{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T19:17:32Z","timestamp":1762024652703,"version":"build-2065373602"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.23919\/date48585.2020.9116205","type":"proceedings-article","created":{"date-parts":[[2020,6,15]],"date-time":"2020-06-15T23:28:37Z","timestamp":1592263717000},"page":"1640-1643","source":"Crossref","is-referenced-by-count":14,"title":["Towards Safety Verification of Direct Perception Neural Networks"],"prefix":"10.23919","author":[{"given":"Chih-Hong","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Chung-Hao","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Brunner","sequence":"additional","affiliation":[]},{"given":"Vahid","family":"Hashemi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.17"},{"key":"ref11","first-page":"6615","article-title":"Verifying properties of binarized deep neural networks","author":"narodytska","year":"2018","journal-title":"AAAI"},{"key":"ref12","first-page":"1410","article-title":"Zero-shot learning with semantic output codes","author":"palatucci","year":"2009","journal-title":"NIPS"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14295-6_24"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/368"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01090-4_2"},{"article-title":"Opening the black box of deep neural networks via information","year":"2017","author":"shwartz-ziv","key":"ref16"},{"article-title":"Intriguing properties of neural networks","year":"2013","author":"szegedy","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2015.7133169"},{"key":"ref19","first-page":"1599","article-title":"Formal security analysis of neural networks using symbolic intervals","author":"wang","year":"2018","journal-title":"USENIX"},{"key":"ref4","first-page":"121","article-title":"Output range analysis for deep feed-forward neural networks","author":"dutta","year":"2018","journal-title":"NFM"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68167-2_18"},{"key":"ref6","first-page":"3","article-title":"Ai2: Safety and robustness certification of neural networks with abstract interpretation","author":"gehr","year":"2018","journal-title":"Oakland"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68167-2_19"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63387-9_5"},{"article-title":"Safety and trustworthiness of deep neural networks: A survey","year":"2018","author":"huang","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.312"},{"key":"ref1","first-page":"4795","article-title":"A unified view of piecewise linear neural network verification","author":"bunel","year":"2018","journal-title":"NIPS"},{"article-title":"An approach to reachability analysis for feed-forward ReLU neural networks","year":"2017","author":"lomuscio","key":"ref9"},{"key":"ref20","first-page":"5276","article-title":"Towards fast computation of certified robustness for ReLU networks","author":"weng","year":"2018","journal-title":"ICML"},{"article-title":"Analyzing deep neural networks with symbolic propagation: Towards higher precision and faster verification","year":"2019","author":"yang","key":"ref21"}],"event":{"name":"2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)","start":{"date-parts":[[2020,3,9]]},"location":"Grenoble, France","end":{"date-parts":[[2020,3,13]]}},"container-title":["2020 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9112295\/9116186\/09116205.pdf?arnumber=9116205","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,13]],"date-time":"2020-07-13T22:43:31Z","timestamp":1594680211000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9116205\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3]]},"references-count":21,"URL":"https:\/\/doi.org\/10.23919\/date48585.2020.9116205","relation":{},"subject":[],"published":{"date-parts":[[2020,3]]}}}