{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T07:16:27Z","timestamp":1763968587208,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":89,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,2,6]],"date-time":"2024-02-06T00:00:00Z","timestamp":1707177600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the Key R&D Programs of Zhejiang","award":["2022C01018"],"award-info":[{"award-number":["2022C01018"]}]},{"name":"the National Natural Science Foundation of China","award":["62102359","62176080"],"award-info":[{"award-number":["62102359","62176080"]}]},{"name":"the CAS Project for Young Scientists in Basic Research","award":["Grant No.YSBR-040"],"award-info":[{"award-number":["Grant No.YSBR-040"]}]},{"name":"the Joint Funds of National Natural Science Foundation of China","award":["U21B2001"],"award-info":[{"award-number":["U21B2001"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,2,6]]},"DOI":"10.1145\/3597503.3623332","type":"proceedings-article","created":{"date-parts":[[2024,2,6]],"date-time":"2024-02-06T20:53:16Z","timestamp":1707252796000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["VeRe: Verification Guided Synthesis for Repairing Deep Neural Networks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-0448-1218","authenticated-orcid":false,"given":"Jianan","family":"Ma","sequence":"first","affiliation":[{"name":"Hangzhou Dianzi University, Hangzhou, China"},{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4114-7757","authenticated-orcid":false,"given":"Pengfei","family":"Yang","sequence":"additional","affiliation":[{"name":"SKLCS, Institute of Software, CAS, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7113-7635","authenticated-orcid":false,"given":"Jingyi","family":"Wang","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"},{"name":"ZJU-Hangzhou Global Scientific and Technological Innovation Center, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1893-6259","authenticated-orcid":false,"given":"Youcheng","family":"Sun","sequence":"additional","affiliation":[{"name":"University of Manchester, Manchester, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9693-8778","authenticated-orcid":false,"given":"Cheng-Chao","family":"Huang","sequence":"additional","affiliation":[{"name":"Nanjing Institute of Software Technology, ISCAS, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3399-5281","authenticated-orcid":false,"given":"Zhen","family":"Wang","sequence":"additional","affiliation":[{"name":"Hangzhou Dianzi University, Hangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2024,2,6]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"DeepAbstract: Neural Network Abstraction for Accelerating Verification. In ATVA 2020 (Lecture Notes in Computer Science","volume":"107","author":"Ashok Pranav","year":"2020","unstructured":"Pranav Ashok, Vahid Hashemi, Jan Kret\u00ednsk\u00fd, and Stefanie Mohr. 2020. DeepAbstract: Neural Network Abstraction for Accelerating Verification. In ATVA 2020 (Lecture Notes in Computer Science, Vol. 12302). Springer, 92--107."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2019.100203"},{"key":"e_1_3_2_1_3_1","volume-title":"ICSE","author":"Baluta Teodora","year":"2021","unstructured":"Teodora Baluta, Zheng Leong Chua, Kuldeep S Meel, and Prateek Saxena. 2021. Scalable quantitative verification for deep neural networks. In ICSE 2021. IEEE, Madrid, Spain, 312--323."},{"key":"e_1_3_2_1_4_1","volume-title":"Quantitative Verification of Neural Networks and Its Security Applications. In CCS 2019","author":"Baluta Teodora","year":"2019","unstructured":"Teodora Baluta, Shiqi Shen, Shweta Shinde, Kuldeep S. Meel, and Prateek Saxena. 2019. Quantitative Verification of Neural Networks and Its Security Applications. In CCS 2019, November 11--15, 2019. ACM, London, UK, 1249--1264."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Ben Batten Panagiotis Kouvaros Alessio Lomuscio and Yang Zheng. 2021. Efficient neural network verification via layer-based semidefinite relaxations and linear cuts. IJCAI.","DOI":"10.24963\/ijcai.2021\/301"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1113792.1113794"},{"key":"e_1_3_2_1_7_1","volume-title":"Davide Del Testa","author":"Bojarski Mariusz","year":"2016","unstructured":"Mariusz Bojarski, Davide Del Testa, Daniel Dworakowski, Bernhard Firner, Beat Flepp, Prasoon Goyal, Lawrence D Jackel, Mathew Monfort, Urs Muller, Jiakai Zhang, et al. 2016. End to end learning for self-driving cars. arXiv preprint arXiv:1604.07316 (2016)."},{"key":"e_1_3_2_1_8_1","unstructured":"Tom Brown Benjamin Mann Nick Ryder Melanie Subbiah Jared D Kaplan Prafulla Dhariwal Arvind Neelakantan Pranav Shyam Girish Sastry Amanda Askell et al. 2020. Language models are few-shot learners. Advances in neural information processing systems 33 (2020) 1877--1901."},{"key":"e_1_3_2_1_9_1","article-title":"Branch and bound for piecewise linear neural network verification","volume":"21","author":"Bunel Rudy","year":"2020","unstructured":"Rudy Bunel, P Mudigonda, Ilker Turkaslan, P Torr, Jingyue Lu, and Pushmeet Kohli. 2020. Branch and bound for piecewise linear neural network verification. Journal of Machine Learning Research 21, 2020 (2020).","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_1_10_1","volume-title":"ICML Workshop on Reliable Machine Learning in the Wild","volume":"103","author":"Cadamuro Gabriel","year":"2016","unstructured":"Gabriel Cadamuro, Ran Gilad-Bachrach, and Xiaojin Zhu. 2016. Debugging machine learning models. In ICML Workshop on Reliable Machine Learning in the Wild, Vol. 103."},{"key":"e_1_3_2_1_11_1","volume-title":"Statistical Guarantees for the Robustness of Bayesian Neural Networks. In IJCAI 2019","author":"Cardelli Luca","year":"2019","unstructured":"Luca Cardelli, Marta Kwiatkowska, Luca Laurenti, Nicola Paoletti, Andrea Patane, and Matthew Wicker. 2019. Statistical Guarantees for the Robustness of Bayesian Neural Networks. In IJCAI 2019, August 10--16, 2019, Sarit Kraus (Ed.). ijcai.org, Macao, China, 5693--5700."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33017759"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Nicholas Carlini and David Wagner. 2017. Towards evaluating the robustness of neural networks. In 2017 ieee symposium on security and privacy (sp). Ieee 39--57.","DOI":"10.1109\/SP.2017.49"},{"key":"e_1_3_2_1_14_1","volume-title":"Detecting backdoor attacks on deep neural networks by activation clustering. arXiv:1811.03728","author":"Chen Bryant","year":"2018","unstructured":"Bryant Chen, Wilka Carvalho, Nathalie Baracaldo, Heiko Ludwig, Benjamin Edwards, Taesung Lee, Ian Molloy, and Biplav Srivastava. 2018. Detecting backdoor attacks on deep neural networks by activation clustering. arXiv:1811.03728 (2018)."},{"key":"e_1_3_2_1_15_1","volume-title":"Targeted backdoor attacks on deep learning systems using data poisoning. arXiv preprint arXiv:1712.05526","author":"Chen Xinyun","year":"2017","unstructured":"Xinyun Chen, Chang Liu, Bo Li, Kimberly Lu, and Dawn Song. 2017. Targeted backdoor attacks on deep learning systems using data poisoning. arXiv preprint arXiv:1712.05526 (2017)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553399"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.2015.0403"},{"key":"e_1_3_2_1_18_1","volume-title":"Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805","author":"Devlin Jacob","year":"2018","unstructured":"Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2018. Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/QRS54544.2021.00081"},{"key":"e_1_3_2_1_20_1","volume-title":"Output Range Analysis for Deep Feedforward Neural Networks. In NFM 2018 (Lecture Notes in Computer Science","volume":"138","author":"Dutta Souradeep","year":"2018","unstructured":"Souradeep Dutta, Susmit Jha, Sriram Sankaranarayanan, and Ashish Tiwari. 2018. Output Range Analysis for Deep Feedforward Neural Networks. In NFM 2018 (Lecture Notes in Computer Science, Vol. 10811), Aaron Dutle, C\u00e9sar A. Mu\u00f1oz, and Anthony Narkawicz (Eds.). Springer, Newport News, VA, USA, 121--138."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68167-2_19"},{"key":"e_1_3_2_1_22_1","volume-title":"An Abstraction-Based Framework for Neural Network Verification. In CAV 2020 (Lecture Notes in Computer Science","volume":"65","author":"Elboher Yizhak Yisrael","year":"2020","unstructured":"Yizhak Yisrael Elboher, Justin Gottschlich, and Guy Katz. 2020. An Abstraction-Based Framework for Neural Network Verification. In CAV 2020 (Lecture Notes in Computer Science, Vol. 12224), Shuvendu K. Lahiri and Chao Wang (Eds.). Springer, Los Angeles, CA, USA, 43--65."},{"key":"e_1_3_2_1_23_1","volume-title":"Sound and Complete Neural Network Repair with Minimality and Locality Guarantees. In The Tenth International Conference on Learning Representations, ICLR 2022","author":"Fu Feisi","year":"2022","unstructured":"Feisi Fu and Wenchao Li. 2022. Sound and Complete Neural Network Repair with Minimality and Locality Guarantees. In The Tenth International Conference on Learning Representations, ICLR 2022, Virtual Event, April 25--29, 2022. OpenReview.net. https:\/\/openreview.net\/forum?id=xS8AMYiEav3"},{"key":"e_1_3_2_1_24_1","volume-title":"Domain-adversarial training of neural networks. The journal of machine learning research 17, 1","author":"Ganin Yaroslav","year":"2016","unstructured":"Yaroslav Ganin, Evgeniya Ustinova, Hana Ajakan, Pascal Germain, Hugo Larochelle, Fran\u00e7ois Laviolette, Mario Marchand, and Victor Lempitsky. 2016. Domain-adversarial training of neural networks. The journal of machine learning research 17, 1 (2016), 2096--2030."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00058"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-55754-6_5"},{"key":"e_1_3_2_1_27_1","volume-title":"Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572","author":"Goodfellow Ian J","year":"2014","unstructured":"Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909068"},{"key":"e_1_3_2_1_29_1","volume-title":"Learning, verification and repair of deep neural networks. arXiv preprint arXiv:2011.09933","author":"Guidotti Dario","year":"2020","unstructured":"Dario Guidotti, Luca Pulina, and Armando Tacchella. 2020. Never 2.0: Learning, verification and repair of deep neural networks. arXiv preprint arXiv:2011.09933 (2020)."},{"key":"e_1_3_2_1_30_1","volume-title":"Benchmarking neural network robustness to common corruptions and perturbations. arXiv preprint arXiv:1903.12261","author":"Hendrycks Dan","year":"2019","unstructured":"Dan Hendrycks and Thomas Dietterich. 2019. Benchmarking neural network robustness to common corruptions and perturbations. arXiv preprint arXiv:1903.12261 (2019)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477314.3507059"},{"key":"e_1_3_2_1_32_1","unstructured":"Jeremy Howard. 2019. The Imagenette dataset. https:\/\/github.com\/fastai\/imagenette"},{"key":"e_1_3_2_1_33_1","volume-title":"\u03b5-weakened Robustness of Deep Neural Networks. CoRR abs\/2110.15764","author":"Huang Pei","year":"2021","unstructured":"Pei Huang, Yuting Yang, Minghao Liu, Fuqi Jia, Feifei Ma, and Jian Zhang. 2021. \u03b5-weakened Robustness of Deep Neural Networks. CoRR abs\/2110.15764 (2021). arXiv:2110.15764"},{"key":"e_1_3_2_1_34_1","volume-title":"CAV","author":"Huang Xiaowei","year":"2017","unstructured":"Xiaowei Huang, Marta Kwiatkowska, Sen Wang, and Min Wu. 2017. Safety Verification of Deep Neural Networks. In CAV 2017. Springer, Heidelberg, Germany, 3--29."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.2514\/1.G003724"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2016.7778091"},{"key":"e_1_3_2_1_37_1","volume-title":"Verifying aircraft collision avoidance neural networks through linear approximations of safe regions. arXiv preprint arXiv:1903.00762","author":"Julian Kyle D","year":"2019","unstructured":"Kyle D Julian, Shivam Sharma, Jean-Baptiste Jeannin, and Mykel J Kochenderfer. 2019. Verifying aircraft collision avoidance neural networks through linear approximations of safe regions. arXiv preprint arXiv:1903.00762 (2019)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63387-9_5"},{"key":"e_1_3_2_1_39_1","volume-title":"The Marabou Framework for Verification and Analysis of Deep Neural Networks. In CAV 2019 (Lecture Notes in Computer Science","volume":"452","author":"Katz Guy","unstructured":"Guy Katz, Derek A. Huang, Duligur Ibeling, Kyle Julian, Christopher Lazarus, Rachel Lim, Parth Shah, Shantanu Thakoor, Haoze Wu, Aleksandar Zeljic, David L. Dill, Mykel J. Kochenderfer, and Clark W. Barrett. 2019. The Marabou Framework for Verification and Analysis of Deep Neural Networks. In CAV 2019 (Lecture Notes in Computer Science, Vol. 11561), Isil Dillig and Serdar Tasiran (Eds.). Springer, New York City, NY, USA, 443--452."},{"key":"e_1_3_2_1_40_1","volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980","author":"Kingma Diederik P","year":"2014","unstructured":"Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)."},{"key":"e_1_3_2_1_41_1","unstructured":"Alex Krizhevsky Geoffrey Hinton et al. 2009. Learning multiple layers of features from tiny images. (2009)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32304-2_15"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510143"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01168"},{"volume-title":"ART: abstraction refinement-guided training for provably correct neural networks. In # PLACEHOLDER_PARENT_METADATA_VALUE#","author":"Lin Xuankang","key":"e_1_3_2_1_46_1","unstructured":"Xuankang Lin, He Zhu, Roopsha Samanta, and Suresh Jagannathan. 2020. ART: abstraction refinement-guided training for provably correct neural networks. In # PLACEHOLDER_PARENT_METADATA_VALUE#, Vol. 1. TU Wien Academic Press, 148--157."},{"key":"e_1_3_2_1_47_1","unstructured":"Yingqi Liu Shiqing Ma Yousra Aafer Wen-Chuan Lee Juan Zhai Weihang Wang and Xiangyu Zhang. 2018. Trojaning Attack on Neural Networks. In NDSS."},{"key":"e_1_3_2_1_48_1","unstructured":"Jianan Ma Pengfei Yang Jingyi Wang Youcheng Sun Cheng-chao Huang and Zhen Wang. 2023. VERE. https:\/\/github.com\/nninjn\/VeRe"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236082"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-NIER.2019.00032"},{"key":"e_1_3_2_1_51_1","volume-title":"Zhe Hou, Yan Xiao, Yun Lin, and Jin Song Dong.","author":"Meng Mark Huasong","year":"2022","unstructured":"Mark Huasong Meng, Guangdong Bai, Sin Gee Teo, Zhe Hou, Yan Xiao, Yun Lin, and Jin Song Dong. 2022. Adversarial robustness of deep neural networks: A survey from a formal verification perspective. IEEE Transactions on Dependable and Secure Computing (2022)."},{"key":"e_1_3_2_1_52_1","volume-title":"International Conference on Machine Learning. PMLR, 3578--3586","author":"Mirman Matthew","year":"2018","unstructured":"Matthew Mirman, Timon Gehr, and Martin Vechev. 2018. Differentiable abstract interpretation for provably robust neural networks. In International Conference on Machine Learning. PMLR, 3578--3586."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.12206"},{"key":"e_1_3_2_1_54_1","unstructured":"Yuval Netzer Tao Wang Adam Coates Alessandro Bissacco Bo Wu and Andrew Y Ng. 2011. Reading digits in natural images with unsupervised feature learning. (2011)."},{"key":"e_1_3_2_1_55_1","volume-title":"ATVA 2022, Virtual Event, October 25--28, 2022, Proceedings (Lecture Notes in Computer Science","volume":"396","author":"Ostrovsky Matan","year":"2022","unstructured":"Matan Ostrovsky, Clark W. Barrett, and Guy Katz. 2022. An Abstraction-Refinement Approach to Verifying Convolutional Neural Networks. In Automated Technology for Verification and Analysis - 20th International Symposium, ATVA 2022, Virtual Event, October 25--28, 2022, Proceedings (Lecture Notes in Computer Science, Vol. 13505). Springer, 391--396."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380337"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.5555\/2350156.2350160"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME46990.2020.00079"},{"key":"e_1_3_2_1_59_1","volume-title":"Reachability Analysis of Deep Neural Networks with Provable Guarantees. In IJCAI","author":"Ruan Wenjie","year":"2018","unstructured":"Wenjie Ruan, Xiaowei Huang, and Marta Kwiatkowska. 2018. Reachability Analysis of Deep Neural Networks with Provable Guarantees. In IJCAI 2018. ijcai.org, Stockholm, Sweden, 2651--2659."},{"key":"e_1_3_2_1_60_1","volume-title":"Global Robustness Evaluation of Deep Neural Networks with Provable Guarantees for the Hamming Distance. In IJCAI","author":"Ruan Wenjie","year":"2019","unstructured":"Wenjie Ruan, Min Wu, Youcheng Sun, Xiaowei Huang, Daniel Kroening, and Marta Kwiatkowska. 2019. Global Robustness Evaluation of Deep Neural Networks with Provable Guarantees for the Hamming Distance. In IJCAI 2019, Sarit Kraus (Ed.). ijcai.org, Macao, China, 5944--5952."},{"key":"e_1_3_2_1_61_1","volume-title":"Vechev","author":"Singh Gagandeep","year":"2019","unstructured":"Gagandeep Singh, Rupanshu Ganvir, Markus Puschel, and Martin T. Vechev. 2019. Beyond the Single Neuron Convex Barrier for Neural Network Certification. In NeurIPS 2019. 15072--15083."},{"key":"e_1_3_2_1_62_1","volume-title":"Fast and effective robustness certification. Advances in neural information processing systems 31","author":"Singh Gagandeep","year":"2018","unstructured":"Gagandeep Singh, Timon Gehr, Matthew Mirman, Markus P\u00fcschel, and Martin Vechev. 2018. Fast and effective robustness certification. Advances in neural information processing systems 31 (2018)."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290354"},{"key":"e_1_3_2_1_64_1","volume-title":"Arachne: Search Based Repair of Deep Neural Networks. ACM Transactions on Software Engineering and Methodology","author":"Sohn Jeongju","year":"2022","unstructured":"Jeongju Sohn, Sungmin Kang, and Shin Yoo. 2022. Arachne: Search Based Repair of Deep Neural Networks. ACM Transactions on Software Engineering and Methodology (2022)."},{"key":"e_1_3_2_1_65_1","volume-title":"Department of Computer Science","author":"Lab ETH","year":"2020","unstructured":"ETH Zurich SRI Lab, Department of Computer Science. 2020. ETH Robustness Analyzer for Neural Networks (ERAN). https:\/\/github.com\/eth-sri\/eran"},{"key":"e_1_3_2_1_66_1","volume-title":"Man vs. computer: Benchmarking machine learning algorithms for traffic sign recognition. Neural networks 32","author":"Stallkamp Johannes","year":"2012","unstructured":"Johannes Stallkamp, Marc Schlipsing, Jan Salmen, and Christian Igel. 2012. Man vs. computer: Benchmarking machine learning algorithms for traffic sign recognition. Neural networks 32 (2012), 323--332."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510080"},{"key":"e_1_3_2_1_68_1","volume-title":"Testing deep neural networks. arXiv preprint arXiv:1803.04792","author":"Sun Youcheng","year":"2018","unstructured":"Youcheng Sun, Xiaowei Huang, Daniel Kroening, James Sharp, Matthew Hill, and Rob Ashmore. 2018. Testing deep neural networks. arXiv preprint arXiv:1803.04792 (2018)."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180220"},{"key":"e_1_3_2_1_70_1","volume-title":"Adversarial training and robustness for multiple perturbations. Advances in neural information processing systems 32","author":"Tramer Florian","year":"2019","unstructured":"Florian Tramer and Dan Boneh. 2019. Adversarial training and robustness for multiple perturbations. Advances in neural information processing systems 32 (2019)."},{"key":"e_1_3_2_1_71_1","volume-title":"Verification of Deep Convolutional Neural Networks Using ImageStars. In CAV 2020 (Lecture Notes in Computer Science","volume":"42","author":"Tran Hoang-Dung","unstructured":"Hoang-Dung Tran, Stanley Bak, Weiming Xiang, and Taylor T. Johnson. 2020. Verification of Deep Convolutional Neural Networks Using ImageStars. In CAV 2020 (Lecture Notes in Computer Science, Vol. 12224), Shuvendu K. Lahiri and Chao Wang (Eds.). Springer, Los Angeles, CA, USA, 18--42."},{"key":"e_1_3_2_1_72_1","volume-title":"Star-Based Reachability Analysis of Deep Neural Networks. In FM 2019 (Lecture Notes in Computer Science","volume":"686","author":"Tran Hoang-Dung","unstructured":"Hoang-Dung Tran, Diego Manzanas Lopez, Patrick Musau, Xiaodong Yang, Luan Viet Nguyen, Weiming Xiang, and Taylor T. Johnson. 2019. Star-Based Reachability Analysis of Deep Neural Networks. In FM 2019 (Lecture Notes in Computer Science, Vol. 11800), Maurice H. ter Beek, Annabelle McIver, and Jos\u00e9 N. Oliveira (Eds.). Springer, Porto, Portugal, 670--686."},{"volume-title":"Runtime Verification","author":"Usman Muhammad","key":"e_1_3_2_1_73_1","unstructured":"Muhammad Usman, Divya Gopinath, Youcheng Sun, and Corina S P\u0103s\u0103reanu. 2022. Rule-Based Runtime Mitigation Against Poison Attacks on Neural Networks. In Runtime Verification. Springer, 67--84."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neubiorev.2017.01.002"},{"key":"e_1_3_2_1_75_1","volume-title":"Residual convolutional CTC networks for automatic speech recognition. arXiv preprint arXiv:1702.07793","author":"Wang Yisen","year":"2017","unstructured":"Yisen Wang, Xuejiao Deng, Songbai Pu, and Zhiheng Huang. 2017. Residual convolutional CTC networks for automatic speech recognition. arXiv preprint arXiv:1702.07793 (2017)."},{"key":"e_1_3_2_1_76_1","volume-title":"ICLR","author":"Webb Stefan","year":"2019","unstructured":"Stefan Webb, Tom Rainforth, Yee Whye Teh, and M. Pawan Kumar. 2019. A Statistical Approach to Assessing Neural Network Robustness. In ICLR 2019. OpenReview.net, New Orleans, LA, USA."},{"key":"e_1_3_2_1_77_1","volume-title":"ICML 2019","volume":"6736","author":"Weng Lily","year":"2019","unstructured":"Lily Weng, Pin-Yu Chen, Lam M. Nguyen, Mark S. Squillante, Akhilan Boopathy, Ivan V. Oseledets, and Luca Daniel. 2019. PROVEN: Verifying Robustness of Neural Networks with a Probabilistic Approach. In ICML 2019, 9--15 June 2019 (Proceedings of Machine Learning Research, Vol. 97). PMLR, Long Beach, California, USA, 6727--6736."},{"key":"e_1_3_2_1_78_1","volume-title":"Towards Fast Computation of Certified Robustness for ReLU Networks. In ICML 2018 (Proceedings of Machine Learning Research","volume":"5282","author":"Weng Tsui-Wei","unstructured":"Tsui-Wei Weng, Huan Zhang, Hongge Chen, Zhao Song, Cho-Jui Hsieh, Luca Daniel, Duane S. Boning, and Inderjit S. Dhillon. 2018. Towards Fast Computation of Certified Robustness for ReLU Networks. In ICML 2018 (Proceedings of Machine Learning Research, Vol. 80), Jennifer G. Dy and Andreas Krause (Eds.). PMLR, Stockholm, Sweden, 5273--5282."},{"key":"e_1_3_2_1_79_1","volume-title":"Feature-Guided Black-Box Safety Testing of Deep Neural Networks. In TACAS 2018 (Lecture Notes in Computer Science","volume":"426","author":"Wicker Matthew","year":"2018","unstructured":"Matthew Wicker, Xiaowei Huang, and Marta Kwiatkowska. 2018. Feature-Guided Black-Box Safety Testing of Deep Neural Networks. In TACAS 2018 (Lecture Notes in Computer Science, Vol. 10805), Dirk Beyer and Marieke Huisman (Eds.). Springer, Thessaloniki, Greece, 408--426."},{"key":"e_1_3_2_1_80_1","volume-title":"Probabilistic Safety for Bayesian Neural Networks. In UAI 2020","author":"Wicker Matthew","year":"2020","unstructured":"Matthew Wicker, Luca Laurenti, Andrea Patane, and Marta Kwiatkowska. 2020. Probabilistic Safety for Bayesian Neural Networks. In UAI 2020, August 3--6, 2020 (Proceedings of Machine Learning Research, Vol. 124), Ryan P. Adams and Vibhav Gogate (Eds.). AUAI Press, virtual online, 1198--1207."},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2019.05.046"},{"key":"e_1_3_2_1_82_1","first-page":"11340","article-title":"Online adaptation to label distribution shift","volume":"34","author":"Wu Ruihan","year":"2021","unstructured":"Ruihan Wu, Chuan Guo, Yi Su, and Kilian Q Weinberger. 2021. Online adaptation to label distribution shift. Advances in Neural Information Processing Systems 34 (2021), 11340--11351.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_83_1","first-page":"1129","article-title":"Automatic perturbation analysis for scalable certified robustness and beyond","volume":"33","author":"Xu Kaidi","year":"2020","unstructured":"Kaidi Xu, Zhouxing Shi, Huan Zhang, Yihan Wang, Kai-Wei Chang, Minlie Huang, Bhavya Kailkhura, Xue Lin, and Cho-Jui Hsieh. 2020. Automatic perturbation analysis for scalable certified robustness and beyond. Advances in Neural Information Processing Systems 33 (2020), 1129--1141.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-72016-2_21"},{"key":"e_1_3_2_1_85_1","volume-title":"International conference on machine learning. PMLR, 5085--5094","author":"Ying Wei","year":"2018","unstructured":"Wei Ying, Yu Zhang, Junzhou Huang, and Qiang Yang. 2018. Transfer learning via learning to transfer. In International conference on machine learning. PMLR, 5085--5094."},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2021.3096332"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00043"},{"key":"e_1_3_2_1_88_1","volume-title":"Towards stable and efficient training of verifiably robust neural networks. arXiv preprint arXiv:1906.06316","author":"Zhang Huan","year":"2019","unstructured":"Huan Zhang, Hongge Chen, Chaowei Xiao, Sven Gowal, Robert Stanforth, Bo Li, Duane Boning, and Cho-Jui Hsieh. 2019. Towards stable and efficient training of verifiably robust neural networks. arXiv preprint arXiv:1906.06316 (2019)."},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484818"}],"event":{"name":"ICSE '24: IEEE\/ACM 46th International Conference on Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS","Faculty of Engineering of University of Porto"],"location":"Lisbon Portugal","acronym":"ICSE '24"},"container-title":["Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597503.3623332","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3597503.3623332","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:45Z","timestamp":1750182525000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597503.3623332"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,6]]},"references-count":89,"alternative-id":["10.1145\/3597503.3623332","10.1145\/3597503"],"URL":"https:\/\/doi.org\/10.1145\/3597503.3623332","relation":{},"subject":[],"published":{"date-parts":[[2024,2,6]]},"assertion":[{"value":"2024-02-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}