@misc(BarFT-SMTLIB, author = {Clark Barrett and Pascal Fontaine and Cesare Tinelli}, year = {2016}, title = {{The Satisfiability Modulo Theories Library (SMT-LIB)}}, howpublished = {\url{www.SMT-LIB.org}}, ) @misc(B21, author = {James Bornholt}, title = {Can you train a neural network using an {SMT} solver?}, howpublished = {\url{https://www.cs.utexas.edu/~bornholt/post/nnsmt.html} (access May 2021)}, ) @inproceedings(DBLP:conf/ijcai/ChenFZK19, author = {Huili Chen and Cheng Fu and Jishen Zhao and Farinaz Koushanfar}, year = {2019}, title = {DeepInspect: {A} Black-box Trojan Detection and Mitigation Framework for Deep Neural Networks}, booktitle = {International Joint Conference on Artificial Intelligence (IJCAI)}, doi = {10.24963/ijcai.2019/647}, ) @inproceedings(DBLP:conf/acsac/GaoXW0RN19, author = {Yansong Gao and Change Xu and Derui Wang and Shiping Chen and Damith Chinthana Ranasinghe and Surya Nepal}, year = {2019}, title = {{STRIP:} a defence against trojan attacks on deep neural networks}, booktitle = {Annual Computer Security Applications Conference ({ACSAC})}, doi = {10.1145/3359789.3359790}, ) @inproceedings(DBLP:conf/tacas/GiacobbeHL20, author = {Mirco Giacobbe and Thomas A. Henzinger and Mathias Lechner}, year = {2020}, title = {How Many Bits Does it Take to Quantize Your Neural Network?}, booktitle = {Tools and Algorithms for the Construction and Analysis of Systems (TACAS)}, doi = {10.1007/978-3-030-45237-7_5}, ) @inproceedings(DBLP:conf/europar/GuWBL15, author = {Yijia Gu and Thomas Wahl and Mahsa Bayati and Miriam Leeser}, year = {2015}, title = {Behavioral Non-portability in Scientific Numeric Computing}, booktitle = {International Conference on Parallel and Distributed Computing ({Euro-Par})}, doi = {10.1007/978-3-662-48096-0_43}, ) @inproceedings(DBLP:conf/cvpr/HeZL19, author = {Zecheng He and Tianwei Zhang and Ruby B. Lee}, year = {2019}, title = {Sensitive-Sample Fingerprinting of Deep Neural Networks}, booktitle = {{IEEE} Conference on Computer Vision and Pattern Recognition ({CVPR})}, doi = {10.1109/CVPR.2019.00486}, ) @inproceedings(DBLP:conf/cav/KatzBDJK17, author = {Guy Katz and Clark W. Barrett and David L. Dill and Kyle Julian and Mykel J. Kochenderfer}, year = {2017}, title = {Reluplex: An Efficient {SMT} Solver for Verifying Deep Neural Networks}, booktitle = {Computer Aided Verification ({CAV})}, doi = {10.1007/978-3-319-63387-9_5}, ) @inproceedings(DBLP:conf/ndss/LiuMALZW018, author = {Yingqi Liu and Shiqing Ma and Yousra Aafer and Wen{-}Chuan Lee and Juan Zhai and Weihang Wang and Xiangyu Zhang}, year = {2018}, title = {Trojaning Attack on Neural Networks}, booktitle = {Network and Distributed System Security ({NDSS})}, publisher = {The Internet Society}, doi = {10.14722/ndss.2018.23291}, ) @inproceedings(DBLP:conf/isqed/0001M0ZJXS20, author = {Yuntao Liu and Ankit Mondal and Abhishek Chakraborty and Michael Zuzak and Nina Jacobsen and Daniel Xing and Ankur Srivastava}, year = {2020}, title = {A Survey on Neural Trojans}, booktitle = {21st International Symposium on Quality Electronic Design ({ISQED})}, doi = {10.1109/ISQED48828.2020.9137011}, ) @inproceedings(DBLP:conf/ijcnn/MathiasTBG13, author = {Markus Mathias and Radu Timofte and Rodrigo Benenson and Luc Van Gool}, year = {2013}, title = {Traffic sign recognition -- How far are we from the solution?}, booktitle = {International Joint Conference on Neural Networks ({IJCNN})}, doi = {10.1109/IJCNN.2013.6707049}, ) @article(DBLP:journals/aicom/PulinaT12, author = {Luca Pulina and Armando Tacchella}, year = {2012}, title = {Challenging {SMT} solvers to verify neural networks}, journal = {{AI} Commun.}, doi = {10.3233/AIC-2012-0525}, ) @inproceedings(DBLP:conf/sp/WangYSLVZZ19, author = {Bolun Wang and Yuanshun Yao and Shawn Shan and Huiying Li and Bimal Viswanath and Haitao Zheng and Ben Y. Zhao}, year = {2019}, title = {Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks}, booktitle = {2019 {IEEE} Symposium on Security and Privacy (S\&P)}, doi = {10.1109/SP.2019.00031}, )