{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T10:16:27Z","timestamp":1770977787558,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T00:00:00Z","timestamp":1608508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100007297","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-17-1-2896"],"award-info":[{"award-number":["N00014-17-1-2896"]}],"id":[{"id":"10.13039\/100007297","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,21]]},"DOI":"10.1145\/3324884.3416560","type":"proceedings-article","created":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T23:39:02Z","timestamp":1611790742000},"page":"784-796","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["NeuroDiff"],"prefix":"10.1145","author":[{"given":"Brandon","family":"Paulsen","sequence":"first","affiliation":[{"name":"University of Southern California"}]},{"given":"Jingbo","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Southern California"}]},{"given":"Jiawei","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Southern California"}]},{"given":"Chao","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Southern California"}]}],"member":"320","published-online":{"date-parts":[[2021,1,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"21st European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning","author":"Anguita Davide","year":"2013","unstructured":"Davide Anguita, Alessandro Ghio, Luca Oneto, Xavier Parra, and Jorge L. Reyes-Ortiz. 2013. A Public Domain Dataset for Human Activity Recognition Using Smartphones. 21st European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (2013)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354245"},{"key":"e_1_3_2_1_3_1","volume-title":"Measuring Neural Net Robustness with Constraints. In Annual Conference on Neural Information Processing Systems. 2613--2621","author":"Bastani Osbert","year":"2016","unstructured":"Osbert Bastani, Yani Ioannou, Leonidas Lampropoulos, Dimitrios Vytiniotis, Aditya V. Nori, and Antonio Criminisi. 2016. Measuring Neural Net Robustness with Constraints. In Annual Conference on Neural Information Processing Systems. 2613--2621."},{"key":"e_1_3_2_1_4_1","volume-title":"Towards Evaluating the Robustness of Neural Networks. In IEEE Symposium on Security and Privacy. 39--57","author":"Carlini Nicholas","unstructured":"Nicholas Carlini and David A. Wagner. 2017. Towards Evaluating the Robustness of Neural Networks. In IEEE Symposium on Security and Privacy. 39--57."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/512950.512973"},{"key":"e_1_3_2_1_6_1","volume-title":"International Conference on Uncertainty in Artificial Intelligence. 550--559","author":"Dvijotham Krishnamurthy","year":"2018","unstructured":"Krishnamurthy Dvijotham, Robert Stanforth, Sven Gowal, Timothy A. Mann, and Pushmeet Kohli. 2018. A Dual Approach to Scalable Verification of Deep Networks. In International Conference on Uncertainty in Artificial Intelligence. 550--559."},{"key":"e_1_3_2_1_7_1","volume-title":"ATVA 2017, Pune, India, October 3--6, 2017, Proceedings. 269--286","author":"Ehlers R\u00fcdiger","year":"2017","unstructured":"R\u00fcdiger Ehlers. 2017. Formal Verification of Piece-Wise Linear Feed-Forward Neural Networks. In Automated Technology for Verification and Analysis - 15th International Symposium, ATVA 2017, Pune, India, October 3--6, 2017, Proceedings. 269--286."},{"key":"e_1_3_2_1_8_1","volume-title":"International Conference on Machine Learning. 1931--1941","author":"Fischer Marc","unstructured":"Marc Fischer, Mislav Balunovic, Dana Drachsler-Cohen, Timon Gehr, Ce Zhang, and Martin T. Vechev. 2019. DL2: Training and Querying Neural Networks with Logic. In International Conference on Machine Learning. 1931--1941."},{"key":"e_1_3_2_1_9_1","volume-title":"IEEE Symposium on Security and Privacy. 3--18","author":"Gehr Timon","unstructured":"Timon Gehr, Matthew Mirman, Dana Drachsler-Cohen, Petar Tsankov, Swarat Chaudhuri, and Martin T. Vechev. 2018. AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation. In IEEE Symposium on Security and Privacy. 3--18."},{"key":"e_1_3_2_1_10_1","volume-title":"Simplifying Neural Networks with the Marabou Verification Engine. arXiv preprint arXiv:1910.12396","author":"Gokulanathan Sumathi","year":"2019","unstructured":"Sumathi Gokulanathan, Alexander Feldsher, Adi Malca, Clark Barrett, and Guy Katz. 2019. Simplifying Neural Networks with the Marabou Verification Engine. arXiv preprint arXiv:1910.12396 (2019)."},{"key":"e_1_3_2_1_11_1","volume-title":"Explaining and Harnessing Adversarial Examples. In International Conference on Learning Representations.","author":"Goodfellow Ian J.","year":"2015","unstructured":"Ian J. Goodfellow, Jonathon Shlens, and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_12_1","volume-title":"ATVA 2018, Los Angeles, CA, USA, October 7--10, 2018, Proceedings. 3--19","author":"Gopinath Divya","unstructured":"Divya Gopinath, Guy Katz, Corina S. Pasareanu, and Clark W. Barrett. 2018. DeepSafe: A Data-Driven Approach for Assessing Robustness of Neural Networks. In Automated Technology for Verification and Analysis - 16th International Symposium, ATVA 2018, Los Angeles, CA, USA, October 7--10, 2018, Proceedings. 3--19."},{"key":"e_1_3_2_1_13_1","volume-title":"Conc-iSE: Incremental Symbolic Execution of Concurrent Software. In IEEE\/ACM International Conference On Automated Software Engineering.","author":"Guo Shengjian","year":"2016","unstructured":"Shengjian Guo, Markus Kusano, and Chao Wang. 2016. Conc-iSE: Incremental Symbolic Execution of Concurrent Software. In IEEE\/ACM International Conference On Automated Software Engineering."},{"key":"e_1_3_2_1_14_1","volume-title":"Trained Quantization and Huffman Coding. In International Conference on Learning Representations.","author":"Han Song","unstructured":"Song Han, Huizi Mao, and William J. Dally. 2016. Deep Compression: Compressing Deep Neural Network with Pruning, Trained Quantization and Huffman Coding. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_15_1","volume-title":"Safety Verification of Deep Neural Networks. In International Conference on Computer Aided Verification. 3--29","author":"Huang Xiaowei","year":"2017","unstructured":"Xiaowei Huang, Marta Kwiatkowska, Sen Wang, and Min Wu. 2017. Safety Verification of Deep Neural Networks. In International Conference on Computer Aided Verification. 3--29."},{"key":"e_1_3_2_1_16_1","volume-title":"Owen","author":"Julian Kyle D.","year":"2018","unstructured":"Kyle D. Julian, Mykel J. Kochenderfer, and Michael P. Owen. 2018. Deep Neural Network Compression for Aircraft Collision Avoidance Systems. CoRR abs\/1810.04240 (2018). arXiv:1810.04240 http:\/\/arxiv.org\/abs\/1810.04240"},{"key":"e_1_3_2_1_17_1","volume-title":"Reluplex: An Efficient SMT Solver for Verifying Deep Neural Networks. In International Conference on Computer Aided Verification. 97--117","author":"Katz Guy","unstructured":"Guy Katz, Clark W. Barrett, David L. Dill, Kyle Julian, and Mykel J. Kochenderfer. 2017. Reluplex: An Efficient SMT Solver for Verifying Deep Neural Networks. In International Conference on Computer Aided Verification. 97--117."},{"key":"e_1_3_2_1_18_1","volume-title":"The Marabou Framework for Verification and Analysis of Deep Neural Networks. In International Conference on Computer Aided Verification. 443--452","author":"Katz Guy","unstructured":"Guy Katz, Derek A. Huang, Duligur Ibeling, Kyle Julian, Christopher Lazarus, Rachel Lim, Parth Shah, Shantanu Thakoor, Haoze Wu, Aleksandar Zeljic, David L. Dill, Mykel J. Kochenderfer, and Clark W. Barrett. 2019. The Marabou Framework for Verification and Analysis of Deep Neural Networks. In International Conference on Computer Aided Verification. 443--452."},{"key":"e_1_3_2_1_19_1","volume-title":"International Conference on Learning Representations.","author":"Kurakin Alexey","year":"2017","unstructured":"Alexey Kurakin, Ian J. Goodfellow, and Samy Bengio. 2017. Adversarial examples in the physical world. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491452"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238202"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236082"},{"key":"e_1_3_2_1_24_1","volume-title":"International Conference on Learning Representations","author":"Madry Aleksander","year":"2018","unstructured":"Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2018. Towards deep learning models resistant to adversarial attacks. International Conference on Learning Representations (2018)."},{"key":"e_1_3_2_1_25_1","volume-title":"Differentiable Abstract Interpretation for Provably Robust Neural Networks. In International Conference on Machine Learning. 3575--3583","author":"Mirman Matthew","unstructured":"Matthew Mirman, Timon Gehr, and Martin T. Vechev. 2018. Differentiable Abstract Interpretation for Provably Robust Neural Networks. In International Conference on Machine Learning. 3575--3583."},{"key":"e_1_3_2_1_26_1","volume-title":"Adversarial Training and Provable Defenses: Bridging the Gap. International Conference on Learning Representations.","author":"Mislav Balunovic Martin Vechev","year":"2020","unstructured":"Martin Vechev Mislav Balunovic. 2020. Adversarial Training and Provable Defenses: Bridging the Gap. International Conference on Learning Representations."},{"key":"e_1_3_2_1_27_1","volume-title":"Introduction to interval analysis","author":"Moore Ramon E","unstructured":"Ramon E Moore, R Baker Kearfott, and Michael J Cloud. 2009. Introduction to interval analysis. Vol. 110. Siam."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298640"},{"key":"e_1_3_2_1_30_1","volume-title":"International Conference on Software Engineering. 176--187","author":"Nilizadeh Shirin","unstructured":"Shirin Nilizadeh, Yannic Noller, and Corina S. Pasareanu. 2019. DifFuzz: differential fuzzing for side-channel analysis. In International Conference on Software Engineering. 176--187."},{"key":"e_1_3_2_1_31_1","volume-title":"Tensorfuzz: Debugging neural networks with coverage-guided fuzzing. arXiv preprint arXiv:1807.10875","author":"Odena Augustus","year":"2018","unstructured":"Augustus Odena and Ian Goodfellow. 2018. Tensorfuzz: Debugging neural networks with coverage-guided fuzzing. arXiv preprint arXiv:1807.10875 (2018)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Brandon Paulsen. 2020. ReluDiff-ICSE2020-Artifact. https:\/\/github.com\/pauls658\/ReluDiff-ICSE2020-Artifact.","DOI":"10.1145\/3377811.3380337"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380337"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132785"},{"key":"e_1_3_2_1_35_1","volume-title":"Directed Incremental Symbolic Execution. In ACM SIGPLAN Conference on Programming Language Design and Implementation. ACM","author":"Person Suzette","year":"2011","unstructured":"Suzette Person, Guowei Yang, Neha Rungta, and Sarfraz Khurshid. 2011. Directed Incremental Symbolic Execution. In ACM SIGPLAN Conference on Programming Language Design and Implementation. ACM, New York, NY, USA, 504--515."},{"key":"e_1_3_2_1_36_1","volume-title":"International Conference on Learning Representations.","author":"Raghunathan Aditi","year":"2018","unstructured":"Aditi Raghunathan, Jacob Steinhardt, and Percy Liang. 2018. Certified Defenses against Adversarial Examples. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/248233.248262"},{"key":"e_1_3_2_1_38_1","volume-title":"Reachability Analysis of Deep Neural Networks with Provable Guarantees. In International Joint Conference on Artificial Intelligence. 2651--2659","author":"Ruan Wenjie","year":"2018","unstructured":"Wenjie Ruan, Xiaowei Huang, and Marta Kwiatkowska. 2018. Reachability Analysis of Deep Neural Networks with Provable Guarantees. In International Joint Conference on Artificial Intelligence. 2651--2659."},{"key":"e_1_3_2_1_39_1","unstructured":"Gagandeep Singh Rupanshu Ganvir Markus P\u00c3ijschel and Martin Vechev. 2019. Beyond the Single Neuron Convex Barrier for Neural Network Certification. In Advances in Neural Information Processing Systems (NeurIPS)."},{"key":"e_1_3_2_1_40_1","volume-title":"ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages","author":"Singh Gagandeep","year":"2019","unstructured":"Gagandeep Singh, Timon Gehr, Markus P\u00fcschel, and Martin T. Vechev. 2019. An abstract domain for certifying neural networks. ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages (2019), 41:1--41:30."},{"key":"e_1_3_2_1_41_1","volume-title":"Boosting Robustness Certification of Neural Networks. In International Conference on Learning Representations.","author":"Singh Gagandeep","unstructured":"Gagandeep Singh, Timon Gehr, Markus P\u00fcschel, and Martin T. Vechev. 2019. Boosting Robustness Certification of Neural Networks. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238172"},{"key":"e_1_3_2_1_43_1","volume-title":"Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199","author":"Szegedy Christian","year":"2013","unstructured":"Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. 2013. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180220"},{"key":"e_1_3_2_1_45_1","volume-title":"International Conference on Learning Representations","author":"Tjeng Vincent","year":"2019","unstructured":"Vincent Tjeng, Kai Xiao, and Russ Tedrake. 2019. Evaluating robustness of neural networks with mixed integer programming. International Conference on Learning Representations (2019)."},{"key":"e_1_3_2_1_46_1","unstructured":"Liwei Wang Lunjia Hu Jiayuan Gu Zhiqiang Hu Yue Wu Kun He and John Hopcroft. 2018. Towards understanding learning representations: To what extent do different neural networks learn the same representation. In Advances in Neural Information Processing Systems. 9584--9593."},{"key":"e_1_3_2_1_47_1","volume-title":"Efficient Formal Safety Analysis of Neural Networks. In Annual Conference on Neural Information Processing Systems. 6369--6379","author":"Wang Shiqi","year":"2018","unstructured":"Shiqi Wang, Kexin Pei, Justin Whitehouse, Junfeng Yang, and Suman Jana. 2018. Efficient Formal Safety Analysis of Neural Networks. In Annual Conference on Neural Information Processing Systems. 6369--6379."},{"key":"e_1_3_2_1_48_1","volume-title":"USENIX Security Symposium. 1599--1614","author":"Wang Shiqi","year":"2018","unstructured":"Shiqi Wang, Kexin Pei, Justin Whitehouse, Junfeng Yang, and Suman Jana. 2018. Formal Security Analysis of Neural Networks using Symbolic Intervals. In USENIX Security Symposium. 1599--1614."},{"key":"e_1_3_2_1_49_1","volume-title":"Towards Fast Computation of Certified Robustness for ReLU Networks. In International Conference on Machine Learning. 5273--5282","author":"Weng Tsui-Wei","unstructured":"Tsui-Wei Weng, Huan Zhang, Hongge Chen, Zhao Song, Cho-Jui Hsieh, Luca Daniel, Duane S. Boning, and Inderjit S. Dhillon. 2018. Towards Fast Computation of Certified Robustness for ReLU Networks. In International Conference on Machine Learning. 5273--5282."},{"key":"e_1_3_2_1_50_1","volume-title":"International Conference on Machine Learning. 5283--5292","author":"Wong Eric","unstructured":"Eric Wong and J. Zico Kolter. 2018. Provable Defenses against Adversarial Examples via the Convex Outer Adversarial Polytope. In International Conference on Machine Learning. 5283--5292."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330579"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/800"},{"key":"e_1_3_2_1_53_1","volume-title":"Automatically Evading Classifiers: A Case Study on PDF Malware Classifiers. In Network and Distributed System Security Symposium.","author":"Xu Weilin","year":"2016","unstructured":"Weilin Xu, Yanjun Qi, and David Evans. 2016. Automatically Evading Classifiers: A Case Study on PDF Malware Classifiers. In Network and Distributed System Security Symposium."},{"key":"e_1_3_2_1_54_1","unstructured":"Huan Zhang Tsui-Wei Weng Pin-Yu Chen Cho-Jui Hsieh and Luca Daniel. 2018. Efficient neural network robustness certification with general activation functions. In Advances in neural information processing systems. 4939--4948."},{"key":"e_1_3_2_1_55_1","volume-title":"18th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2012","author":"Zhang Xianyi","year":"2012","unstructured":"Xianyi Zhang, Qian Wang, and Yunquan Zhang. 2012. Model-driven Level 3 BLAS Performance Optimization on Loongson 3A Processor. In 18th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2012, Singapore, December 17--19, 2012. 684--691."}],"event":{"name":"ASE '20: 35th IEEE\/ACM International Conference on Automated Software Engineering","location":"Virtual Event Australia","acronym":"ASE '20","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416560","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3416560","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3416560","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:38Z","timestamp":1750197698000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416560"}},"subtitle":["scalable differential verification of neural networks using fine-grained approximation"],"short-title":[],"issued":{"date-parts":[[2020,12,21]]},"references-count":55,"alternative-id":["10.1145\/3324884.3416560","10.1145\/3324884"],"URL":"https:\/\/doi.org\/10.1145\/3324884.3416560","relation":{},"subject":[],"published":{"date-parts":[[2020,12,21]]},"assertion":[{"value":"2021-01-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}