{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T21:46:55Z","timestamp":1770846415721,"version":"3.50.1"},"reference-count":49,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T00:00:00Z","timestamp":1759622400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T00:00:00Z","timestamp":1759622400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100009318","name":"Helmholtz Association","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100009318","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,5]]},"DOI":"10.1109\/smc58881.2025.11342555","type":"proceedings-article","created":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T20:54:44Z","timestamp":1769633684000},"page":"6116-6121","source":"Crossref","is-referenced-by-count":0,"title":["Runtime Safety Monitoring of Deep Neural Networks for Perception: A Survey"],"prefix":"10.1109","author":[{"given":"Albert","family":"Schotschneider","sequence":"first","affiliation":[{"name":"FZI Research Center for Information Technology,Department of Technical Cognitive Systems,Karlsruhe,Germany"}]},{"given":"Svetlana","family":"Pavlitska","sequence":"additional","affiliation":[{"name":"FZI Research Center for Information Technology,Department of Technical Cognitive Systems,Karlsruhe,Germany"}]},{"given":"J. Marius","family":"Z\u00f6llner","sequence":"additional","affiliation":[{"name":"FZI Research Center for Information Technology,Department of Technical Cognitive Systems,Karlsruhe,Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-01233-4_1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3032227"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3551385"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100270"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3055015"},{"key":"ref6","article-title":"Runtime safety monitoring of ml-based perception functions in autonomous systems","volume-title":"Ph.D. dissertation","author":"Ferreira","year":"2023"},{"key":"ref7","article-title":"Safety monitoring of machine learning perception functions: a survey","author":"Ferreira","year":"2024","journal-title":"CoRR"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-021-00310-0"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378532"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3315070"},{"key":"ref11","article-title":"Road vehicles \u2013 Safety of the intended functionality","year":"2022"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-55583-2_25"},{"key":"ref13","first-page":"85","article-title":"Quantifying the generalization error in deep learning in terms of data distribution and neural network smoothness","volume-title":"Neural networks : the official journal of the International Neural Network Society","volume":"130","author":"Jin","year":"2019"},{"key":"ref14","article-title":"Generalization error in deep learning","author":"Jakubovitz","year":"2018"},{"key":"ref15","article-title":"A baseline for detecting misclassified and out-of-distribution examples in neural networks","author":"Hendrycks","year":"2016"},{"key":"ref16","article-title":"Enhancing the reliability of out-of-distribution image detection in neural networks","author":"Liang","year":"2017"},{"key":"ref17","article-title":"Intriguing properties of neural networks","volume-title":"CoRR","author":"Szegedy","year":"2013"},{"key":"ref18","article-title":"Explaining and harnessing adversarial examples","volume-title":"CoRR","author":"Goodfellow","year":"2014"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCME55909.2022.9988313"},{"key":"ref20","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-25072-9_35","article-title":"Adversarial vulnerability of temporal feature networks for object detection","volume-title":"ECCV Workshops","author":"Pavlitskaya"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCME57830.2023.10252727"},{"key":"ref22","first-page":"1","article-title":"Feasibility and suppression of adversarial patch attacks on end-to-end vehicle control","volume-title":"2020 IEEE 23rd International Conference on Intelligent Transportation Systems (ITSC)","author":"Pavlitskaya"},{"key":"ref23","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2017"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8714971"},{"key":"ref25","article-title":"Outside the box: Abstraction-based monitoring of neural networks","author":"Henzinger","year":"2019"},{"key":"ref26","article-title":"Into the unknown: Active monitoring of neural networks","author":"Lukina","year":"2020"},{"key":"ref27","article-title":"Increasing the trustworthiness of deep neural networks via accuracy monitoring","author":"Shao","year":"2020"},{"key":"ref28","doi-asserted-by":"crossref","DOI":"10.1145\/3488904.3493382","article-title":"Monitoring perception reliability in autonomous driving: Distributional shift detection for estimating the impact of input data on prediction accuracy","volume-title":"Proceedings of the 5th ACM Computer Science in Cars Symposium","author":"Hell"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3450267.3450535"},{"key":"ref30","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-27481-7_36","article-title":"Runtime monitoring for out-of-distribution detection in object detection neural networks","volume-title":"World Congress on Formal Methods","author":"Hashemi"},{"key":"ref31","article-title":"Runtime monitoring of deep neural networks using top-down context models inspired by predictive processing and dual process theory","author":"Roy"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/IROS47612.2022.9981559"},{"key":"ref33","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-40923-3_7","article-title":"A low-cost strategic monitoring approach for scalable and interpretable error detection in deep neural networks","author":"Geissler","year":"2023"},{"key":"ref34","first-page":"19","article-title":"Predicting out-of-distribution performance of deep neural networks using model conformance","volume-title":"2023 IEEE International Conference on Assured Autonomy (ICAA)","author":"Kaur"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/OJITS.2023.3236531"},{"key":"ref36","first-page":"237","article-title":"Input validation for neural networks via local robustness verification","volume-title":"2023 IEEE 23rd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","author":"Liu"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.5220\/0012459600003660"},{"key":"ref38","doi-asserted-by":"crossref","DOI":"10.1109\/CVPRW63382.2024.00356","article-title":"Run-time monitoring of 3d object detection in automated driving systems using early layer neural activation patterns","author":"Yatbaz","year":"2024"},{"key":"ref39","doi-asserted-by":"crossref","DOI":"10.1109\/IROS58592.2024.10801584","article-title":"Bam: Box abstraction monitors for real-time ood detection in object detection","author":"Wu","year":"2024"},{"key":"ref40","article-title":"Mnist handwritten digit database","volume-title":"ATT Labs","volume":"2","author":"LeCun","year":"2010"},{"key":"ref41","article-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky","year":"2009"},{"key":"ref42","author":"Xiao","year":"2017","journal-title":"Fashion-mnist: a novel image dataset for benchmarking machine learning algorithms"},{"key":"ref43","article-title":"Columbia object image library (coil100)","author":"Nene","year":"1996"},{"key":"ref44","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-10602-1_48","article-title":"Microsoft coco: Common objects in context","volume-title":"European Conference on Computer Vision","author":"Lin"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1177\/0278364913491297"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01164"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01298"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01161"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00271"}],"event":{"name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","location":"Vienna, Austria","start":{"date-parts":[[2025,10,5]]},"end":{"date-parts":[[2025,10,8]]}},"container-title":["2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11342430\/11342431\/11342555.pdf?arnumber=11342555","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T20:53:23Z","timestamp":1770843203000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11342555\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,5]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/smc58881.2025.11342555","relation":{},"subject":[],"published":{"date-parts":[[2025,10,5]]}}}