{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T01:05:31Z","timestamp":1776128731074,"version":"3.50.1"},"reference-count":61,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T00:00:00Z","timestamp":1774224000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100031478","name":"NextGenerationEU","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100031478","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Engineering Applications of Artificial Intelligence"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1016\/j.engappai.2026.114583","type":"journal-article","created":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T10:31:24Z","timestamp":1774348284000},"page":"114583","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["The use of the Simplex architecture to enhance safety in deep-learning-powered autonomous systems"],"prefix":"10.1016","volume":"174","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4338-9573","authenticated-orcid":false,"given":"Federico","family":"Nesti","sequence":"first","affiliation":[]},{"given":"Niko","family":"Salamini","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7041-9777","authenticated-orcid":false,"given":"Mauro","family":"Marinoni","sequence":"additional","affiliation":[]},{"given":"Giorgiomaria","family":"Cicero","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0225-6731","authenticated-orcid":false,"given":"Gabriele","family":"Serra","sequence":"additional","affiliation":[]},{"given":"Alessandro","family":"Biondi","sequence":"additional","affiliation":[]},{"given":"Giorgio","family":"Buttazzo","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/j.engappai.2026.114583_b1","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1016\/S0005-1098(99)00140-5","article-title":"Swinging up a pendulum by energy control","volume":"36","author":"\u00c5str\u00f6m","year":"2000","journal-title":"Automatica"},{"key":"10.1016\/j.engappai.2026.114583_b2","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1016\/j.inffus.2021.05.008","article-title":"A review of uncertainty quantification in deep learning: Techniques, applications and challenges","volume":"76","author":"Abdar","year":"2021","journal-title":"Inf. Fusion"},{"key":"10.1016\/j.engappai.2026.114583_b3","unstructured":"Accelerat Srl, 2026. The CLARE software stack, URL https:\/\/accelerat.eu\/clare."},{"key":"10.1016\/j.engappai.2026.114583_b4","unstructured":"AgileX, 2026. AgileX Scout Mini, URL https:\/\/global.agilex.ai\/products\/scout-mini."},{"key":"10.1016\/j.engappai.2026.114583_b5","series-title":"DASIA 2009-DAta Systems in Aerospace","first-page":"27","article-title":"Safe and secure partitioning with PikeOS: towards integrated modular avionics in space","volume":"Vol. 669","author":"Almeida","year":"2009"},{"key":"10.1016\/j.engappai.2026.114583_b6","doi-asserted-by":"crossref","unstructured":"Auger, A., Hansen, N., 2012. Tutorial CMA-ES: evolution strategies and covariance matrix adaptation. In: Proceedings of the 14th Annual Conference Companion on Genetic and Evolutionary Computation. pp. 827\u2013848.","DOI":"10.1145\/2330784.2330919"},{"key":"10.1016\/j.engappai.2026.114583_b7","doi-asserted-by":"crossref","unstructured":"Bak, S., Chivukula, D.K., Adekunle, O., Sun, M., Caccamo, M., Sha, L., 2009. The system-level simplex architecture for improved real-time embedded system safety. In: Proceedings of the 15th IEEE Real-Time and Embedded Technology and Applications Symposium. RTAS\u201909, San Francisco, CA, USA.","DOI":"10.1109\/RTAS.2009.20"},{"key":"10.1016\/j.engappai.2026.114583_b8","series-title":"2014 IEEE Real-Time Systems Symposium","first-page":"138","article-title":"Real-time reachability for verified simplex design","author":"Bak","year":"2014"},{"key":"10.1016\/j.engappai.2026.114583_b9","series-title":"2011 IEEE\/ACM Second International Conference on Cyber-Physical Systems","first-page":"3","article-title":"Sandboxing controllers for cyber-physical systems","author":"Bak","year":"2011"},{"key":"10.1016\/j.engappai.2026.114583_b10","series-title":"Proceedings of the 2024 8th International Conference on Computer Science and Artificial Intelligence","first-page":"245","article-title":"A vision transformer inference accelerator for KR260","author":"Bao","year":"2025"},{"key":"10.1016\/j.engappai.2026.114583_b11","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1016\/j.patcog.2018.07.023","article-title":"Wild patterns: Ten years after the rise of adversarial machine learning","volume":"84","author":"Biggio","year":"2018","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.engappai.2026.114583_b12","doi-asserted-by":"crossref","first-page":"75446","DOI":"10.1109\/ACCESS.2021.3080842","article-title":"SPHERE: A multi-SoC architecture for next-generation cyber-physical systems based on heterogeneous platforms","volume":"9","author":"Biondi","year":"2021","journal-title":"IEEE Access"},{"issue":"3","key":"10.1016\/j.engappai.2026.114583_b13","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/LES.2019.2953253","article-title":"A safe, secure, and predictable software architecture for deep learning in safety-critical systems","volume":"12","author":"Biondi","year":"2020","journal-title":"IEEE Embed. Syst. Lett."},{"key":"10.1016\/j.engappai.2026.114583_b14","series-title":"Proceedings of Cyber-Physical Systems and Internet of Things Week 2023","first-page":"234","article-title":"Real-time packet-based intrusion detection on edge devices","author":"Borgioli","year":"2023"},{"key":"10.1016\/j.engappai.2026.114583_b15","series-title":"OpenAI Gym","author":"Brockman","year":"2016"},{"key":"10.1016\/j.engappai.2026.114583_b16","unstructured":"Buttazzo, G., 2022. Can We Trust AI-Powered Real-Time Embedded Systems?. In: OpenAccess Series in Informatics (OASIcs), Vol. 98, Proc. of the HiPEAC Workshop on Next Generation Real-Time Embedded Systems. NG-RES 2022, Budapest, Hungary."},{"issue":"9","key":"10.1016\/j.engappai.2026.114583_b17","first-page":"1760","article-title":"Timing Isolation and Improved Scheduling of Deep Neural Networks for Real-Time Systems","volume":"50","author":"Casini","year":"2020","journal-title":"Softw.: Pract. Exp."},{"key":"10.1016\/j.engappai.2026.114583_b18","doi-asserted-by":"crossref","unstructured":"Cavicchioli, R., Capodieci, N., Bertogna, M., 2017. Memory Interference Characterization Between CPU Cores and Integrated GPUs in Mixed-Criticality Platforms. In: Proc. of the 22nd IEEE International Conference on Emerging Technologies and Factory Automation. ETFA 2017, Limassol, Cyprus.","DOI":"10.1109\/ETFA.2017.8247615"},{"issue":"1","key":"10.1016\/j.engappai.2026.114583_b19","doi-asserted-by":"crossref","DOI":"10.1155\/2011\/528341","article-title":"On the dynamics of the furuta pendulum","volume":"2011","author":"Cazzolato","year":"2011","journal-title":"J. Control Sci. Eng."},{"key":"10.1016\/j.engappai.2026.114583_b20","series-title":"2025 5th International Conference on Artificial Intelligence and Industrial Technology Applications","first-page":"1764","article-title":"FPGA-based MCS-YOLOv5 lightweight ship detection modeltection on KR260","author":"Chen","year":"2025"},{"issue":"4","key":"10.1016\/j.engappai.2026.114583_b21","doi-asserted-by":"crossref","first-page":"609","DOI":"10.1007\/s11241-023-09402-4","article-title":"Supporting AI-powered real-time cyber-physical systems on heterogeneous platforms via hypervisor technology","volume":"59","author":"Cittadini","year":"2023","journal-title":"Real-Time Syst."},{"key":"10.1016\/j.engappai.2026.114583_b22","series-title":"Actas do INForum-Simposio de Informatica","first-page":"49","article-title":"Flexible operating system integration in partitioned aerospace systems","author":"Craveiro","year":"2009"},{"key":"10.1016\/j.engappai.2026.114583_b23","series-title":"2019 49th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks","first-page":"138","article-title":"SOTER: a runtime assurance framework for programming safe robotics systems","author":"Desai","year":"2019"},{"key":"10.1016\/j.engappai.2026.114583_b24","unstructured":"Evidence Srl, Erika enterprise RTOS, URL https:\/\/www.erika-enterprise.com\/."},{"key":"10.1016\/j.engappai.2026.114583_b25","series-title":"2022 IEEE 28th Real-Time and Embedded Technology and Applications Symposium","first-page":"68","article-title":"FLYOS: Integrated modular avionics for autonomous multicopters","author":"Farrukh","year":"2022"},{"key":"10.1016\/j.engappai.2026.114583_b26","doi-asserted-by":"crossref","unstructured":"Ferreira, E., Krogh, B., 1997. Using Neural Networks to Estimate Regions of Stability. In: Proceedings of 1997 American Control Conference. Vol. 3, pp. 1989\u20131993.","DOI":"10.1109\/ACC.1997.611036"},{"key":"10.1016\/j.engappai.2026.114583_b27","series-title":"Switching controllers based on neural network estimates of stability regions and controller performance","author":"Ferreira","year":"1999"},{"key":"10.1016\/j.engappai.2026.114583_b28","series-title":"Towards a distributed and real-time framework for robots: Evaluation of ROS 2.0 communications for real-time robotic applications","author":"Guti\u00e9rrez","year":"2018"},{"key":"10.1016\/j.engappai.2026.114583_b29","doi-asserted-by":"crossref","DOI":"10.1016\/j.cosrev.2020.100270","article-title":"A survey of safety and trustworthiness of deep neural networks: Verification, testing, adversarial attack and defence, and interpretability","volume":"37","author":"Huang","year":"2020","journal-title":"Comput. Sci. Rev."},{"issue":"10","key":"10.1016\/j.engappai.2026.114583_b30","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1145\/3230627","article-title":"Formally verified software in the real world","volume":"61","author":"Klein","year":"2018","journal-title":"Commun. ACM"},{"key":"10.1016\/j.engappai.2026.114583_b31","doi-asserted-by":"crossref","unstructured":"Kurakin, A., Goodfellow, I.J., Bengio, S., 2017. Adversarial examples in the physical world. In: Proc. of the 5th Int. Conference on Learning Representation. ICLR, Toulon, France.","DOI":"10.1201\/9781351251389-8"},{"key":"10.1016\/j.engappai.2026.114583_b32","series-title":"Continuous control with deep reinforcement learning","author":"Lillicrap","year":"2015"},{"key":"10.1016\/j.engappai.2026.114583_b33","series-title":"2017 IEEE 15th International Conference on Industrial Informatics","first-page":"1229","article-title":"An autopilot system based on ROS distributed architecture and deep learning","author":"Liu","year":"2017"},{"issue":"3","key":"10.1016\/j.engappai.2026.114583_b34","first-page":"123","article-title":"Comparison of edge computing platforms for hardware acceleration of AI: Kria KV260, Jetson Nano and RTX 3060","volume":"15","author":"Lizano","year":"2024","journal-title":"J. Edge Comput."},{"issue":"66","key":"10.1016\/j.engappai.2026.114583_b35","doi-asserted-by":"crossref","DOI":"10.1126\/scirobotics.abm6074","article-title":"Robot operating system 2: Design, architecture, and uses in the wild","volume":"7","author":"Macenski","year":"2022","journal-title":"Sci. Robot."},{"issue":"5","key":"10.1016\/j.engappai.2026.114583_b36","doi-asserted-by":"crossref","first-page":"5513","DOI":"10.1109\/TPAMI.2022.3213473","article-title":"Class-incremental learning: survey and performance evaluation on image classification","volume":"45","author":"Masana","year":"2022","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.engappai.2026.114583_b37","series-title":"2015 IEEE International Conference on Robotics and Automation","first-page":"6235","article-title":"PX4: A node-based multithreaded open source robotics framework for deeply embedded platforms","author":"Meier","year":"2015"},{"key":"10.1016\/j.engappai.2026.114583_b38","doi-asserted-by":"crossref","unstructured":"Modica, P., Biondi, A., Buttazzo, G., Patel, A., 2018. Supporting Temporal and Spatial Isolation in a Hypervisor for ARM Multicore Platforms. In: Proceedings of the 18th IEEE International Conference on Industrial Technology. ICIT 2018, Lyon, France.","DOI":"10.1109\/ICIT.2018.8352429"},{"key":"10.1016\/j.engappai.2026.114583_b39","unstructured":"Mohan, S., Bak, S., Betti, E., Yun, H., Sha, L., Caccamo, M., 2013a. S3A: Secure System Simplex Architecture for Enhanced Security and Robustness of Cyber-Physical Systems. In: Proceedings of the ACM Int. Conference on High Confidence Networked Systems. HiCoNS, Philadelphia, PA, USA."},{"key":"10.1016\/j.engappai.2026.114583_b40","doi-asserted-by":"crossref","unstructured":"Mohan, S., Bak, S., Betti, E., Yun, H., Sha, L., Caccamo, M., 2013b. S3A: Secure system simplex architecture for enhanced security and robustness of cyber-physical systems. In: Proceedings of the 2nd ACM International Conference on High Confidence Networked Systems. pp. 65\u201374.","DOI":"10.1145\/2461446.2461456"},{"key":"10.1016\/j.engappai.2026.114583_b41","doi-asserted-by":"crossref","unstructured":"Nesti, F., Rossolini, G., Nair, S., Biondi, A., Buttazzo, G., 2022. Evaluating the Robustness of Semantic Segmentation for Autonomous Driving Against Real-World Adversarial Patch Attacks. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision. WACV, pp. 2280\u20132289.","DOI":"10.1109\/WACV51458.2022.00288"},{"key":"10.1016\/j.engappai.2026.114583_b42","series-title":"F1\/10: an open-source autonomous cyber-physical platform","author":"O\u2019Kelly","year":"2019"},{"issue":"1","key":"10.1016\/j.engappai.2026.114583_b43","doi-asserted-by":"crossref","first-page":"524","DOI":"10.1109\/COMST.2020.3036778","article-title":"Resilient machine learning for networked cyber physical systems: A survey for machine learning security to securing machine learning for CPS","volume":"23","author":"Olowononi","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"4","key":"10.1016\/j.engappai.2026.114583_b44","doi-asserted-by":"crossref","first-page":"579","DOI":"10.3390\/make2040031","article-title":"Challenges of machine learning applied to safety-critical cyber-physical systems","volume":"2","author":"Pereira","year":"2020","journal-title":"Mach. Learn. Knowl. Extr."},{"key":"10.1016\/j.engappai.2026.114583_b45","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1016\/j.csi.2016.10.012","article-title":"Handling heterogeneous partitioned systems through ARINC-653 and DDS","volume":"50","author":"Perez","year":"2017","journal-title":"Comput. Stand. Interfaces"},{"key":"10.1016\/j.engappai.2026.114583_b46","series-title":"NASA Formal Methods: 12th International Symposium, NFM 2020, Moffett Field, CA, USA, May 11\u201315, 2020, Proceedings","first-page":"97","article-title":"Neural simplex architecture","volume":"vol. 12","author":"Phan","year":"2020"},{"key":"10.1016\/j.engappai.2026.114583_b47","unstructured":"Quanser, 2026. Quanser rotary inverted pendulum, URL https:\/\/www.quanser.com\/products\/rotary-inverted-pendulum\/."},{"key":"10.1016\/j.engappai.2026.114583_b48","series-title":"Dataset Shift in Machine Learning","author":"Qui\u00f1onero-Candela","year":"2022"},{"key":"10.1016\/j.engappai.2026.114583_b49","series-title":"2020 International SAUPEC\/RobMech\/PRASA Conference","first-page":"1","article-title":"A self-driving car architecture in ROS2","author":"Reke","year":"2020"},{"key":"10.1016\/j.engappai.2026.114583_b50","doi-asserted-by":"crossref","unstructured":"Rossolini, G., Nesti, F., Brau, F., Biondi, A., Buttazzo, G., 2023. Defending from physically-realizable adversarial attacks through internal over-activation analysis. In: Proceedings of the AAAI Conference on Artificial Intelligence. Vol. 37, pp. 15064\u201315072.","DOI":"10.1609\/aaai.v37i12.26758"},{"issue":"1","key":"10.1016\/j.engappai.2026.114583_b51","doi-asserted-by":"crossref","first-page":"12","DOI":"10.3390\/robotics13010012","article-title":"A survey of machine learning approaches for mobile robot control","volume":"13","author":"Rybczak","year":"2024","journal-title":"Robotics"},{"key":"10.1016\/j.engappai.2026.114583_b52","series-title":"Proceedings of the 1998 American Control Conference. ACC (IEEE Cat. No.98CH36207)","first-page":"3504","article-title":"The simplex architecture for safe online control system upgrades","volume":"Vol. 6","author":"Seto","year":"1998"},{"key":"10.1016\/j.engappai.2026.114583_b53","series-title":"A case study on analytical analysis of the inverted pendulum real-time control system","author":"Seto","year":"1999"},{"key":"10.1016\/j.engappai.2026.114583_b54","unstructured":"Sha, L., Rajkumar, R., Gagliardi, M., 1994. The simplex architecture: An approach to build evolving industrial computing systems. In: Proceedings of the ISSAT Int. Conference: Reliability and Quality in Design. Seattle, Washington, USA."},{"key":"10.1016\/j.engappai.2026.114583_b55","unstructured":"Szegedy, C., Zaremba, W., Sutskever, I., Bruna, J., Erhan, D., Goodfellow, I., Fergus, R., 2014. Intriguing properties of neural networks. In: Proc. of the 2nd International Conference on Learning Representations. ICLR 2014, Banff, AB, Canada."},{"key":"10.1016\/j.engappai.2026.114583_b56","doi-asserted-by":"crossref","unstructured":"Vivekanandan, K., et al., 2016. A Simplex Architecture for Intelligent and Safe Unmanned Aerial Vehicles. In: IEEE International Conference on Embedded and Real-Time Computing Systems and Applications.","DOI":"10.1109\/RTCSA.2016.17"},{"key":"10.1016\/j.engappai.2026.114583_b57","unstructured":"Xilinx, 2026. Zynq UltraScale+ device technical reference manual-UG1085, URL https:\/\/docs.amd.com\/r\/en-US\/ug1085-zynq-ultrascale-trm\/Zynq-UltraScale-Device-Technical-Reference-Manual."},{"key":"10.1016\/j.engappai.2026.114583_b58","first-page":"1","article-title":"Generalized out-of-distribution detection: A survey","author":"Yang","year":"2024","journal-title":"Int. J. Comput. Vis."},{"key":"10.1016\/j.engappai.2026.114583_b59","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1007\/s10626-014-0187-5","article-title":"Optimal control of hybrid switched systems: A brief survey","volume":"25","author":"Zhu","year":"2015","journal-title":"Discrete Event Dyn. Syst."},{"issue":"3","key":"10.1016\/j.engappai.2026.114583_b60","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1109\/JPROC.2023.3238524","article-title":"Object detection in 20 years: A survey","volume":"111","author":"Zou","year":"2023","journal-title":"Proc. IEEE"},{"key":"10.1016\/j.engappai.2026.114583_b61","article-title":"Methods of A. M. Lyapunov and their application","author":"Zubov","year":"1965","journal-title":"Am. Math. Mon."}],"container-title":["Engineering Applications of Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S095219762600864X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S095219762600864X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T00:37:09Z","timestamp":1776127029000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S095219762600864X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,6]]},"references-count":61,"alternative-id":["S095219762600864X"],"URL":"https:\/\/doi.org\/10.1016\/j.engappai.2026.114583","relation":{},"ISSN":["0952-1976"],"issn-type":[{"value":"0952-1976","type":"print"}],"subject":[],"published":{"date-parts":[[2026,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"The use of the Simplex architecture to enhance safety in deep-learning-powered autonomous systems","name":"articletitle","label":"Article Title"},{"value":"Engineering Applications of Artificial Intelligence","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.engappai.2026.114583","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Authors. Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}],"article-number":"114583"}}