Clark Barrett, Pascal Fontaine & Cesare Tinelli (2016):
The Satisfiability Modulo Theories Library (SMT-LIB).
www.SMT-LIB.org.
James Bornholt:
Can you train a neural network using an SMT solver?.
https://www.cs.utexas.edu/~bornholt/post/nnsmt.html (access May 2021).
Huili Chen, Cheng Fu, Jishen Zhao & Farinaz Koushanfar (2019):
DeepInspect: A Black-box Trojan Detection and Mitigation Framework for Deep Neural Networks.
In: International Joint Conference on Artificial Intelligence (IJCAI),
doi:10.24963/ijcai.2019/647.
Yansong Gao, Change Xu, Derui Wang, Shiping Chen, Damith Chinthana Ranasinghe & Surya Nepal (2019):
STRIP: a defence against trojan attacks on deep neural networks.
In: Annual Computer Security Applications Conference (ACSAC),
doi:10.1145/3359789.3359790.
Mirco Giacobbe, Thomas A. Henzinger & Mathias Lechner (2020):
How Many Bits Does it Take to Quantize Your Neural Network?.
In: Tools and Algorithms for the Construction and Analysis of Systems (TACAS),
doi:10.1007/978-3-030-45237-7_5.
Yijia Gu, Thomas Wahl, Mahsa Bayati & Miriam Leeser (2015):
Behavioral Non-portability in Scientific Numeric Computing.
In: International Conference on Parallel and Distributed Computing (Euro-Par),
doi:10.1007/978-3-662-48096-0_43.
Zecheng He, Tianwei Zhang & Ruby B. Lee (2019):
Sensitive-Sample Fingerprinting of Deep Neural Networks.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR),
doi:10.1109/CVPR.2019.00486.
Guy Katz, Clark W. Barrett, David L. Dill, Kyle Julian & Mykel J. Kochenderfer (2017):
Reluplex: An Efficient SMT Solver for Verifying Deep Neural Networks.
In: Computer Aided Verification (CAV),
doi:10.1007/978-3-319-63387-9_5.
Yingqi Liu, Shiqing Ma, Yousra Aafer, Wen-Chuan Lee, Juan Zhai, Weihang Wang & Xiangyu Zhang (2018):
Trojaning Attack on Neural Networks.
In: Network and Distributed System Security (NDSS).
The Internet Society,
doi:10.14722/ndss.2018.23291.
Yuntao Liu, Ankit Mondal, Abhishek Chakraborty, Michael Zuzak, Nina Jacobsen, Daniel Xing & Ankur Srivastava (2020):
A Survey on Neural Trojans.
In: 21st International Symposium on Quality Electronic Design (ISQED),
doi:10.1109/ISQED48828.2020.9137011.
Markus Mathias, Radu Timofte, Rodrigo Benenson & Luc Van Gool (2013):
Traffic sign recognition – How far are we from the solution?.
In: International Joint Conference on Neural Networks (IJCNN),
doi:10.1109/IJCNN.2013.6707049.
Luca Pulina & Armando Tacchella (2012):
Challenging SMT solvers to verify neural networks.
AI Commun.,
doi:10.3233/AIC-2012-0525.
Bolun Wang, Yuanshun Yao, Shawn Shan, Huiying Li, Bimal Viswanath, Haitao Zheng & Ben Y. Zhao (2019):
Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks.
In: 2019 IEEE Symposium on Security and Privacy (S&P),
doi:10.1109/SP.2019.00031.