{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T07:57:35Z","timestamp":1763193455037,"version":"3.45.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T00:00:00Z","timestamp":1751241600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T00:00:00Z","timestamp":1751241600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,30]]},"DOI":"10.1109\/ijcnn64981.2025.11227808","type":"proceedings-article","created":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T18:46:15Z","timestamp":1763145975000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Bound Propagation meets Constraint Simplification: Improving Logic-based XAI for Neural Networks"],"prefix":"10.1109","author":[{"given":"Ronaldo","family":"Gomes","sequence":"first","affiliation":[{"name":"Instituto Federal do Cear&#x00E1; (IFCE),Department of Computer Science,Maracana&#x00FA;,Brazil"}]},{"given":"Jairo","family":"Ribeiro","sequence":"additional","affiliation":[{"name":"Instituto Federal do Cear&#x00E1; (IFCE),Department of Computer Science,Maracana&#x00FA;,Brazil"}]},{"given":"Luiz","family":"Queiroz","sequence":"additional","affiliation":[{"name":"Instituto Federal do Cear&#x00E1; (IFCE),Department of Computer Science,Maracana&#x00FA;,Brazil"}]},{"given":"Thiago Alves","family":"Rocha","sequence":"additional","affiliation":[{"name":"Instituto Federal do Cear&#x00E1; (IFCE),Department of Computer Science,Maracana&#x00FA;,Brazil"}]}],"member":"263","reference":[{"volume-title":"Deep Learning","year":"2016","author":"Goodfellow","key":"ref1"},{"key":"ref2","article-title":"Understanding black-box predictions via influence functions","author":"Koh","year":"2017","journal-title":"34th ICML"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1145\/2939672.2939778"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1609\/aaai.v32i1.11491"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.24963\/ijcai.2018\/708"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1609\/aaai.v33i01.33011511"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.24963\/ijcai.2021\/356"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1609\/aaai.v36i5.20507"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.24963\/ijcai.2021\/424"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1007\/978-3-031-30823-9_10"},{"key":"ref11","article-title":"Computing abductive explanations for boosted trees","author":"Audemard","year":"2023","journal-title":"26th AISTATS"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1007\/978-3-031-45368-7_10"},{"key":"ref13","article-title":"Robust and stable black box explanations","author":"Lakkaraju","year":"2020","journal-title":"37th ICML"},{"key":"ref14","article-title":"On the robustness of removal-based feature attributions","author":"Lin","year":"2023","journal-title":"37th NeurIPS"},{"key":"ref15","article-title":"Formal security analysis of neural networks using symbolic intervals","author":"Wang","year":"2018","journal-title":"27th USENIX"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/SP.2018.00058"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1145\/3290354"},{"key":"ref18","article-title":"Beta-CROWN: Efficient bound propagation with per-neuron split constraints for neural network robustness verification","author":"Wang","year":"2021","journal-title":"35th NeurIPS"},{"key":"ref19","article-title":"General cutting planes for bound-propagation-based neural network verification","author":"Zhang","year":"2022","journal-title":"36th NeurIPS"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1007\/978-3-662-50497-0"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1007\/BF01584074"},{"key":"ref22","article-title":"Evaluating robustness of neural networks with mixed integer programming","author":"Tjeng","year":"2019","journal-title":"7th ICLR"}],"event":{"name":"2025 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2025,6,30]]},"location":"Rome, Italy","end":{"date-parts":[[2025,7,5]]}},"container-title":["2025 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11227166\/11227148\/11227808.pdf?arnumber=11227808","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T07:52:36Z","timestamp":1763193156000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11227808\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,30]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/ijcnn64981.2025.11227808","relation":{},"subject":[],"published":{"date-parts":[[2025,6,30]]}}}