{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T09:12:58Z","timestamp":1774343578556,"version":"3.50.1"},"reference-count":100,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100006822","name":"Commonwealth of Virginia","doi-asserted-by":"publisher","award":["CoVA CCI: C-Q122-WM-02"],"award-info":[{"award-number":["CoVA CCI: C-Q122-WM-02"]}],"id":[{"id":"10.13039\/100006822","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1748737"],"award-info":[{"award-number":["1748737"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2146295"],"award-info":[{"award-number":["2146295"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1109\/tdsc.2023.3242653","type":"journal-article","created":{"date-parts":[[2023,2,6]],"date-time":"2023-02-06T18:59:01Z","timestamp":1675709941000},"page":"12-30","source":"Crossref","is-referenced-by-count":22,"title":["Hybrid Knowledge and Data Driven Synthesis of Runtime Monitors for Cyber-Physical Systems"],"prefix":"10.1109","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3663-7447","authenticated-orcid":false,"given":"Xugui","family":"Zhou","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Virginia, Charlottesville, VA, USA"}]},{"given":"Bulbul","family":"Ahmed","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"given":"James H.","family":"Aylor","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Virginia, Charlottesville, VA, USA"}]},{"given":"Philip","family":"Asare","sequence":"additional","affiliation":[{"name":"University of Toronto, Toronto, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5279-842X","authenticated-orcid":false,"given":"Homa","family":"Alemzadeh","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Virginia, Charlottesville, VA, USA"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Class 2 device recall medtronic MiniMed paradigm veo insulin pump","year":"2020"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102150"},{"key":"ref3","article-title":"New car hacking research: 2017, remote attack Tesla motors again","year":"2017"},{"key":"ref4","article-title":"A Google self-driving car caused a crash for the first time","author":"Chris","year":"2016","journal-title":"The Verge"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2017.4541031"},{"key":"ref6","article-title":"An STPA primer","author":"Leveson","year":"2013"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2387487"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3166\/ejc.18.217-238"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CoDIT.2019.8820492"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.49"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2898375.2898391"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2019.2915045"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS49844.2020.00028"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966959"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2434958"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3453155"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48063.2020.00054"},{"key":"ref18","first-page":"349","article-title":"Software-based realtime recovery from sensor attacks on robotic vehicles","volume-title":"Proc. 23rd Int. Symp. Res. Attacks, Intrusions Defenses","author":"Choi","year":"2020"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48987.2021.00020"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTCOMP.2019.00031"},{"key":"ref21","article-title":"On transparency of machine learning models: A position paper","volume-title":"Proc. AI Social Good Workshop","author":"Zhou"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/WAIN52551.2021.00009"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1089\/big.2016.0051"},{"key":"ref24","article-title":"Formal verification of an approach for systematic false positive mitigation in safe automated driving system","author":"Mehmed","year":"2020"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243752"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106282"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.43"},{"key":"ref28","article-title":"Policy for device software functions and mobile medical applications","year":"2022"},{"key":"ref29","article-title":"The cost of poor quality software in the us: A 2018 report","author":"Krasner","year":"2018","journal-title":"Consortium Inf. Softw. Qual."},{"key":"ref30","first-page":"5","article-title":"W32.Duqu: The precursor to the next stuxnet","volume-title":"Proc. 5th USENIX Workshop Large-Scale Exploits Emergent Threats","author":"Chien"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2019.00045"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/8179.001.0001"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2165270"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2165689"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6871677"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48987.2021.00058"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1504\/IJDMB.2014.064891"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2018.00030"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2019.00027"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.2172\/1044959"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.18130\/v3wg3b"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03769-7_4"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ISIP.2008.79"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s00236-017-0294-5"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/s10703-019-00332-1"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2049662.2049669"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.laa.2012.02.005"},{"key":"ref52","article-title":"A semantic loss function for deep learning with symbolic knowledge","author":"Xu","year":"2018"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.17925\/USE.2017.13.01.17"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/S0001-4575(02)00022-2"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1089\/dia.2008.0138"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1038\/nrendo.2017.3"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.2337\/diacare.21.11.1870"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2018.00016"},{"key":"ref59","article-title":"Autonomous vehicle radar perception in 360 degrees","author":"Shane","year":"2019","journal-title":"Nvidia Developer Blog"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1186\/s12902-018-0300-0"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1177\/1932296813514502"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1177\/193229680900300508"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1089\/dia.2013.0377"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1177\/193229680900300106"},{"key":"ref67","article-title":"Guidance on the assurance of machine learning in autonomous systems (AMLAS)","author":"Hawkins","year":"2021"},{"key":"ref68","first-page":"1","article-title":"Design and validation of an open-source closed-loop testbed for artificial pancreas systems","volume-title":"Proc. IEEE\/ACM Int. Conf. Connected Health Appl. Syst. Eng. Technol.","author":"Zhou"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/HEALTH.2011.6026732"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/RBME.2017.2749038"},{"key":"ref73","article-title":"Class 2 device recall MiniMed 640g insulin infusion pump","year":"2020"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/2735960.2735980"},{"key":"ref75","article-title":"To make a robot secure: An experimental analysis of cyber security threats against teleoperated surgical robots","author":"Bonaci","year":"2015"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2019.00025"},{"key":"ref77","article-title":"Maude adverse event report","year":"2022"},{"key":"ref78","article-title":"MAUDE adverse event report","year":"2022"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA40945.2020.9197071"},{"key":"ref80","article-title":"Pre-crash scenario typology for crash avoidance research","author":"Najm","year":"2007"},{"key":"ref81","article-title":"Class 2 device recall Medtronic MiniMed paradigm model MMT723K insulin pump","year":"2021"},{"issue":"1","key":"ref82","first-page":"303","article-title":"Its insanely easy to hack hospital equipment","volume":"16","author":"Zetter","year":"2014","journal-title":"Wired Mag."},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102150"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3052182"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2019.2903429"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/IoTDI.2018.00013"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2014.7039363"},{"key":"ref89","article-title":"Bringing forward collision warnings to our open source self-driving car","year":"2018"},{"key":"ref90","article-title":"Adam: A method for stochastic optimization","author":"Kingma","year":"2014"},{"key":"ref92","article-title":"Understanding insulin on board (IoB) calculations","year":"2017"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/DSN53405.2022.00020"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1056\/NEJMoa1907863"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.052213.00046"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W54100.2022.00017"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00035"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1016\/j.ecl.2019.10.005"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1177\/1932296816665635"},{"key":"ref100","first-page":"877","article-title":"Towards robust LiDAR-based perception in autonomous driving: General black-box adversarial sensor attack and countermeasures","volume-title":"Proc. 29th USENIX Secur. Symp.","author":"Sun"},{"key":"ref101","first-page":"895","article-title":"SAVIOR: Securing autonomous vehicles with robust physical invariants","volume-title":"Proc. 29th USENIX Secur. Symp.","author":"Quinonez"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1145\/3471621.3471869"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3072957"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.23919\/FMCAD.2019.8894264"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2019.8813875"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/DASC50938.2020.9256446"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67531-2_13"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2014.7039487"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2892140"},{"key":"ref110","article-title":"Policy distillation","author":"Rusu","year":"2015"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/8858\/10400751\/10038568-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/10400751\/10038568.pdf?arnumber=10038568","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,18]],"date-time":"2024-01-18T01:26:12Z","timestamp":1705541172000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10038568\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1]]},"references-count":100,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2023.3242653","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1]]}}}