{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:25:45Z","timestamp":1757543145957,"version":"3.28.0"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1109\/iccad45719.2019.8942153","type":"proceedings-article","created":{"date-parts":[[2020,1,3]],"date-time":"2020-01-03T00:44:25Z","timestamp":1578012265000},"page":"1-6","source":"Crossref","is-referenced-by-count":21,"title":["nn-dependability-kit: Engineering Neural Networks for Safety-Critical Autonomous Driving Systems"],"prefix":"10.1109","author":[{"given":"Chih-Hong","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Chung-Hao","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Georg","family":"Nuhrenberg","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/136035.136043"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2018.8342158"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01090-4_8"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8714971"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MEMCOD.2018.8556962"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68167-2_18"},{"issue":"1,2","key":"ref7","first-page":"125","article-title":"Combinatorial aspects of covering arrays","volume":"59","author":"Colbourn","year":"2004","journal-title":"Le Matematiche"},{"key":"ref8","first-page":"2057","article-title":"Provable robustness of ReLU networks via maximization of linear regions","volume-title":"Proceedings of the 22nd International Conference on Artificial Intelligence and Statistics (AISTATS)","author":"Croce","year":"2018"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-77935-5_9"},{"key":"ref10","first-page":"550","article-title":"A dual approach to scalable verification of deep networks","volume-title":"Proceedings of the Thirty-Fourth Conference on Uncertainty in Artificial Intelligence (UAI)","author":"Dvijotham","year":"2018"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68167-2_19"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314633"},{"key":"ref13","first-page":"1050","article-title":"Dropout as a Bayesian approximation: Representing model uncertainty in deep learning","volume-title":"Proceedings of the 36th International Conference on Machine Learning (ICML)","author":"Gal","year":"2016"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99130-6_4"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00058"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.1145\/3358228","volume-title":"ReachNN: Reachability Analysis of Neural-Network Controlled Systems","author":"Huang","year":"2019"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3183519.3183534"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63387-9_5"},{"key":"ref19","article-title":"The goal structuring notation\u2013a safety argument notation","volume-title":"DSN 2004 Workshop on Assurance Cases","author":"Kelly","year":"2004"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99229-7_36"},{"key":"ref21","first-page":"5283","article-title":"Provable defenses against adversarial examples via the convex outer adversarial polytope","volume-title":"Proceedings of the 35th International Conference on Machine Learning (ICML)","author":"Kolter","year":"2018"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.37236\/571"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238202"},{"volume-title":"Distance-based confidence score for neural network classifiers","year":"2017","author":"Mandelbaum","key":"ref24"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s10990-006-8609-1"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132785"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SSRR.2018.8468619"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14295-6_24"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.91"},{"volume-title":"Towards verified artificial intelligence","year":"2018","author":"Seshia","key":"ref30"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99229-7_39"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2011.6033395"},{"volume-title":"Testing deep neural networks","year":"2018","author":"Sun","key":"ref33"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238172"},{"key":"ref35","article-title":"Intriguing properties of neural networks","volume-title":"Proceedings of the 2nd International Conference on Learning Representations (ICLR)","author":"Szegedy","year":"2014"},{"key":"ref36","first-page":"6541","article-title":"Lipschitz-margin training: Scalable certification of perturbation invariance for deep neural networks","volume-title":"Proceedings of the International Conference on Advances in Neural Information Processing Systems (NeurIPS)","author":"Tsuzuku","year":"2018"},{"key":"ref37","first-page":"1599","article-title":"Formal security analysis of neural networks using symbolic intervals","volume-title":"Proceedings of the 27th USENIX Security Symposium (USENIX)","author":"Wang","year":"2018"},{"key":"ref38","first-page":"5273","article-title":"Towards fast computation of certified robustness for ReLU networks","volume-title":"Proceedings of the 35th International Conference on Machine Learning (ICML)","author":"Weng","year":"2018"},{"key":"ref39","first-page":"8410","article-title":"Scaling provable adversarial defenses","volume-title":"Proceedings of the International Conference on Advances in Neural Information Processing Systems (NeurIPS)","author":"Wong","year":"2018"}],"event":{"name":"2019 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD)","start":{"date-parts":[[2019,11,4]]},"location":"Westminster, CO, USA","end":{"date-parts":[[2019,11,7]]}},"container-title":["2019 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8931666\/8942037\/08942153.pdf?arnumber=8942153","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T00:04:12Z","timestamp":1706054652000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8942153\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/iccad45719.2019.8942153","relation":{},"subject":[],"published":{"date-parts":[[2019,11]]}}}