References

  1. Clark Barrett, Pascal Fontaine & Cesare Tinelli (2016): The Satisfiability Modulo Theories Library (SMT-LIB). www.SMT-LIB.org.
  2. James Bornholt: Can you train a neural network using an SMT solver?. https://www.cs.utexas.edu/~bornholt/post/nnsmt.html (access May 2021).
  3. Huili Chen, Cheng Fu, Jishen Zhao & Farinaz Koushanfar (2019): DeepInspect: A Black-box Trojan Detection and Mitigation Framework for Deep Neural Networks. In: International Joint Conference on Artificial Intelligence (IJCAI), doi:10.24963/ijcai.2019/647.
  4. Yansong Gao, Change Xu, Derui Wang, Shiping Chen, Damith Chinthana Ranasinghe & Surya Nepal (2019): STRIP: a defence against trojan attacks on deep neural networks. In: Annual Computer Security Applications Conference (ACSAC), doi:10.1145/3359789.3359790.
  5. Mirco Giacobbe, Thomas A. Henzinger & Mathias Lechner (2020): How Many Bits Does it Take to Quantize Your Neural Network?. In: Tools and Algorithms for the Construction and Analysis of Systems (TACAS), doi:10.1007/978-3-030-45237-7_5.
  6. Yijia Gu, Thomas Wahl, Mahsa Bayati & Miriam Leeser (2015): Behavioral Non-portability in Scientific Numeric Computing. In: International Conference on Parallel and Distributed Computing (Euro-Par), doi:10.1007/978-3-662-48096-0_43.
  7. Zecheng He, Tianwei Zhang & Ruby B. Lee (2019): Sensitive-Sample Fingerprinting of Deep Neural Networks. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), doi:10.1109/CVPR.2019.00486.
  8. Guy Katz, Clark W. Barrett, David L. Dill, Kyle Julian & Mykel J. Kochenderfer (2017): Reluplex: An Efficient SMT Solver for Verifying Deep Neural Networks. In: Computer Aided Verification (CAV), doi:10.1007/978-3-319-63387-9_5.
  9. Yingqi Liu, Shiqing Ma, Yousra Aafer, Wen-Chuan Lee, Juan Zhai, Weihang Wang & Xiangyu Zhang (2018): Trojaning Attack on Neural Networks. In: Network and Distributed System Security (NDSS). The Internet Society, doi:10.14722/ndss.2018.23291.
  10. Yuntao Liu, Ankit Mondal, Abhishek Chakraborty, Michael Zuzak, Nina Jacobsen, Daniel Xing & Ankur Srivastava (2020): A Survey on Neural Trojans. In: 21st International Symposium on Quality Electronic Design (ISQED), doi:10.1109/ISQED48828.2020.9137011.
  11. Markus Mathias, Radu Timofte, Rodrigo Benenson & Luc Van Gool (2013): Traffic sign recognition – How far are we from the solution?. In: International Joint Conference on Neural Networks (IJCNN), doi:10.1109/IJCNN.2013.6707049.
  12. Luca Pulina & Armando Tacchella (2012): Challenging SMT solvers to verify neural networks. AI Commun., doi:10.3233/AIC-2012-0525.
  13. Bolun Wang, Yuanshun Yao, Shawn Shan, Huiying Li, Bimal Viswanath, Haitao Zheng & Ben Y. Zhao (2019): Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks. In: 2019 IEEE Symposium on Security and Privacy (S&P), doi:10.1109/SP.2019.00031.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org