暂无分享,去创建一个
Makoto Takeyama | Philippa Ryan | Yoshiki Kinoshita | Heidy Khlaaf | Robin Bloomfield | Gareth Fletcher | Shuji Kinoshita | Yutaka Matsubara | Peter Popov Kazuki Imai | Yoshinori Tsutake | R. Bloomfield | Y. Kinoshita | Heidy Khlaaf | Philippa Ryan | M. Takeyama | Gareth Fletcher | Shuji Kinoshita | Yamato Matsubara | Yoshinori Tsutake
[1] Kathryn Cormican,et al. An Ontology Model for Systems Engineering Derived from ISO/IEC/IEEE 15288: 2015: Systems and Software Engineering - System Life Cycle Processes , 2016 .
[2] Philippa Gardner,et al. Towards a program logic for JavaScript , 2012, POPL '12.
[3] Rick Salay,et al. Using Machine Learning Safely in Automotive Software: An Assessment and Adaption of Software Process Requirements in ISO 26262 , 2018, ArXiv.
[4] Hoyt Lougee,et al. SOFTWARE CONSIDERATIONS IN AIRBORNE SYSTEMS AND EQUIPMENT CERTIFICATION , 2001 .
[5] Philip Koopman,et al. Challenges in Autonomous Vehicle Testing and Validation , 2016 .
[6] David Woods,et al. Resilience Engineering: Concepts and Precepts , 2006 .
[7] Mark W. Maier. Architecting Principles for Systems‐of‐Systems , 1996 .
[8] D. L. Simms,et al. Normal Accidents: Living with High-Risk Technologies , 1986 .
[9] M. Tokoro,et al. Open Systems Science: From Understanding Principles to Solving Problems , 2010 .
[10] David L. Dill,et al. Developing Bug-Free Machine Learning Systems With Formal Mathematics , 2017, ICML.
[11] Johann Schumann,et al. On Verification & Validation of Neural Network Based Controllers , 2003 .
[12] Michael P. Wellman,et al. SoK: Security and Privacy in Machine Learning , 2018, 2018 IEEE European Symposium on Security and Privacy (EuroS&P).
[13] Ryan P. Adams,et al. Motivating the Rules of the Game for Adversarial Example Research , 2018, ArXiv.
[14] Mykel J. Kochenderfer,et al. Toward Scalable Verification for Safety-Critical Deep Networks , 2018, ArXiv.
[15] Mykel J. Kochenderfer,et al. Reluplex: An Efficient SMT Solver for Verifying Deep Neural Networks , 2017, CAV.
[16] Mykel J. Kochenderfer,et al. The Marabou Framework for Verification and Analysis of Deep Neural Networks , 2019, CAV.
[17] Carl E. Landwehr,et al. Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.
[18] Xiaowei Huang,et al. Reachability Analysis of Deep Neural Networks with Provable Guarantees , 2018, IJCAI.
[19] Adi Shamir,et al. A Simple Explanation for the Existence of Adversarial Examples with Small Hamming Distance , 2019, ArXiv.
[20] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[21] Luca Pulina,et al. An Abstraction-Refinement Approach to Verification of Artificial Neural Networks , 2010, CAV.
[22] Mark W. Maier,et al. Architecting Principles for Systems‐of‐Systems , 1996 .
[23] Robert J. Stroud,et al. The Risk Assessment of ERTMS-Based Railway Systems from a Cyber Security Perspective: Methodology and Lessons Learned , 2016, RSSRail.
[24] Mario Tokoro. Open Systems Dependability , 2012 .
[25] Insup Lee,et al. A Study on Run Time Assurance for Complex Cyber Physical Systems , 2013 .
[26] Min Wu,et al. Safety Verification of Deep Neural Networks , 2016, CAV.
[27] Ieee Std,et al. Systems and Software Engineering— Systems and Software Assurance— Part 1: Concepts and Vocabulary , 2011 .
[28] R. Bell,et al. IEC 61508: functional safety of electrical/electronic/ programme electronic safety-related systems: overview , 1999 .