{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T12:16:48Z","timestamp":1767183408672,"version":"3.44.0"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T00:00:00Z","timestamp":1751760000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T00:00:00Z","timestamp":1751760000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,7,6]]},"DOI":"10.1109\/isvlsi65124.2025.11130309","type":"proceedings-article","created":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T18:20:15Z","timestamp":1756318815000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["A Sampling-based Method for Output Safety Verification of Spiking Neural Networks"],"prefix":"10.1109","author":[{"given":"Sruti","family":"Goswami","sequence":"first","affiliation":[{"name":"Indian Statistical Institute,Kolkata,India"}]},{"given":"Ansuman","family":"Banerjee","sequence":"additional","affiliation":[{"name":"Indian Statistical Institute,Kolkata,India"}]},{"given":"Swarup Kumar","family":"Mohalik","sequence":"additional","affiliation":[{"name":"Ericsson India Pvt. Ltd.,India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S0893-6080(97)00011-7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63387-9_5"},{"key":"ref3","article-title":"Introduction to Neural Network Verification","author":"Albarghouthi","year":"2021","journal-title":"verifieddeeplearning.com"},{"key":"ref4","article-title":"Evaluating robustness of neural networks with mixed integer programming","author":"Tjeng","year":"2017","journal-title":"arXiv preprint arXiv:1711.07356"},{"key":"ref5","article-title":"Abstraction based output range analysis for neural networks","volume":"32","author":"Prabhakar","year":"2019","journal-title":"Neurips"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i1.10289"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-25540-4_26"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1093\/logcom\/2.4.511"},{"key":"ref10","article-title":"Fast falsification of neural networks using property directed testing","volume":"abs\/2104.12418","author":"Das","year":"2021","journal-title":"CoRR"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MEMOCODE63347.2024.00017"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-24950-1_2"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2023.3251841"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03156-4_17"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2018.12.002"}],"event":{"name":"2025 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","start":{"date-parts":[[2025,7,6]]},"location":"Kalamata, Greece","end":{"date-parts":[[2025,7,9]]}},"container-title":["2025 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11129697\/11130193\/11130309.pdf?arnumber=11130309","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T04:32:43Z","timestamp":1756355563000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11130309\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,6]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/isvlsi65124.2025.11130309","relation":{},"subject":[],"published":{"date-parts":[[2025,7,6]]}}}