{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T20:12:34Z","timestamp":1762459954216,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T00:00:00Z","timestamp":1608508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"JST-Mirai Program","award":["JPMJMI18BB"],"award-info":[{"award-number":["JPMJMI18BB"]}]},{"DOI":"10.13039\/501100006512","name":"Nanyang Technological University","doi-asserted-by":"publisher","award":["NGF-2019-06-024"],"award-info":[{"award-number":["NGF-2019-06-024"]}],"id":[{"id":"10.13039\/501100006512","id-type":"DOI","asserted-by":"publisher"}]},{"name":"JSPS KAKENHI","award":["20H04168,19K24348,19H04086"],"award-info":[{"award-number":["20H04168,19K24348,19H04086"]}]},{"DOI":"10.13039\/501100001459","name":"Ministry of Education - Singapore","doi-asserted-by":"publisher","award":["2018-T1-002-069"],"award-info":[{"award-number":["2018-T1-002-069"]}],"id":[{"id":"10.13039\/501100001459","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001381","name":"National Research Foundation Singapore","doi-asserted-by":"publisher","award":["NRF2018NCR-NCR005-0001,NSOE003-0001,NRFI06-2020-0022"],"award-info":[{"award-number":["NRF2018NCR-NCR005-0001,NSOE003-0001,NRFI06-2020-0022"]}],"id":[{"id":"10.13039\/501100001381","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,21]]},"DOI":"10.1145\/3324884.3416564","type":"proceedings-article","created":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T23:39:02Z","timestamp":1611790742000},"page":"423-435","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Marble"],"prefix":"10.1145","author":[{"given":"Xiaoning","family":"Du","sequence":"first","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"given":"Yi","family":"Li","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"given":"Xiaofei","family":"Xie","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"given":"Lei","family":"Ma","sequence":"additional","affiliation":[{"name":"Kyushu University, Japan"}]},{"given":"Yang","family":"Liu","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"given":"Jianjun","family":"Zhao","sequence":"additional","affiliation":[{"name":"Kyushu University, Japan"}]}],"member":"320","published-online":{"date-parts":[[2021,1,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2018. Jigsaw Toxic Comment Classification Challenge. https:\/\/www.kaggle.com\/c\/jigsaw-toxic-comment-classification-challenge"},{"key":"e_1_3_2_1_2_1","unstructured":"2018. Mozilla's DeepSpeech. https:\/\/github.com\/mozilla\/DeepSpeech."},{"key":"e_1_3_2_1_3_1","unstructured":"2020. Amazon Alexa. https:\/\/developer.amazon.com\/alexa"},{"key":"e_1_3_2_1_4_1","unstructured":"2020. Categorical Distribution. https:\/\/en.wikipedia.org\/wiki\/Categorical_distribution"},{"key":"e_1_3_2_1_5_1","unstructured":"2020. MARBLE home page. https:\/\/sites.google.com\/view\/marble-rnn\/home"},{"key":"e_1_3_2_1_6_1","unstructured":"Mislav Balunovic Maximilian Baader Gagandeep Singh Timon Gehr and Martin Vechev. 2019. Certifying Geometric Robustness of Neural Networks. In Advances in Neural Information Processing Systems 32."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/3157382.3157391"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40994-3_25"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33013240"},{"key":"e_1_3_2_1_10_1","volume-title":"IEEE Symposium on. 39--57","author":"Carlini Nicholas","year":"2017","unstructured":"Nicholas Carlini and David Wagner. 2017. Towards evaluating the robustness of neural networks. In Security and Privacy (SP), IEEE Symposium on. 39--57."},{"key":"e_1_3_2_1_11_1","volume-title":"Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. (jan","author":"Carlini Nicholas","year":"2018","unstructured":"Nicholas Carlini and David Wagner. 2018. Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. (jan 2018). arXiv:1801.01944 http:\/\/arxiv.org\/abs\/1801.01944"},{"key":"e_1_3_2_1_12_1","volume-title":"Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. arXiv preprint arXiv:1911.01840","author":"Chen Guangke","year":"2019","unstructured":"Guangke Chen, Sen Chen, Lingling Fan, Xiaoning Du, Zhe Zhao, Fu Song, and Yang Liu. 2019. Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. arXiv preprint arXiv:1911.01840 (2019)."},{"key":"e_1_3_2_1_13_1","volume-title":"Seq2sick: Evaluating the robustness of sequence-to-sequence models with adversarial examples. arXiv preprint arXiv:1803.01128","author":"Cheng Minhao","year":"2018","unstructured":"Minhao Cheng, Jinfeng Yi, Huan Zhang, Pin-Yu Chen, and Cho-Jui Hsieh. 2018. Seq2sick: Evaluating the robustness of sequence-to-sequence models with adversarial examples. arXiv preprint arXiv:1803.01128 (2018)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Dan Ciregan Ueli Meier and J\u00fcrgen Schmidhuber. 2012. Multi-column deep neural networks for image classification. In CVPR. 3642--3649.","DOI":"10.1109\/CVPR.2012.6248110"},{"key":"e_1_3_2_1_15_1","volume-title":"Houdini: Fooling Deep Structured Prediction Models. (jul","author":"Cisse Moustapha","year":"2017","unstructured":"Moustapha Cisse, Yossi Adi, Natalia Neverova, and Joseph Keshet. 2017. Houdini: Fooling Deep Structured Prediction Models. (jul 2017). arXiv:1707.05373 http:\/\/arxiv.org\/abs\/1707.05373"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/512950.512973"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1093\/logcom\/2.4.511"},{"key":"e_1_3_2_1_18_1","unstructured":"Xiaoning Du. 2019. Towards secure and robust stateful deep learning systems with model-based analysis. (2019)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","unstructured":"Xiaoning Du Yi Li Xiaofei Xie Lei Ma Yang Liu and Jianjun Zhao. 2020. Supplementary Materials for 'Marble: Model-based Robustness Analysis of Stateful DeepLearning Systems'. 10.21979\/N9\/TTTSFK","DOI":"10.21979\/N9\/TTTSFK"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Xiaoning Du Xiaofei Xie Yi Li Lei Ma Yang Liu and Jianjun Zhao. 2019. Deep-Stellar: Model-Based Quantitative Analysis of Stateful Deep Learning Systems. In FSE. 477--487.","DOI":"10.1145\/3338906.3338954"},{"key":"e_1_3_2_1_21_1","volume-title":"Hotflip: White-box adversarial examples for text classification. arXiv preprint arXiv:1712.06751","author":"Ebrahimi Javid","year":"2017","unstructured":"Javid Ebrahimi, Anyi Rao, Daniel Lowd, and Dejing Dou. 2017. Hotflip: White-box adversarial examples for text classification. arXiv preprint arXiv:1712.06751 (2017)."},{"key":"e_1_3_2_1_22_1","volume-title":"Robust Physical-World Attacks on Deep Learning Visual Classification. In 2018 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2018","author":"Eykholt Kevin","year":"2018","unstructured":"Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Amir Rahmati, Chaowei Xiao, Atul Prakash, Tadayoshi Kohno, and Dawn Song. 2018. Robust Physical-World Attacks on Deep Learning Visual Classification. In 2018 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2018, Salt Lake City, UT, USA, June 18--22, 2018. 1625--1634."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00016"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00058"},{"volume-title":"Introduction to the Theory of Finite-State Machines","author":"Gill Arthur","key":"e_1_3_2_1_25_1","unstructured":"Arthur Gill. 1962. Introduction to the Theory of Finite-State Machines. McGraw-Hill. https:\/\/books.google.com.sg\/books?id=2IzQAAAAMAAJ"},{"key":"e_1_3_2_1_26_1","unstructured":"Y. Gong and C. Poellabauer. 2017. Crafting Adversarial Examples For Speech Paralinguistics Applications. ArXiv e-prints (Nov. 2017). arXiv:1711.03280"},{"key":"e_1_3_2_1_27_1","volume-title":"Explaining and Harnessing Adversarial Examples. In International Conference on Learning Representations. http:\/\/arxiv.org\/abs\/1412","author":"Goodfellow Ian","year":"2015","unstructured":"Ian Goodfellow, Jonathon Shlens, and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. In International Conference on Learning Representations. http:\/\/arxiv.org\/abs\/1412.6572"},{"key":"e_1_3_2_1_28_1","article-title":"How to Combine Independent Data Sets for the Same Quantity. Chaos","volume":"21","author":"Hill Theodore P.","year":"2011","unstructured":"Theodore P. Hill and Jack J. Miller. 2011. How to Combine Independent Data Sets for the Same Quantity. Chaos: An Interdisciplinary Journal of Nonlinear Science 21, 3 (2011).","journal-title":"An Interdisciplinary Journal of Nonlinear Science"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2205597"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00126"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D17-1215"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63387-9_5"},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the 36th International Conference on Machine Learning (Proceedings of Machine Learning Research), Kamalika Chaudhuri and Ruslan Salakhutdinov (Eds.)","volume":"97","author":"Ko Ching-Yun","year":"2019","unstructured":"Ching-Yun Ko, Zhaoyang Lyu, Lily Weng, Luca Daniel, Ngai Wong, and Dahua Lin. 2019. POPQORN: Quantifying Robustness of Recurrent Neural Networks. In Proceedings of the 36th International Conference on Machine Learning (Proceedings of Machine Learning Research), Kamalika Chaudhuri and Ruslan Salakhutdinov (Eds.), Vol. 97. PMLR, Long Beach, California, USA, 3468--3477. http:\/\/proceedings.mlr.press\/v97\/ko19a.html"},{"volume-title":"Theory of point estimation","author":"Lehmann Erich L","key":"e_1_3_2_1_34_1","unstructured":"Erich L Lehmann and George Casella. 2006. Theory of point estimation. Springer Science & Business Media."},{"key":"e_1_3_2_1_35_1","volume-title":"Textbugger: Generating adversarial text against real-world applications. arXiv preprint arXiv:1812.05271","author":"Li Jinfeng","year":"2018","unstructured":"Jinfeng Li, Shouling Ji, Tianyu Du, Bo Li, and Ting Wang. 2018. Textbugger: Generating adversarial text against real-world applications. arXiv preprint arXiv:1812.05271 (2018)."},{"key":"e_1_3_2_1_36_1","volume-title":"Understanding neural networks through representation erasure. arXiv preprint arXiv:1612.08220","author":"Li Jiwei","year":"2016","unstructured":"Jiwei Li, Will Monroe, and Dan Jurafsky. 2016. Understanding neural networks through representation erasure. arXiv preprint arXiv:1612.08220 (2016)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.3115\/1072228.1072378"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238202"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/2002472.2002491"},{"key":"e_1_3_2_1_40_1","volume-title":"On a test of whether one of two random variables is stochastically larger than the other. The annals of mathematical statistics","author":"Mann Henry B","year":"1947","unstructured":"Henry B Mann and Donald R Whitney. 1947. On a test of whether one of two random variables is stochastically larger than the other. The annals of mathematical statistics (1947), 50--60."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Volodymyr Mnih Koray Kavukcuoglu David Silver Andrei A Rusu Joel Veness Marc G Bellemare Alex Graves Martin Riedmiller Andreas K Fidjeland Georg Ostrovski et al. 2015. Human-level control through deep reinforcement learning. Nature 518 7540 (2015) 529.","DOI":"10.1038\/nature14236"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2016.7795300"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132785"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"key":"e_1_3_2_1_45_1","volume-title":"Markov Decision Processes: Discrete Stochastic Dynamic Programming","author":"Puterman Martin L.","unstructured":"Martin L. Puterman. 1994. Markov Decision Processes: Discrete Stochastic Dynamic Programming (1st ed.). John Wiley & Sons, Inc., New York, NY, USA.","edition":"1"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-1076"},{"key":"e_1_3_2_1_47_1","volume-title":"Julian Schrittwieser, Ioannis Antonoglou, Veda Panneershelvam, Marc Lanctot, et al.","author":"Silver David","year":"2016","unstructured":"David Silver, Aja Huang, Chris J Maddison, Arthur Guez, Laurent Sifre, George Van Den Driessche, Julian Schrittwieser, Ioannis Antonoglou, Veda Panneershelvam, Marc Lanctot, et al. 2016. Mastering the game of Go with deep neural networks and tree search. Nature 529, 7587 (2016), 484."},{"key":"e_1_3_2_1_48_1","unstructured":"Gagandeep Singh Timon Gehr Matthew Mirman Markus P\u00fcschel and Martin Vechev. 2018. Fast and effective robustness certification. In Advances in Neural Information Processing Systems. 10802--10813."},{"key":"e_1_3_2_1_49_1","article-title":"Universality, Characteristic Kernels and RKHS Embedding of Measures","author":"Sriperumbudur Bharath K.","year":"2011","unstructured":"Bharath K. Sriperumbudur, Kenji Fukumizu, and Gert R. G. Lanckriet. 2011. Universality, Characteristic Kernels and RKHS Embedding of Measures. J. Mach. Learn. Res. 12, null (July 2011), 2389--2410.","journal-title":"J. Mach. Learn. Res. 12, null"},{"key":"e_1_3_2_1_50_1","first-page":"1517","article-title":"Hilbert Space Embeddings and Metrics on Probability Measures","volume":"11","author":"Sriperumbudur Bharath K.","year":"2009","unstructured":"Bharath K. Sriperumbudur, Arthur Gretton, Kenji Fukumizu, Bernhard Sch\u00f6lkopf, and Gert R. G. Lanckriet. 2009. Hilbert Space Embeddings and Metrics on Probability Measures. J. Mach. Learn. Res. 11 (2009), 1517--1561.","journal-title":"J. Mach. Learn. Res."},{"key":"e_1_3_2_1_51_1","volume-title":"Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199","author":"Szegedy Christian","year":"2013","unstructured":"Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. 2013. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013)."},{"key":"e_1_3_2_1_52_1","unstructured":"The BBC. 2016. AI image recognition fooled by single pixel change. https:\/\/www.bbc.com\/news\/technology-41845878"},{"key":"e_1_3_2_1_53_1","volume-title":"Probabilistic model checking modulo theories. In fourth international conference on the quantitative evaluation of systems (QEST","author":"Wachter Bjorn","year":"2007","unstructured":"Bjorn Wachter, Lijun Zhang, and Holger Hermanns. 2007. Probabilistic model checking modulo theories. In fourth international conference on the quantitative evaluation of systems (QEST 2007). IEEE, 129--140."},{"key":"e_1_3_2_1_54_1","volume-title":"Towards fast computation of certified robustness for relu networks. arXiv preprint arXiv:1804.09699","author":"Weng Tsui-Wei","year":"2018","unstructured":"Tsui-Wei Weng, Huan Zhang, Hongge Chen, Zhao Song, Cho-Jui Hsieh, Duane Boning, Inderjit S Dhillon, and Luca Daniel. 2018. Towards fast computation of certified robustness for relu networks. arXiv preprint arXiv:1804.09699 (2018)."},{"key":"e_1_3_2_1_55_1","volume-title":"Evaluating the robustness of neural networks: An extreme value theory approach. arXiv preprint arXiv:1801.10578","author":"Weng Tsui-Wei","year":"2018","unstructured":"Tsui-Wei Weng, Huan Zhang, Pin-Yu Chen, Jinfeng Yi, Dong Su, Yupeng Gao, Cho-Jui Hsieh, and Luca Daniel. 2018. Evaluating the robustness of neural networks: An extreme value theory approach. arXiv preprint arXiv:1801.10578 (2018)."},{"key":"e_1_3_2_1_56_1","volume-title":"Principal component analysis. Chemometrics and intelligent laboratory systems 2, 1--3","author":"Wold Svante","year":"1987","unstructured":"Svante Wold, Kim Esbensen, and Paul Geladi. 1987. Principal component analysis. Chemometrics and intelligent laboratory systems 2, 1--3 (1987), 37--52."},{"key":"e_1_3_2_1_57_1","volume-title":"Generating natural adversarial examples. arXiv preprint arXiv:1710.11342","author":"Zhao Zhengli","year":"2017","unstructured":"Zhengli Zhao, Dheeru Dua, and Sameer Singh. 2017. Generating natural adversarial examples. arXiv preprint arXiv:1710.11342 (2017)."}],"event":{"name":"ASE '20: 35th IEEE\/ACM International Conference on Automated Software Engineering","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"location":"Virtual Event Australia","acronym":"ASE '20"},"container-title":["Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416564","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3416564","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3416564","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:38Z","timestamp":1750197698000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416564"}},"subtitle":["model-based robustness analysis of stateful deep learning systems"],"short-title":[],"issued":{"date-parts":[[2020,12,21]]},"references-count":57,"alternative-id":["10.1145\/3324884.3416564","10.1145\/3324884"],"URL":"https:\/\/doi.org\/10.1145\/3324884.3416564","relation":{},"subject":[],"published":{"date-parts":[[2020,12,21]]},"assertion":[{"value":"2021-01-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}