Trustworthy AI: From principles to practices

B Li, P Qi, B Liu, S Di, J Liu, J Pei, J Yi… - ACM Computing Surveys, 2023 - dl.acm.org
The rapid development of Artificial Intelligence (AI) technology has enabled the deployment
of various systems based on it. However, many current AI systems are found vulnerable to …

Formal methods: Practice and experience

J Woodcock, PG Larsen, J Bicarregui… - ACM computing surveys …, 2009 - dl.acm.org
Formal methods use mathematical models for analysis and verification at any part of the
program life-cycle. We describe the state of the art in the industrial use of formal methods …

Toward verified artificial intelligence

SA Seshia, D Sadigh, SS Sastry - Communications of the ACM, 2022 - dl.acm.org
Toward verified artificial intelligence Page 1 46 COMMUNICATIONS OF THE ACM | JULY
2022 | VOL. 65 | NO. 7 contributed articles ILL US TRA TION B Y PETER CRO W THER A …

Adaptive deconvolutional networks for mid and high level feature learning

MD Zeiler, GW Taylor, R Fergus - … international conference on …, 2011 - ieeexplore.ieee.org
We present a hierarchical model that learns image decompositions via alternating layers of
convolutional sparse coding and max pooling. When trained on natural images, the layers of …

[ΒΙΒΛΙΟ][B] Principles of model checking

C Baier, JP Katoen - 2008 - books.google.com
A comprehensive introduction to the foundations of model checking, a fully automated
technique for finding flaws in hardware and software; with extensive examples and both …

Correlation clustering

N Bansal, A Blum, S Chawla - Machine learning, 2004 - Springer
We consider the following clustering problem: we have a complete graph on n vertices
(items), where each edge (u, v) is labeled either+ or− depending on whether u and v have …

Dynamically discovering likely program invariants to support program evolution

MD Ernst, J Cockrell, WG Griswold… - Proceedings of the 21st …, 1999 - dl.acm.org
Explicitly stated program invariants can help programmers by identifying program properties
that must be preserved when modifying code. In practice, however, these invariants are …

[ΒΙΒΛΙΟ][B] Requirements engineering for software and systems

PA Laplante, M Kassab - 2022 - taylorfrancis.com
Solid requirements engineering has increasingly been recognized as the key to improved,
on-time, and on-budget delivery of software and systems projects. New software tools are …

Robust machine learning systems: Challenges, current trends, perspectives, and the road ahead

M Shafique, M Naseer, T Theocharides… - IEEE Design & …, 2020 - ieeexplore.ieee.org
Currently, machine learning (ML) techniques are at the heart of smart cyber-physical
systems (CPSs) and Internet-of-Things (loT). This article discusses various challenges and …

NuSMV: a new symbolic model checker

A Cimatti, E Clarke, F Giunchiglia, M Roveri - International journal on …, 2000 - Springer
This paper describes a new symbolic model checker, called NuSMV, developed as part of a
joint project between CMU and IRST. NuSMV is the result of the reengineering …