{"id":"https://openalex.org/W3124435701","doi":"https://doi.org/10.1145/3324884.3418901","title":"Safety and robustness for deep learning with provable guarantees","display_name":"Safety and robustness for deep learning with provable guarantees","publication_year":2020,"publication_date":"2020-12-21","ids":{"openalex":"https://openalex.org/W3124435701","doi":"https://doi.org/10.1145/3324884.3418901","mag":"3124435701"},"language":"en","primary_location":{"id":"doi:10.1145/3324884.3418901","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3324884.3418901","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081710233","display_name":"Marta Kwiatkowska","orcid":"https://orcid.org/0000-0001-9022-7599"},"institutions":[{"id":"https://openalex.org/I40120149","display_name":"University of Oxford","ror":"https://ror.org/052gg0110","country_code":"GB","type":"education","lineage":["https://openalex.org/I40120149"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Marta Kwiatkowska","raw_affiliation_strings":["University of Oxford, Oxford"],"affiliations":[{"raw_affiliation_string":"University of Oxford, Oxford","institution_ids":["https://openalex.org/I40120149"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5081710233"],"corresponding_institution_ids":["https://openalex.org/I40120149"],"apc_list":null,"apc_paid":null,"fwci":0.3977,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.70375977,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"3"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12072","display_name":"Machine Learning and Algorithms","score":0.9876000285148621,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7781798243522644},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.7623430490493774},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6728781461715698},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.6176716089248657},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5942452549934387},{"id":"https://openalex.org/keywords/bounded-function","display_name":"Bounded function","score":0.5719591975212097},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5346004366874695},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5241982340812683},{"id":"https://openalex.org/keywords/deep-neural-networks","display_name":"Deep neural networks","score":0.4929206371307373},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4710421860218048},{"id":"https://openalex.org/keywords/feature-engineering","display_name":"Feature engineering","score":0.4400286078453064},{"id":"https://openalex.org/keywords/lipschitz-continuity","display_name":"Lipschitz continuity","score":0.43062829971313477},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3443336486816406},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3353402018547058},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1866270899772644}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7781798243522644},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.7623430490493774},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6728781461715698},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.6176716089248657},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5942452549934387},{"id":"https://openalex.org/C34388435","wikidata":"https://www.wikidata.org/wiki/Q2267362","display_name":"Bounded function","level":2,"score":0.5719591975212097},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5346004366874695},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5241982340812683},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.4929206371307373},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4710421860218048},{"id":"https://openalex.org/C2778827112","wikidata":"https://www.wikidata.org/wiki/Q22245680","display_name":"Feature engineering","level":3,"score":0.4400286078453064},{"id":"https://openalex.org/C22324862","wikidata":"https://www.wikidata.org/wiki/Q652707","display_name":"Lipschitz continuity","level":2,"score":0.43062829971313477},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3443336486816406},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3353402018547058},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1866270899772644},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3324884.3418901","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3324884.3418901","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2483205037","display_name":null,"funder_award_id":"EP/M019918/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G4245053905","display_name":"Mobile Robotics: Enabling a Pervasive Technology of the Future","funder_award_id":"EP/M019918/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G4868535627","display_name":null,"funder_award_id":"834115","funder_id":"https://openalex.org/F4320338352","funder_display_name":"FP7 Ideas: European Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"},{"id":"https://openalex.org/F4320338352","display_name":"FP7 Ideas: European Research Council","ror":"https://ror.org/0472cxd90"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W2007072455","https://openalex.org/W2111051539","https://openalex.org/W2151103935","https://openalex.org/W2543296129","https://openalex.org/W2557283755","https://openalex.org/W2594877703","https://openalex.org/W2773446523","https://openalex.org/W2798957601","https://openalex.org/W2800473699","https://openalex.org/W2803850896","https://openalex.org/W2869036160","https://openalex.org/W2947653925","https://openalex.org/W2955566917","https://openalex.org/W2963160885","https://openalex.org/W2963208512","https://openalex.org/W2963509076","https://openalex.org/W2963662610","https://openalex.org/W2963857521","https://openalex.org/W2964153729","https://openalex.org/W2964253222","https://openalex.org/W2965020757","https://openalex.org/W2970273067","https://openalex.org/W2994848047","https://openalex.org/W3034672496","https://openalex.org/W3034726383","https://openalex.org/W3034932139","https://openalex.org/W3082528606","https://openalex.org/W3089845009","https://openalex.org/W3102139284","https://openalex.org/W3113174340","https://openalex.org/W4247200422","https://openalex.org/W4300929635","https://openalex.org/W4302612151"],"related_works":["https://openalex.org/W2950183588","https://openalex.org/W3080754722","https://openalex.org/W4383221314","https://openalex.org/W3093978547","https://openalex.org/W2953536436","https://openalex.org/W3203790781","https://openalex.org/W2997056298","https://openalex.org/W4313346231","https://openalex.org/W2738001131","https://openalex.org/W4285785480"],"abstract_inverted_index":{"Computing":[0],"systems":[1],"are":[2,21],"becoming":[3],"ever":[4],"more":[5],"complex,":[6],"with":[7,40,64,83,123,150],"decisions":[8,82],"increasingly":[9],"often":[10],"based":[11,130],"on":[12,131,143],"deep":[13,36,72],"learning":[14,37,57],"components.":[15,58],"A":[16],"wide":[17],"variety":[18],"of":[19,25,80,94,105,110,115,153],"applications":[20],"being":[22],"developed,":[23],"many":[24],"them":[26,142],"safety-critical,":[27],"such":[28],"as":[29],"self-driving":[30],"cars":[31],"and":[32,68,78,97,117,137,140],"medical":[33],"diagnosis.":[34],"Since":[35],"is":[38,46],"unstable":[39],"respect":[41,84],"to":[42,75,85,99],"adversarial":[43],"perturbations,":[44],"there":[45],"a":[47,102],"need":[48],"for":[49,71,101],"rigorous":[50],"software":[51],"development":[52],"methodologies":[53],"that":[54],"encompass":[55],"machine":[56],"This":[59],"lecture":[60,147],"will":[61,148],"describe":[62],"progress":[63],"developing":[65],"automated":[66],"verification":[67],"testing":[69],"techniques":[70,90],"neural":[73],"networks":[74,96],"ensure":[76],"safety":[77],"robustness":[79],"their":[81],"bounded":[86],"input":[87],"perturbations.":[88],"The":[89,146],"exploit":[91],"Lipschitz":[92],"continuity":[93],"the":[95,107,154],"aim":[98],"approximate,":[100],"given":[103],"set":[104,109],"inputs,":[106],"reachable":[108],"network":[111],"outputs":[112],"in":[113,120,156],"terms":[114],"lower":[116],"upper":[118],"bounds,":[119],"anytime":[121],"manner,":[122],"provable":[124],"guarantees.":[125],"We":[126],"develop":[127],"novel":[128],"algorithms":[129],"feature-guided":[132],"search,":[133],"games,":[134],"global":[135],"optimisation":[136],"Bayesian":[138],"methods,":[139],"evaluate":[141],"state-of-the-art":[144],"networks.":[145],"conclude":[149],"an":[151],"overview":[152],"challenges":[155],"this":[157],"field.":[158]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
