{"id":"https://openalex.org/W4294659003","doi":"https://doi.org/10.18293/seke2022-029","title":"Efficient LTL Model Checking of Deep Reinforcement Learning Systems using Policy Extraction","display_name":"Efficient LTL Model Checking of Deep Reinforcement Learning Systems using Policy Extraction","publication_year":2022,"publication_date":"2022-07-01","ids":{"openalex":"https://openalex.org/W4294659003","doi":"https://doi.org/10.18293/seke2022-029"},"language":"en","primary_location":{"id":"doi:10.18293/seke2022-029","is_oa":true,"landing_page_url":"https://doi.org/10.18293/seke2022-029","pdf_url":"https://doi.org/10.18293/seke2022-029","source":{"id":"https://openalex.org/S4220650826","display_name":"Proceedings/Proceedings of the ... International Conference on Software Engineering and Knowledge Engineering","issn_l":"2325-9000","issn":["2325-9000","2325-9086"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Conferences on Software Engineering and Knowledge Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://doi.org/10.18293/seke2022-029","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100731314","display_name":"Peng Jin","orcid":"https://orcid.org/0000-0003-2228-131X"},"institutions":[{"id":"https://openalex.org/I4210139618","display_name":"Shanghai Key Laboratory of Trustworthy Computing","ror":"https://ror.org/030qbr085","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210139618"]},{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Peng Jin","raw_affiliation_strings":["Shanghai Key Laboratory for Trustworthy Computing, East China Normal University Shanghai Trusted Industry Internet Software Collaborative Innovation Center"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory for Trustworthy Computing, East China Normal University Shanghai Trusted Industry Internet Software Collaborative Innovation Center","institution_ids":["https://openalex.org/I4210139618","https://openalex.org/I66867065"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100322552","display_name":"Yan Wang","orcid":"https://orcid.org/0000-0001-9324-4191"},"institutions":[{"id":"https://openalex.org/I4210139618","display_name":"Shanghai Key Laboratory of Trustworthy Computing","ror":"https://ror.org/030qbr085","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210139618"]},{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yang Wang","raw_affiliation_strings":["Shanghai Key Laboratory for Trustworthy Computing, East China Normal University Shanghai Trusted Industry Internet Software Collaborative Innovation Center"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory for Trustworthy Computing, East China Normal University Shanghai Trusted Industry Internet Software Collaborative Innovation Center","institution_ids":["https://openalex.org/I4210139618","https://openalex.org/I66867065"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100402983","display_name":"Min Zhang","orcid":"https://orcid.org/0000-0003-1938-2902"},"institutions":[{"id":"https://openalex.org/I4210139618","display_name":"Shanghai Key Laboratory of Trustworthy Computing","ror":"https://ror.org/030qbr085","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210139618"]},{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Min Zhang","raw_affiliation_strings":["Shanghai Key Laboratory for Trustworthy Computing, East China Normal University Shanghai Trusted Industry Internet Software Collaborative Innovation Center"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory for Trustworthy Computing, East China Normal University Shanghai Trusted Industry Internet Software Collaborative Innovation Center","institution_ids":["https://openalex.org/I4210139618","https://openalex.org/I66867065"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100731314"],"corresponding_institution_ids":["https://openalex.org/I4210139618","https://openalex.org/I66867065"],"apc_list":null,"apc_paid":null,"fwci":0.694,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.75310439,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":"2022","issue":null,"first_page":"357","last_page":"362"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10462","display_name":"Reinforcement Learning in Robotics","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9890999794006348,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/model-checking","display_name":"Model checking","score":0.8082119822502136},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.7685064077377319},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7638202905654907},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.6464506387710571},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.6174252033233643},{"id":"https://openalex.org/keywords/deep-neural-networks","display_name":"Deep neural networks","score":0.5727195143699646},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.558411180973053},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4606388509273529},{"id":"https://openalex.org/keywords/linear-temporal-logic","display_name":"Linear temporal logic","score":0.4523150324821472},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.44627222418785095},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.44586387276649475},{"id":"https://openalex.org/keywords/formal-verification","display_name":"Formal verification","score":0.4111120402812958},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3363065719604492},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.28755074739456177},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.12500104308128357},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07766687870025635}],"concepts":[{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.8082119822502136},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.7685064077377319},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7638202905654907},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.6464506387710571},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.6174252033233643},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.5727195143699646},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.558411180973053},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4606388509273529},{"id":"https://openalex.org/C4777664","wikidata":"https://www.wikidata.org/wiki/Q1536492","display_name":"Linear temporal logic","level":2,"score":0.4523150324821472},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.44627222418785095},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.44586387276649475},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.4111120402812958},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3363065719604492},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.28755074739456177},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.12500104308128357},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07766687870025635},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.18293/seke2022-029","is_oa":true,"landing_page_url":"https://doi.org/10.18293/seke2022-029","pdf_url":"https://doi.org/10.18293/seke2022-029","source":{"id":"https://openalex.org/S4220650826","display_name":"Proceedings/Proceedings of the ... International Conference on Software Engineering and Knowledge Engineering","issn_l":"2325-9000","issn":["2325-9000","2325-9086"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Conferences on Software Engineering and Knowledge Engineering","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.18293/seke2022-029","is_oa":true,"landing_page_url":"https://doi.org/10.18293/seke2022-029","pdf_url":"https://doi.org/10.18293/seke2022-029","source":{"id":"https://openalex.org/S4220650826","display_name":"Proceedings/Proceedings of the ... International Conference on Software Engineering and Knowledge Engineering","issn_l":"2325-9000","issn":["2325-9000","2325-9086"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Conferences on Software Engineering and Knowledge Engineering","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2530119350","display_name":null,"funder_award_id":"20DZ1100300","funder_id":"https://openalex.org/F4320321885","funder_display_name":"Science and Technology Commission of Shanghai Municipality"},{"id":"https://openalex.org/G2981938667","display_name":null,"funder_award_id":"Shenzhen","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5306782587","display_name":null,"funder_award_id":"202005","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5676270524","display_name":null,"funder_award_id":"2020AAA0107800","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5939423041","display_name":null,"funder_award_id":"Technology","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6956063465","display_name":null,"funder_award_id":"62161146001","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7058271836","display_name":null,"funder_award_id":"20DZ1100300","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321885","display_name":"Science and Technology Commission of Shanghai Municipality","ror":"https://ror.org/03kt66j61"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4294659003.pdf","grobid_xml":"https://content.openalex.org/works/W4294659003.grobid-xml"},"referenced_works_count":24,"referenced_works":["https://openalex.org/W1498432697","https://openalex.org/W1673923490","https://openalex.org/W1757796397","https://openalex.org/W1945616565","https://openalex.org/W2145339207","https://openalex.org/W2156051490","https://openalex.org/W2173248099","https://openalex.org/W2751422670","https://openalex.org/W2803974723","https://openalex.org/W2941205169","https://openalex.org/W2950048339","https://openalex.org/W2963575966","https://openalex.org/W2963864421","https://openalex.org/W2967595108","https://openalex.org/W2982312374","https://openalex.org/W3025114349","https://openalex.org/W3082528606","https://openalex.org/W3091798065","https://openalex.org/W3104371626","https://openalex.org/W3184441520","https://openalex.org/W3188209232","https://openalex.org/W4287333051","https://openalex.org/W4289422690","https://openalex.org/W4298857966"],"related_works":["https://openalex.org/W2350953867","https://openalex.org/W70902631","https://openalex.org/W2085847302","https://openalex.org/W1592102986","https://openalex.org/W2127730763","https://openalex.org/W4313193894","https://openalex.org/W1988050447","https://openalex.org/W2043044323","https://openalex.org/W4286892938","https://openalex.org/W3209681654"],"abstract_inverted_index":{"Deep":[0],"Reinforcement":[1],"Learning":[2],"(DRL)":[3],"is":[4,27,80],"a":[5,45],"promising":[6],"technology":[7],"for":[8],"solving":[9],"intractable":[10],"control":[11,99],"tasks.":[12],"Its":[13],"applications":[14,37],"in":[15,35],"safety-critical":[16],"fields":[17],"require":[18],"high-reliability":[19],"guarantees.":[20],"However,":[21],"formal":[22],"verification":[23],"of":[24,55,104],"DRL":[25,56],"systems":[26,57,100],"challenging":[28],"because":[29],"deep":[30],"neural":[31],"networks":[32],"(DNNs)":[33],"embedded":[34],"the":[36,72,102],"are":[38],"uninterpretable.":[39],"In":[40],"this":[41],"paper,":[42],"we":[43],"propose":[44],"novel":[46],"approach":[47],"to":[48,71],"linear":[49],"temporal":[50],"logic":[51],"(LTL)":[52],"model":[53,91],"checking":[54,92],"by":[58],"extracting":[59],"interpretable":[60],"policies":[61],"from":[62],"DNNs.":[63],"The":[64],"extracted":[65],"policy":[66],"can":[67],"retain":[68],"comparable":[69],"performance":[70],"original":[73],"DNN.":[74],"More":[75],"importantly,":[76],"its":[77],"decision":[78],"domain":[79],"finite":[81],"and":[82],"thus":[83],"directly":[84],"verifiable":[85],"against":[86],"LTL":[87],"properties":[88],"using":[89],"existing":[90],"techniques.":[93],"Experimental":[94],"results":[95],"on":[96],"four":[97],"classic":[98],"demonstrate":[101],"effectiveness":[103],"our":[105],"approach.":[106]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
