{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T05:00:21Z","timestamp":1764306021932,"version":"3.37.3"},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["92167106"],"award-info":[{"award-number":["92167106"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004731","name":"Natural Science Foundation of Zhejiang Province","doi-asserted-by":"publisher","award":["LR18F030001"],"award-info":[{"award-number":["LR18F030001"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1109\/tr.2022.3225245","type":"journal-article","created":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T18:35:33Z","timestamp":1671042933000},"page":"1580-1593","source":"Crossref","is-referenced-by-count":4,"title":["Adversarial Security Verification of Data-Driven FDC Systems"],"prefix":"10.1109","volume":"72","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2159-8980","authenticated-orcid":false,"given":"Yue","family":"Zhuo","sequence":"first","affiliation":[{"name":"State Key Laboratory of Industrial Control Technology and College of Control Science and Engineering, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2071-4380","authenticated-orcid":false,"given":"Zhiqiang","family":"Ge","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Industrial Control Technology and College of Control Science and Engineering, Zhejiang University, Hangzhou, China"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/TIE.2014.2308133"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/TR.2021.3090310"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1016\/j.arcontrol.2022.09.005"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1016\/j.ymssp.2006.12.007"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/IECON.2016.7793957"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/TII.2022.3197190"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.48550\/ARXIV.1706.06083"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/TR.2022.3161138"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/TR.2020.3032744"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/TR.2022.3171420"},{"key":"ref11","first-page":"7472","article-title":"Theoretically principled trade-off between robustness and accuracy","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Zhang","year":"2019"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1080\/00396338.2011.555586"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/MC.2020.2984868"},{"key":"ref14","first-page":"2206","article-title":"Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks","volume-title":"Proc. 37th Int. Conf. Mach. Learn.","volume":"119","author":"Croce","year":"2020"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/SP.2016.41"},{"key":"ref16","first-page":"274","article-title":"Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Athalye","year":"2018"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/SP.2017.49"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/SP46215.2023.10179303"},{"year":"2021","author":"Urban","article-title":"A review of formal methods applied to machine learning","key":"ref19"},{"key":"ref20","article-title":"Branch and bound for piecewise linear neural network verification","volume":"21","author":"Bunel","year":"2020","journal-title":"J. Mach. Learn. Res."},{"key":"ref21","article-title":"A unified view of piecewise linear neural network verification","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"31","author":"Bunel","year":"2018"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1007\/978-3-319-68167-2_19"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1007\/978-3-319-63387-9_5"},{"key":"ref24","article-title":"Efficient formal safety analysis of neural networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"31","author":"Wang","year":"2018"},{"year":"2017","author":"Dutta","article-title":"Output range analysis for deep neural networks","key":"ref25"},{"year":"2017","author":"Lomuscio","article-title":"An approach to reachability analysis for feed-forward ReLU neural networks","key":"ref26"},{"key":"ref27","first-page":"1","article-title":"Evaluating robustness of neural networks with mixed integer programming","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Tjeng","year":"2019"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1007\/978-3-319-68167-2_18"},{"key":"ref29","first-page":"6072","article-title":"Hierarchical verification for adversarial robustness","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Lim"},{"key":"ref30","article-title":"Provable certificates for adversarial examples: Fitting a ball in the union of polytopes","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"32","author":"Jordan","year":"2019"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1007\/978-3-030-32304-2_14"},{"year":"2021","author":"Bak","article-title":"The second international verification of neural networks competition (VNN-COMP 2021): Summary and results","key":"ref32"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1016\/S0169-7439(97)00061-0"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1007\/BF00994018"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1016\/0169-7439(95)80036-9"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1109\/CDC.2016.7798400"},{"volume-title":"Gurobi Optimizer Reference Manual","year":"2021","key":"ref37"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1109\/ICCV.2019.00494"},{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1016\/0098-1354(93)80018-I"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1109\/NAFIPS.2010.5548298"},{"key":"ref41","first-page":"4944","article-title":"Efficient neural network robustness certification with general activation functions","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"31","author":"Zhang","year":"2018"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1609\/aaai.v33i01.33015757"},{"key":"ref43","article-title":"Explaining and harnessing adversarial examples","volume-title":"Proc. 3rd Int. Conf. Learn. Representations","author":"Goodfellow","year":"2015"},{"article-title":"Semeion","key":"ref44"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/24\/10339143\/09985449.pdf?arnumber=9985449","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,15]],"date-time":"2024-02-15T18:49:52Z","timestamp":1708022992000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9985449\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12]]},"references-count":44,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tr.2022.3225245","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"type":"print","value":"0018-9529"},{"type":"electronic","value":"1558-1721"}],"subject":[],"published":{"date-parts":[[2023,12]]}}}