{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T16:06:21Z","timestamp":1772726781690,"version":"3.50.1"},"reference-count":13,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/fuzz48607.2020.9177844","type":"proceedings-article","created":{"date-parts":[[2020,8,26]],"date-time":"2020-08-26T20:50:57Z","timestamp":1598475057000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["Framework for Mining Hybrid Automata from a Constrained Machine Learning Architecture"],"prefix":"10.1109","author":[{"given":"Matthew","family":"Clark","sequence":"first","affiliation":[]},{"given":"Kuldip S.","family":"Rattan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1973.5408575"},{"key":"ref11","first-page":"807","article-title":"Rectified linear units improve restricted boltzmann machines","author":"nair","year":"2010","journal-title":"Proceedings of the 27th International Conference on Machine Learning (ICML-10)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-59615-5_13"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2001.980123"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3302504.3311806"},{"key":"ref3","article-title":"Provable run time safety assurance for a non-linear system","author":"firmin snyder","year":"2013"},{"key":"ref6","author":"brown","year":"1995","journal-title":"Neurofuzzy Adaptive Modelling and Control"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.1994.411593"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1049\/piee.1974.0328"},{"key":"ref7","article-title":"Verification and Validation of a Genetic Fuzzy Tree for UCAV Control","author":"clark","year":"2017","journal-title":"Intelligent System Book"},{"key":"ref2","first-page":"209","article-title":"Hybrid automata: An algorithmic approach to the specification and verification of hybrid systems","author":"alur","year":"1992","journal-title":"Hybrid Systems"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(65)90241-X"},{"key":"ref1","article-title":"A study on run time assurance for complex cyber physical systems","author":"clark","year":"2013","journal-title":"Technical Report"}],"event":{"name":"2020 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)","location":"Glasgow, United Kingdom","start":{"date-parts":[[2020,7,19]]},"end":{"date-parts":[[2020,7,24]]}},"container-title":["2020 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9171991\/9177529\/09177844.pdf?arnumber=9177844","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T15:36:16Z","timestamp":1656344176000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9177844\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/fuzz48607.2020.9177844","relation":{},"subject":[],"published":{"date-parts":[[2020,7]]}}}