\u201340","journal-title":"ACM Trans Softw Eng Methodol"},{"issue":"1998","key":"10778_CR7","first-page":"1","volume":"18","author":"S Balakrishnama","year":"1998","unstructured":"Balakrishnama S, Ganapathiraju A (1998) Linear discriminant analysis-a brief tutorial. Institute Signal Inf Process 18(1998):1\u20138","journal-title":"Institute Signal Inf Process"},{"issue":"1","key":"10778_CR8","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1109\/JPROC.2011.2165689","volume":"100","author":"A Banerjee","year":"2011","unstructured":"Banerjee A, Venkatasubramanian KK, Mukherjee T, Gupta SKS (2011) Ensuring safety, security, and sustainability of mission-critical cyber-physical systems. Proceed IEEE 100(1):283\u2013299","journal-title":"Proceed IEEE"},{"key":"10778_CR9","doi-asserted-by":"crossref","unstructured":"Bensalem S, Katsaros P, Ni\u010dkovi\u0107 D, Liao BHC, Nolasco RR, Ahmed MAES et\u00a0al (2023) Continuous engineering for trustworthy learning-enabled autonomous systems. In: International conference on bridging the gap between AI and reality. Springer, pp 256\u2013278","DOI":"10.1007\/978-3-031-46002-9_15"},{"issue":"1","key":"10778_CR10","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1214\/ss\/1177011077","volume":"8","author":"D Bertsimas","year":"1993","unstructured":"Bertsimas D, Tsitsiklis J (1993) Simulated annealing. Stat Sci 8(1):10\u201315","journal-title":"Stat Sci"},{"key":"10778_CR11","doi-asserted-by":"crossref","unstructured":"Biagiola M, Tonella P (2024) Boundary state generation for testing and improvement of autonomous driving systems. IEEE Trans Softw Eng","DOI":"10.1109\/TSE.2024.3420816"},{"key":"10778_CR12","doi-asserted-by":"crossref","unstructured":"Bohrer B, Tan YK, Mitsch S, Myreen MO, Platzer A (2018) VeriPhy: verified controller executables from verified cyber-physical system models. In: Proceedings of the 39th ACM SIGPLAN conference on programming language design and implementation, pp 617\u2013630","DOI":"10.1145\/3192366.3192406"},{"key":"10778_CR13","unstructured":"Bojarski M, Del\u00a0Testa D, Dworakowski D, Firner B, Flepp B, Goyal P et\u00a0al (2016) End to end learning for self-driving cars. arXiv:1604.07316"},{"key":"10778_CR14","doi-asserted-by":"crossref","unstructured":"Cairoli F, Paoletti N, Bortolussi L (2023) Conformal quantitative predictive monitoring of stl requirements for stochastic processes. In: Proceedings of the 26th ACM international conference on hybrid systems: computation and control, pp 1\u201311","DOI":"10.1145\/3575870.3587113"},{"key":"10778_CR15","unstructured":"Camacho EF, Alba CB (2013) Model predictive control. Springer science & business media"},{"issue":"2","key":"10778_CR16","doi-asserted-by":"publisher","first-page":"2443","DOI":"10.1109\/LRA.2020.2972837","volume":"5","author":"K Chatzilygeroudis","year":"2020","unstructured":"Chatzilygeroudis K, Fichera B, Lauzana I, Bu F, Yao K, Khadivar F et al (2020) Benchmark for bimanual robotic manipulation of semi-deformable objects. IEEE Robot Automation Lett 5(2):2443\u20132450","journal-title":"IEEE Robot Automation Lett"},{"issue":"3","key":"10778_CR17","doi-asserted-by":"publisher","first-page":"680","DOI":"10.1109\/TSMCA.2009.2012436","volume":"39","author":"J Chen","year":"2009","unstructured":"Chen J, Xin B, Peng Z, Dou L, Zhang J (2009) Optimal contraction theorem for exploration-exploitation tradeoff in search and optimization. IEEE Trans Syst Man Cybernetics-Part A Syst Hum 39(3):680\u2013691","journal-title":"IEEE Trans Syst Man Cybernetics-Part A Syst Hum"},{"key":"10778_CR18","doi-asserted-by":"crossref","unstructured":"Ciesinski F, Gr\u00f6\u00dfer M (2004) On probabilistic computation tree logic. In: Validation of stochastic systems. Springer, pp 147\u2013188","DOI":"10.1007\/978-3-540-24611-4_5"},{"key":"10778_CR19","doi-asserted-by":"publisher","first-page":"2395","DOI":"10.1007\/s00170-020-06572-4","volume":"113","author":"B Dafflon","year":"2021","unstructured":"Dafflon B, Moalla N, Ouzrout Y (2021) The challenges, approaches, and used techniques of CPS for manufacturing in Industry 4.0: a literature review. Int J Adv Manufact Technol 113:2395\u20132412","journal-title":"Int J Adv Manufact Technol"},{"issue":"5s","key":"10778_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3126521","volume":"16","author":"J Deshmukh","year":"2017","unstructured":"Deshmukh J, Horvat M, Jin X, Majumdar R, Prabhu VS (2017) Testing cyber-physical systems through bayesian optimization. ACM Trans Embedded Comput Syst (TECS) 16(5s):1\u201318","journal-title":"ACM Trans Embedded Comput Syst (TECS)"},{"key":"10778_CR21","first-page":"167","volume":"10","author":"A Donz\u00e9","year":"2010","unstructured":"Donz\u00e9 A (2010) Breach, a toolbox for verification and parameter synthesis of hybrid systems. CAV Springer 10:167\u2013170","journal-title":"CAV Springer"},{"key":"10778_CR22","doi-asserted-by":"crossref","unstructured":"Donz\u00e9 A, Maler O (2010) Robust satisfaction of temporal logic over real-valued signals. In: International conference on formal modeling and analysis of timed systems. Springer, pp 92\u2013106","DOI":"10.1007\/978-3-642-15297-9_9"},{"issue":"4","key":"10778_CR23","doi-asserted-by":"publisher","first-page":"1031","DOI":"10.1007\/s10817-018-09509-5","volume":"63","author":"T Dreossi","year":"2019","unstructured":"Dreossi T, Donz\u00e9 A, Seshia SA (2019) Compositional falsification of cyber-physical systems with machine learning components. J Automated Reason 63(4):1031\u20131053","journal-title":"J Automated Reason"},{"key":"10778_CR24","doi-asserted-by":"crossref","unstructured":"Du X, Xie X, Li Y, Ma L, Liu Y, Zhao J (2019) Deepstellar: Model-based quantitative analysis of stateful deep learning systems. In: Proceedings of the 2019 27th ACM joint meeting on European software engineering conference and symposium on the foundations of software engineering pp 477\u2013487","DOI":"10.1145\/3338906.3338954"},{"key":"10778_CR25","volume-title":"An introduction to reliability and maintainability engineering","author":"CE Ebeling","year":"2019","unstructured":"Ebeling CE (2019) An introduction to reliability and maintainability engineering. Waveland Press"},{"issue":"2","key":"10778_CR26","first-page":"21","volume":"13","author":"S Elattar","year":"2008","unstructured":"Elattar S (2008) Automation and robotics in construction: opportunities and challenges. Emirates J Eng Res 13(2):21\u201326","journal-title":"Emirates J Eng Res"},{"key":"10778_CR27","unstructured":"Engine U (2018) Unreal engine. Retrieved from Unreal Engine: https:\/\/www.unrealenginecom\/en-US\/what-is-unreal-engine-4"},{"issue":"3","key":"10778_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3459605","volume":"31","author":"G Ernst","year":"2021","unstructured":"Ernst G, Sedwards S, Zhang Z, Hasuo I (2021) Falsification of hybrid systems using adaptive probabilistic search. ACM Trans Model Comput Simulation (TOMACS) 31(3):1\u201322","journal-title":"ACM Trans Model Comput Simulation (TOMACS)"},{"key":"10778_CR29","unstructured":"Ernst G, Arcaini P, Bennani I, Donze A, Fainekos G, Frehse G et\u00a0al (2020) Arch-comp 2020 category report: Falsification. EPiC Series Comput"},{"issue":"3","key":"10778_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3635709","volume":"33","author":"L Giamattei","year":"2024","unstructured":"Giamattei L, Guerriero A, Pietrantuono R, Russo S (2024) Causality-driven testing of autonomous driving systems. ACM Trans Softw Eng Methodol 33(3):1\u201335","journal-title":"ACM Trans Softw Eng Methodol"},{"issue":"1","key":"10778_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1162\/106365603321828970","volume":"11","author":"N Hansen","year":"2003","unstructured":"Hansen N, M\u00fcller SD, Koumoutsakos P (2003) Reducing the time complexity of the derandomized evolution strategy with covariance matrix adaptation (CMA-ES). Evolutionary Comput 11(1):1\u201318","journal-title":"Evolutionary Comput"},{"key":"10778_CR32","doi-asserted-by":"crossref","unstructured":"Hsu K, Majumdar R, Mallik K, Schmuck AK (2018) Lazy abstraction-based control for safety specifications. In: 2018 IEEE conference on decision and control (CDC). IEEE, pp 4902\u20134907","DOI":"10.1109\/CDC.2018.8619659"},{"key":"10778_CR33","doi-asserted-by":"crossref","unstructured":"Jin X, Deshmukh JV, Kapinski J, Ueda K, Butts K (2014) Powertrain control verification benchmark. In: HSCC, pp 253\u2013262","DOI":"10.1145\/2562059.2562140"},{"issue":"4","key":"10778_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3638246","volume":"33","author":"BA Jodat","year":"2024","unstructured":"Jodat BA, Chandar A, Nejati S, Sabetzadeh M (2024) Test generation strategies for building failure models and explaining spurious failures. ACM Trans Softw Eng Methodol 33(4):1\u201332","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"10778_CR35","unstructured":"Johnson TT, Lopez DM, Benet L, Forets M, Guadalupe S, Schilling C et\u00a0al (2021) ARCH-COMP21 Category Report: Artificial Intelligence and Neural Network Control Systems (AINNCS) for Continuous and Hybrid Systems Plants. In: ARCH@ ADHS, pp 90\u2013119"},{"key":"10778_CR36","doi-asserted-by":"publisher","DOI":"10.1007\/1-84628-148-2","volume-title":"PID control","author":"MA Johnson","year":"2005","unstructured":"Johnson MA, Moradi MH (2005) PID control. Springer"},{"issue":"3","key":"10778_CR37","doi-asserted-by":"publisher","first-page":"598","DOI":"10.2514\/1.G003724","volume":"42","author":"KD Julian","year":"2019","unstructured":"Julian KD, Kochenderfer MJ, Owen MP (2019) Deep neural network compression for aircraft collision avoidance systems. J Guidance Control Dyn 42(3):598\u2013608","journal-title":"J Guidance Control Dyn"},{"key":"10778_CR38","doi-asserted-by":"crossref","unstructured":"Junges S, Torfah H, Seshia SA (2021) Runtime monitors for markov decision processes. In: International conference on computer aided verification. Springer, pp 553\u2013576","DOI":"10.1007\/978-3-030-81688-9_26"},{"key":"10778_CR39","doi-asserted-by":"crossref","unstructured":"Khmelnitsky I, Neider D, Roy R, Xie X, Barbot B, Bollig B et\u00a0al (2021) Property-directed verification and robustness certification of recurrent neural networks. In: International symposium on automated technology for verification and analysis. Springer, pp 364\u2013380","DOI":"10.1007\/978-3-030-88885-5_24"},{"key":"10778_CR40","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511816239","volume-title":"Switching and finite automata theory","author":"Z Kohavi","year":"2009","unstructured":"Kohavi Z, Jha NK (2009) Switching and finite automata theory. Cambridge University Press"},{"key":"10778_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cobeha.2018.11.005","volume":"29","author":"G Konidaris","year":"2019","unstructured":"Konidaris G (2019) On the necessity of abstraction. Current Opinion Behavioral Sci 29:1\u20137","journal-title":"Current Opinion Behavioral Sci"},{"issue":"7","key":"10778_CR42","doi-asserted-by":"publisher","first-page":"1026","DOI":"10.1109\/5.871307","volume":"88","author":"XD Koutsoukos","year":"2000","unstructured":"Koutsoukos XD, Antsaklis PJ, Stiver JA, Lemmon MD (2000) Supervisory control of hybrid systems. Proceed IEEE 88(7):1026\u20131049","journal-title":"Proceed IEEE"},{"key":"10778_CR43","doi-asserted-by":"crossref","unstructured":"Kwiatkowska M, Norman G, Parker D (2011) PRISM 4.0: Verification of probabilistic real-time systems. In: International conference on computer aided verification. Springer, pp 585\u2013591","DOI":"10.1007\/978-3-642-22110-1_47"},{"issue":"1","key":"10778_CR44","first-page":"75","volume":"100","author":"I Lee","year":"2011","unstructured":"Lee I, Sokolsky O, Chen S, Hatcliff J, Jee E, Kim B et al (2011) Challenges and research directions in medical cyber-physical systems. Proceed IEEE 100(1):75\u201390","journal-title":"Proceed IEEE"},{"key":"10778_CR45","unstructured":"Li Y (2017) Deep reinforcement learning: An overview. arXiv:1701.07274"},{"issue":"3","key":"10778_CR46","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1049\/iet-cps.2018.5068","volume":"4","author":"X Lyu","year":"2019","unstructured":"Lyu X, Ding Y, Yang SH (2019) Safety and security risk assessment in cyber-physical systems. IET Cyber-Phys Syst Theory Appl 4(3):221\u2013232","journal-title":"IET Cyber-Phys Syst Theory Appl"},{"key":"10778_CR47","unstructured":"Mandlekar A, Xu D, Mart\u00edn-Mart\u00edn R, Zhu Y, Fei-Fei L, Savarese S (2020) Human-in-the-loop imitation learning using remote teleoperation. arXiv:2012.06733"},{"key":"10778_CR48","doi-asserted-by":"crossref","unstructured":"Mann HB, Whitney DR (1947) On a test of whether one of two random variables is stochastically larger than the other. Ann Math Stat pp 50\u201360","DOI":"10.1214\/aoms\/1177730491"},{"key":"10778_CR49","unstructured":"Matas J, James S, Davison AJ (2018) Sim-to-real reinforcement learning for deformable object manipulation. In: Conference on robot learning. PMLR, pp 734\u2013743"},{"key":"10778_CR50","unstructured":"Mathworks (2018) Nonlinear Model Predictive Control of an Exothermic Chemical Reactor. Available from: https:\/\/www.mathworks.com\/help\/mpc\/ug\/nonlinear-model-predictive-control-of-exothermic-chemical-reactor.html"},{"key":"10778_CR51","unstructured":"Mathworks (2021) Adaptive Cruise Control System Using Model Predictive Control. Available from: https:\/\/www.mathworks.com\/help\/mpc\/ug\/adaptive-cruise-control-using-model-predictive-controller.html"},{"key":"10778_CR52","unstructured":"Mathworks (2021) Adaptive Cruise Control System Using Model Predictive Control. Available from: https:\/\/www.mathworks.com\/help\/slcontrol\/gs\/watertank-simulink-model.html"},{"key":"10778_CR53","unstructured":"Mathworks (2025) Highway Lane Following. Available from: https:\/\/www.mathworks.com\/help\/driving\/ug\/highway-lane-following.html"},{"key":"10778_CR54","doi-asserted-by":"crossref","unstructured":"Menghi C, Nejati S, Briand L, Parache YI (2020) Approximation-refinement testing of compute-intensive cyber-physical models: An approach based on system identification. In: Proceedings of the ACM\/IEEE 42nd international conference on software engineering, pp 372\u2013384","DOI":"10.1145\/3377811.3380370"},{"key":"10778_CR55","doi-asserted-by":"crossref","unstructured":"Menghi C, Vigan\u00f2 E, Bianculli D, Briand LC (2021) Trace-checking CPS properties: Bridging the cyber-physical gap. In: 2021 IEEE\/ACM 43rd international conference on software engineering (ICSE). IEEE, pp 847\u2013859","DOI":"10.1109\/ICSE43902.2021.00082"},{"key":"10778_CR56","first-page":"43","volume-title":"Genetic algorithm","author":"S Mirjalili","year":"2019","unstructured":"Mirjalili S, Mirjalili S (2019) Genetic algorithm. Theory Appl, Evolutionary Algorithms Neural Netw, pp 43\u201355"},{"key":"10778_CR57","doi-asserted-by":"crossref","unstructured":"Prabhakar P, D\u2019Souza D (2006) On the expressiveness of MTL with past operators. In: International conference on formal modeling and analysis of timed systems. Springer pp 322\u2013336","DOI":"10.1007\/11867340_23"},{"key":"10778_CR58","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1016\/S0927-0507(05)80172-0","volume":"2","author":"ML Puterman","year":"1990","unstructured":"Puterman ML (1990) Markov decision processes. Handbooks Operations Res Manag Sci 2:331\u2013434","journal-title":"Handbooks Operations Res Manag Sci"},{"key":"10778_CR59","doi-asserted-by":"crossref","unstructured":"Rungger M, Tabuada P (2014) Abstracting and refining robustness for cyber-physical systems. In: Proceedings of the 17th international conference on Hybrid systems: computation and control, pp 223\u2013232","DOI":"10.1145\/2562059.2562133"},{"issue":"2","key":"10778_CR60","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1145\/3076125.3076128","volume":"14","author":"S Sankaranarayanan","year":"2017","unstructured":"Sankaranarayanan S, Kumar SA, Cameron F, Bequette BW, Fainekos G, Maahs DM (2017) Model-based falsification of an artificial pancreas control system. ACM SIGBED Rev 14(2):24\u201333","journal-title":"ACM SIGBED Rev"},{"key":"10778_CR61","first-page":"82","volume":"81","author":"B Selman","year":"2006","unstructured":"Selman B, Gomes CP (2006) Hill-climbing search Encyclopedia Cognitive Sci 81:82","journal-title":"Hill-climbing search Encyclopedia Cognitive Sci"},{"key":"10778_CR62","doi-asserted-by":"crossref","unstructured":"Shi J, He J, Yang Z, \u017dikeli\u0107 D, Lo D (2024) Synthesizing Efficient and Permissive Programmatic Runtime Shields for Neural Policies. arXiv:2410.05641","DOI":"10.1145\/3773034"},{"key":"10778_CR63","doi-asserted-by":"crossref","unstructured":"Shi J, Yang Z, He J, Xu B, Kim D, Han D et\u00a0al (2024) Finding Safety Violations of AI-Enabled Control Systems through the Lens of Synthesized Proxy Programs. ACM Trans Softw Eng Methodol","DOI":"10.1145\/3715105"},{"issue":"8","key":"10778_CR64","doi-asserted-by":"publisher","first-page":"4058","DOI":"10.1109\/TSE.2023.3282981","volume":"49","author":"J Song","year":"2023","unstructured":"Song J, Xie X, Ma L (2023) SIEGESIEGE: A Semantics-Guided Safety Enhancement Framework for AI-Enabled Cyber-Physical Systems. IEEE Trans Softw Eng 49(8):4058\u20134080. https:\/\/doi.org\/10.1109\/TSE.2023.3282981","journal-title":"IEEE Trans Softw Eng"},{"key":"10778_CR65","doi-asserted-by":"crossref","unstructured":"Song J, Lyu D, Zhang Z, Wang Z, Zhang T, Ma L (2021) When Cyber-Physical Systems Meet AI: A Benchmark, an Evaluation, and a Way Forward. arXiv:2111.04324","DOI":"10.1145\/3510457.3513049"},{"issue":"10","key":"10778_CR66","doi-asserted-by":"publisher","DOI":"10.1002\/smr.2386","volume":"34","author":"A Stocco","year":"2022","unstructured":"Stocco A, Tonella P (2022) Confidence-driven weighted retraining for predicting safety-critical failures in autonomous driving systems. J Softw Evolution Process 34(10):e2386","journal-title":"J Softw Evolution Process"},{"key":"10778_CR67","doi-asserted-by":"crossref","unstructured":"Stocco A, Nunes PJ, d\u2019Amorim M, Tonella P (2022) Thirdeye: Attention maps for safe autonomous driving systems. In: Proceedings of the 37th IEEE\/ACM international conference on automated software engineering pp 1\u201312","DOI":"10.1145\/3551349.3556968"},{"key":"10778_CR68","doi-asserted-by":"crossref","unstructured":"Stocco A, Weiss M, Calzana M, Tonella P (2020) Misbehaviour prediction for autonomous driving systems. In: Proceedings of the ACM\/IEEE 42nd international conference on software engineering, pp 359\u2013371","DOI":"10.1145\/3377811.3380353"},{"key":"10778_CR69","doi-asserted-by":"publisher","DOI":"10.1201\/9781420050349","volume-title":"Handbook of grid generation","author":"JF Thompson","year":"1998","unstructured":"Thompson JF, Soni BK, Weatherill NP (1998) Handbook of grid generation. CRC Press"},{"key":"10778_CR70","doi-asserted-by":"crossref","unstructured":"Tran HD, Yang X, Manzanas\u00a0Lopez D, Musau P, Nguyen LV, Xiang W et\u00a0al (2020) NNV: the neural network verification tool for deep neural networks and learning-enabled cyber-physical systems. In: International conference on computer aided verification. Springer pp 3\u201317","DOI":"10.1007\/978-3-030-53288-8_1"},{"issue":"2","key":"10778_CR71","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1109\/TIV.2019.2955903","volume":"5","author":"CE Tuncali","year":"2019","unstructured":"Tuncali CE, Fainekos G, Prokhorov D, Ito H, Kapinski J (2019) Requirements-driven test generation for autonomous vehicles with machine learning components. IEEE Trans Intell Vehicles 5(2):265\u2013280","journal-title":"IEEE Trans Intell Vehicles"},{"key":"10778_CR72","unstructured":"Van\u00a0der Maaten L, Hinton G (2008) Visualizing data using t-SNE. J Mach Learn Res 9(11)"},{"issue":"2","key":"10778_CR73","first-page":"101","volume":"25","author":"A Vargha","year":"2000","unstructured":"Vargha A, Delaney HD (2000) A critique and improvement of the CL common language effect size statistics of McGraw and Wong. J Educ Behavioral Stat 25(2):101\u2013132","journal-title":"J Educ Behavioral Stat"},{"key":"10778_CR74","unstructured":"Weiss G, Goldberg Y, Yahav E (2018) Extracting automata from recurrent neural networks using queries and counterexamples. In: International conference on machine learning. PMLR pp 5247\u20135256"},{"key":"10778_CR75","doi-asserted-by":"crossref","unstructured":"Xie X, Ma L, Juefei-Xu F, Xue M, Chen H, Liu Y et\u00a0al (2019) Deephunter: a coverage-guided fuzz testing framework for deep neural networks. In: Proceedings of the 28th ACM SIGSOFT international symposium on software testing and analysis pp 146\u2013157","DOI":"10.1145\/3293882.3330579"},{"key":"10778_CR76","doi-asserted-by":"crossref","unstructured":"Yel E, Bezzo N (2019) Fast run-time monitoring, replanning, and recovery for safe autonomous system operations. In: 2019 IEEE\/RSJ international conference on intelligent robots and systems (IROS). IEEE pp 1661\u20131667","DOI":"10.1109\/IROS40897.2019.8968498"},{"issue":"3","key":"10778_CR77","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1109\/87.761053","volume":"7","author":"KD Young","year":"1999","unstructured":"Young KD, Utkin VI, Ozguner U (1999) A control engineer\u2019s guide to sliding mode control. IEEE Trans Control Syst Technol 7(3):328\u2013342","journal-title":"IEEE Trans Control Syst Technol"},{"issue":"11","key":"10778_CR78","doi-asserted-by":"publisher","first-page":"3674","DOI":"10.1109\/TCAD.2020.3013073","volume":"39","author":"Z Zhang","year":"2020","unstructured":"Zhang Z, Arcaini P, Hasuo I (2020) Hybrid system falsification under (in) equality constraints via search space transformation. IEEE Trans Comput-Aided Design Integrated Circuits Syst 39(11):3674\u20133685","journal-title":"IEEE Trans Comput-Aided Design Integrated Circuits Syst"},{"key":"10778_CR79","doi-asserted-by":"crossref","unstructured":"Zhang Z, Arcaini P, Hasuo I (2020) Constraining Counterexamples in Hybrid System Falsification: Penalty-Based Approaches. Available from: arXiv:2001.05107","DOI":"10.1007\/978-3-030-55754-6_24"},{"key":"10778_CR80","doi-asserted-by":"crossref","unstructured":"Zhang Z, Arcaini P, Xie X (2022) Online Reset for Signal Temporal Logic Monitoring. IEEE Trans Comput-Aided Design Integrated Circuits Syst 41(11):4421\u20134432","DOI":"10.1109\/TCAD.2022.3197693"},{"key":"10778_CR81","doi-asserted-by":"crossref","unstructured":"Zhang S, Liu S, Sun J, Chen Y, Huang W, Liu J et\u00a0al (2021) FIGCPS: Effective failure-inducing input generation for cyber-physical systems with deep reinforcement learning. In: 2021 36th IEEE\/ACM international conference on automated software engineering (ASE). IEEE pp 555\u2013567","DOI":"10.1109\/ASE51524.2021.9678832"},{"key":"10778_CR82","unstructured":"Zhang Z, Lyu D, Arcaini P, Ma L, Hasuo I, Zhao J (2022a) FalsifAI: Falsification of AI-Enabled Hybrid Control Systems Guided by Time-Aware Coverage Criteria. IEEE Trans Softw Eng pp 1\u201317"},{"key":"10778_CR83","doi-asserted-by":"crossref","unstructured":"Zhou Z, Song J, Xie X, Shu Z, Ma L, Liu D et\u00a0al (2023) Towards Building AI-CPS with NVIDIA Isaac Sim: An Industrial Benchmark and Case Study for Robotics Manipulation. arXiv:2308.00055","DOI":"10.1145\/3639477.3639740"},{"key":"10778_CR84","doi-asserted-by":"crossref","unstructured":"Zhu D, Chen J, Shang W, Zhou X, Grossklags J, Hassan AE (2021) DeepMemory: Model-based Memorization Analysis of Deep Neural Language Models. In: 2021 36th IEEE\/ACM international conference on automated software engineering (ASE). IEEE, pp 1003\u20131015","DOI":"10.1109\/ASE51524.2021.9678871"},{"issue":"2","key":"10778_CR85","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3544792","volume":"32","author":"T Zohdinasab","year":"2023","unstructured":"Zohdinasab T, Riccio V, Gambi A, Tonella P (2023) Efficient and effective feature space exploration for testing deep learning systems. ACM Trans Softw Eng Methodol 32(2):1\u201338","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"10778_CR86","doi-asserted-by":"crossref","unstructured":"Zohdinasab T, Riccio V, Tonella P (2023) An empirical study on low-and high-level explanations of deep learning misbehaviours. In: 2023 ACM\/IEEE international symposium on empirical software engineering and measurement (ESEM). IEEE pp 1\u201311","DOI":"10.1109\/ESEM56168.2023.10304866"},{"key":"10778_CR87","doi-asserted-by":"crossref","unstructured":"Zohdinasab T, Riccio V, Tonella P (2023) Deepatash: Focused test generation for deep learning systems. In: Proceedings of the 32nd ACM SIGSOFT international symposium on software testing and analysis, pp 954\u2013966","DOI":"10.1145\/3597926.3598109"},{"key":"10778_CR88","doi-asserted-by":"crossref","unstructured":"Zolfagharian A, Abdellatif M, Briand LC, Bagherzadeh M, Ramesh S (2023) A Search-Based Testing Approach for Deep Reinforcement Learning Agents. IEEE Trans Softw Eng","DOI":"10.1109\/TSE.2023.3269804"},{"key":"10778_CR89","doi-asserted-by":"crossref","unstructured":"Zolfagharian A, Abdellatif M, Briand LC et\u00a0al (2023) SMARLA: A Safety Monitoring Approach for Deep Reinforcement Learning Agents. arXiv:2308.02594","DOI":"10.1109\/TSE.2023.3269804"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-025-10778-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-025-10778-z","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-025-10778-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T14:38:17Z","timestamp":1774881497000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-025-10778-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,7]]},"references-count":89,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,5]]}},"alternative-id":["10778"],"URL":"https:\/\/doi.org\/10.1007\/s10664-025-10778-z","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,7]]},"assertion":[{"value":"20 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"This study did not involve human subjects, animals, or any materials\/data requiring ethical approval.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"This study did not involve human subjects, so informed consent was not required.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent"}},{"value":"Clinical trial number: not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Clinical Trial Number"}}],"article-number":"67"}}