Oludare Isaac Abiodun, Aman Jantan, Abiodun Esther Omolara, Kemi Victoria Dada, Abubakar Malah Umar, Okafor Uchenwa Linus, Humaira Arshad, Abdullahi Aminu Kazaure, Usman Gana & Muhammad Ubale Kiru (2019):
Comprehensive review of artificial neural network applications to pattern recognition.
IEEE Access 7,
pp. 158820–158846,
doi:10.1109/ACCESS.2019.2945545.
Sushma Priya Anthadupula & Manasi Gyanchandani (2021):
A Review and Performance Analysis of Non-Linear Activation Functions in Deep Neural Networks.
Int. Res. J. Mod. Eng. Technol. Sci,
doi:10.1109/iscid.2009.214..
Stanley Bak & Parasara Sridhar Duggirala (2017):
Simulation-Equivalent Reachability of Large Linear Systems with Inputs.
In: Rupak Majumdar & Viktor Kunčak: Computer Aided Verification,
pp. 401–420,
doi:10.1007/978-3-319-63387-9_20.
Akhilan Boopathy, Tsui-Wei Weng, Pin-Yu Chen, Sijia Liu & Luca Daniel (2019):
CNN-Cert: An Efficient Framework for Certifying Robustness of Convolutional Neural Networks.
Proceedings of the AAAI Conference on Artificial Intelligence 33(01),
pp. 3240–3247,
doi:10.1609/aaai.v33i01.33013240.
Available at https://ojs.aaai.org/index.php/AAAI/article/view/4193.
Jason Brownlee (2022):
Binary Classification Tutorial with the Keras Deep Learning Library.
https://machinelearningmastery.com/binary-classification-tutorial-with-the-keras-deep-learning-library/.
[Accessed : June 1, 2023].
Chih-Hong Cheng, Georg Nührenberg & Harald Ruess (2017):
Maximum resilience of artificial neural networks.
In: Automated Technology for Verification and Analysis: 15th International Symposium, ATVA 2017, Pune, India, October 3–6, 2017, Proceedings 15.
Springer,
pp. 251–268,
doi:10.1007/978-3-319-68167-2_18.
Edmund M Clarke & Jeannette M Wing (1996):
Formal methods: State of the art and future directions.
ACM Computing Surveys (CSUR) 28(4),
pp. 626–643,
doi:10.1145/242223.242257.
Ronan Collobert (2004):
Large scale machine learning.
Technical Report.
Université de Paris VI.
Ekin Cubuk, Barret Zoph, Samuel Schoenholz & Quoc Le (2017):
Intriguing Properties of Adversarial Examples.
Leonid Datta (2020):
A Survey on Activation Functions and their relation with Xavier and He Normal Initialization.
Educative (2023):
What is the vanishing gradient problem?.
https://www.educative.io/answers/what-is-the-vanishing-gradient-problem.
[Accessed: May 12, 2023].
Ruediger Ehlers (2017):
Formal verification of piece-wise linear feed-forward neural networks.
In: Automated Technology for Verification and Analysis: 15th International Symposium, ATVA 2017, Pune, India, October 3–6, 2017, Proceedings 15.
Springer,
pp. 269–286,
doi:10.1007/978-3-319-68167-2_19.
Dumitru Erhan, Christian Szegedy, Alexander Toshev & Dragomir Anguelov (2014):
Scalable Object Detection Using Deep Neural Networks.
In: 2014 IEEE Conference on Computer Vision and Pattern Recognition,
pp. 2155–2162,
doi:10.1109/CVPR.2014.276.
Aymeric Fromherz, Klas Leino, Matt Fredrikson, Bryan Parno & Corina Pasareanu (2021):
Fast Geometric Projections for Local Robustness Certification.
In: International Conference on Learning Representations.
Available at https://openreview.net/forum?id=zWy1uxjDdZJ.
Osvaldo Gervasi, Beniamino Murgante, Antonio Laganà, David Taniar, Youngsong Mun & Marina L. Gavrilova (2008):
Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30 - July 3, 2008, Proceedings, Part I.
Lecture Notes in Computer Science 5072.
Springer,
doi:10.1007/978-3-540-69839-5.
Ian J. Goodfellow, Jonathon Shlens & Christian Szegedy (2014):
Explaining and Harnessing Adversarial Examples.
CoRR abs/1412.6572.
Available at https://api.semanticscholar.org/CorpusID:6706414.
Dario Guidotti (2022):
Verification of Neural Networks for Safety and Security-critical Domains.
ISSN 1613-0073 CEUR Workshop Proceedings.
Available at https://ceur-ws.org/Vol-3345/paper10_RiCeRCa3.pdf.
Dario Guidotti, Stefano Demarchi, Luca Pulina & Armando Tacchella (2022):
Evaluating Reachability Algorithms for Neural Networks on NeVer2.
Patrick Henriksen & Alessio Lomuscio (2021):
DEEPSPLIT: An Efficient Splitting Method for Neural Network Verification via Indirect Effect Analysis..
In: IJCAI,
pp. 2549–2555,
doi:10.24963/ijcai.2021/351.
Michael Hinchey, Jonathan Bowen & Christopher Rouff (2006):
Introduction to Formal Methods.
Springer,
doi:10.1007/1-84628-271-3_2.
Geoffrey Hinton, Li Deng, Dong Yu, George E. Dahl, Abdel-rahman Mohamed, Navdeep Jaitly, Andrew Senior, Vincent Vanhoucke, Patrick Nguyen, Tara N. Sainath & Brian Kingsbury (2012):
Deep Neural Networks for Acoustic Modeling in Speech Recognition: The Shared Views of Four Research Groups.
IEEE Signal Processing Magazine 29(6),
pp. 82–97,
doi:10.1109/MSP.2012.2205597.
Geoffrey Hinton, Li Deng, Dong Yu, George E Dahl, Abdel-rahman Mohamed, Navdeep Jaitly, Andrew Senior, Vincent Vanhoucke, Patrick Nguyen & Tara N Sainath (2012):
Deep neural networks for acoustic modeling in speech recognition: The shared views of four research groups.
IEEE Signal processing magazine 29(6),
pp. 82–97,
doi:10.1109/MSP.2012.2205597.
Chao Huang, Jiameng Fan, Wenchao Li, Xin Chen & Qi Zhu (2019):
Reachnn: Reachability analysis of neural-network controlled systems.
ACM Transactions on Embedded Computing Systems (TECS) 18(5s),
pp. 1–22,
doi:10.1145/3358228.
Xiaowei Huang, Marta Kwiatkowska, Sen Wang & Min Wu (2017):
Safety verification of deep neural networks.
In: International conference on computer aided verification.
Springer,
pp. 3–29,
doi:10.1007/978-3-319-63387-9_1.
Ruoran Gabriela Jiang (2023):
Verifying ai-controlled hybrid systems.
Master's thesis.
RWTH Aachen University,
Aachen, Germany.
Available at https://ths.rwth-aachen.de/wp-content/uploads/sites/4/master_thesis_jiang.pdf.
Kyle D. Julian, Mykel J. Kochenderfer & Michael P. Owen (2019):
Deep Neural Network Compression for Aircraft Collision Avoidance Systems.
Journal of Guidance, Control, and Dynamics 42(3),
pp. 598–608,
doi:10.2514/1.g003724.