{"id":"https://openalex.org/W4415428701","doi":"https://doi.org/10.3233/faia251002","title":"Advancing Neural Network Verification Through Hierarchical Safety Abstract Interpretation","display_name":"Advancing Neural Network Verification Through Hierarchical Safety Abstract Interpretation","publication_year":2025,"publication_date":"2025-10-21","ids":{"openalex":"https://openalex.org/W4415428701","doi":"https://doi.org/10.3233/faia251002"},"language":null,"primary_location":{"id":"doi:10.3233/faia251002","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia251002","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.3233/faia251002","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005034849","display_name":"Luca Marzari","orcid":"https://orcid.org/0000-0002-0069-0182"},"institutions":[{"id":"https://openalex.org/I119439378","display_name":"University of Verona","ror":"https://ror.org/039bp8j42","country_code":"IT","type":"education","lineage":["https://openalex.org/I119439378"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Luca Marzari","raw_affiliation_strings":["Department of Computer Science, University of Verona, Verona, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Verona, Verona, Italy","institution_ids":["https://openalex.org/I119439378"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031780173","display_name":"Isabella Mastroeni","orcid":"https://orcid.org/0000-0003-1213-536X"},"institutions":[{"id":"https://openalex.org/I119439378","display_name":"University of Verona","ror":"https://ror.org/039bp8j42","country_code":"IT","type":"education","lineage":["https://openalex.org/I119439378"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Isabella Mastroeni","raw_affiliation_strings":["Department of Computer Science, University of Verona, Verona, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Verona, Verona, Italy","institution_ids":["https://openalex.org/I119439378"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045922629","display_name":"Alessandro Farinelli","orcid":"https://orcid.org/0000-0002-2592-5814"},"institutions":[{"id":"https://openalex.org/I119439378","display_name":"University of Verona","ror":"https://ror.org/039bp8j42","country_code":"IT","type":"education","lineage":["https://openalex.org/I119439378"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Alessandro Farinelli","raw_affiliation_strings":["Department of Computer Science, University of Verona, Verona, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Verona, Verona, Italy","institution_ids":["https://openalex.org/I119439378"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5005034849"],"corresponding_institution_ids":["https://openalex.org/I119439378"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.50794723,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9865999817848206,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9865999817848206,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10876","display_name":"Fault Detection and Control Systems","score":0.9265999794006348,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9057000279426575,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5796999931335449},{"id":"https://openalex.org/keywords/interpretation","display_name":"Interpretation (philosophy)","score":0.49729999899864197},{"id":"https://openalex.org/keywords/encoding","display_name":"Encoding (memory)","score":0.4918999969959259},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.4724000096321106},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.43869999051094055},{"id":"https://openalex.org/keywords/deep-neural-networks","display_name":"Deep neural networks","score":0.3912000060081482},{"id":"https://openalex.org/keywords/formal-verification","display_name":"Formal verification","score":0.384799987077713},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.38029998540878296}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7391999959945679},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5796999931335449},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5181999802589417},{"id":"https://openalex.org/C527412718","wikidata":"https://www.wikidata.org/wiki/Q855395","display_name":"Interpretation (philosophy)","level":2,"score":0.49729999899864197},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.4918999969959259},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.4724000096321106},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.43869999051094055},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4016999900341034},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.3912000060081482},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.384799987077713},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.38029998540878296},{"id":"https://openalex.org/C164226766","wikidata":"https://www.wikidata.org/wiki/Q7293202","display_name":"Rank (graph theory)","level":2,"score":0.3700999915599823},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.34150001406669617},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.29789999127388},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2971999943256378},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.29440000653266907},{"id":"https://openalex.org/C2985583900","wikidata":"https://www.wikidata.org/wiki/Q722617","display_name":"Formal description","level":2,"score":0.2937000095844269},{"id":"https://openalex.org/C175154964","wikidata":"https://www.wikidata.org/wiki/Q380077","display_name":"Task analysis","level":3,"score":0.290800005197525},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.28760001063346863},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.2872999906539917},{"id":"https://openalex.org/C2780654840","wikidata":"https://www.wikidata.org/wiki/Q333341","display_name":"Abstract interpretation","level":2,"score":0.28049999475479126},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.27900001406669617},{"id":"https://openalex.org/C132835097","wikidata":"https://www.wikidata.org/wiki/Q7663745","display_name":"System safety","level":2,"score":0.2687999904155731},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.2678000032901764}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/faia251002","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia251002","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.3233/faia251002","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia251002","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Traditional":[0],"methods":[1],"for":[2,86,181],"formal":[3],"verification":[4,129],"(FV)":[5],"of":[6,17,74,82,153,165,186],"deep":[7,199],"neural":[8],"networks":[9],"(DNNs)":[10],"are":[11],"constrained":[12],"by":[13,91],"a":[14,21,45,62,71,78,87,149,162,197],"binary":[15,35,128],"encoding":[16,36],"safety":[18,42,84,106,145,156,172],"properties,":[19],"where":[20],"model":[22],"is":[23],"classified":[24],"as":[25],"either":[26,50],"safe":[27],"or":[28,31,53,119],"unsafe":[29,75],"(robust":[30],"not":[32],"robust).":[33],"This":[34],"fails":[37],"to":[38,142],"capture":[39],"the":[40,83,109,113,116,126,154,166,187],"nuanced":[41],"levels":[43,107],"within":[44],"model,":[46],"often":[47],"resulting":[48],"in":[49],"overly":[51],"restrictive":[52],"too":[54],"permissive":[55],"requirements.":[56],"In":[57],"this":[58,135],"paper,":[59],"we":[60,132],"introduce":[61],"novel":[63,170,188],"problem":[64,189],"formulation":[65,136,173],"called":[66],"ABSTRACT":[67],"DNN-VERIFICATION,":[68],"which":[69],"verifies":[70],"hierarchical":[72],"structure":[73],"outputs,":[76],"providing":[77],"more":[79,150],"granular":[80],"analysis":[81,185],"aspect":[85],"given":[88],"DNN.":[89],"Crucially,":[90],"leveraging":[92],"abstract":[93,144,171,179],"interpretation":[94,180],"and":[95,157,174,191,207],"reasoning":[96],"about":[97],"output":[98],"reachable":[99],"sets,":[100],"our":[101,169],"approach":[102],"enables":[103],"assessing":[104],"multiple":[105],"during":[108],"FV":[110],"process,":[111],"requiring":[112],"same":[114],"(in":[115],"worst":[117],"case)":[118],"even":[120],"potentially":[121],"less":[122],"computational":[123],"effort":[124],"than":[125],"traditional":[127],"approach.":[130],"Specifically,":[131],"demonstrate":[133],"how":[134],"allows":[137],"rank":[138],"adversarial":[139],"inputs":[140],"according":[141],"their":[143],"level":[146],"violation,":[147],"offering":[148],"detailed":[151],"evaluation":[152,194],"model\u2019s":[155],"robustness.":[158],"Our":[159],"contributions":[160],"include":[161],"theoretical":[163],"exploration":[164],"relationship":[167],"between":[168],"existing":[175],"approaches":[176],"that":[177],"employ":[178],"robustness":[182],"verification,":[183],"complexity":[184],"introduced,":[190],"an":[192],"empirical":[193],"considering":[195],"both":[196],"complex":[198],"reinforcement":[200],"learning":[201],"task":[202],"(based":[203],"on":[204],"Habitat":[205],"3.0)":[206],"standard":[208],"DNN-Verification":[209],"benchmarks.":[210]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-24T00:00:00"}
