{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T12:23:11Z","timestamp":1730204591911,"version":"3.28.0"},"reference-count":44,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,12,13]],"date-time":"2023-12-13T00:00:00Z","timestamp":1702425600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,13]],"date-time":"2023-12-13T00:00:00Z","timestamp":1702425600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001659","name":"German Research Foundation (DFG)","doi-asserted-by":"publisher","award":["ZA 873\/7-1"],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["ECCS-2015403"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,12,13]]},"DOI":"10.1109\/cdc49753.2023.10384154","type":"proceedings-article","created":{"date-parts":[[2024,1,19]],"date-time":"2024-01-19T18:38:36Z","timestamp":1705689516000},"page":"1833-1840","source":"Crossref","is-referenced-by-count":0,"title":["Towards Trustworthy AI: Sandboxing AI-Based Unverified Controllers for Safe and Secure Cyber-Physical Systems"],"prefix":"10.1109","author":[{"given":"Bingzhuo","family":"Zhong","sequence":"first","affiliation":[{"name":"TUM School of Engineering and Design, Technical University of Munich,Germany"}]},{"given":"Siyuan","family":"Liu","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology,Division of Decision and Control Systems,Stockholm,Sweden"}]},{"given":"Marco","family":"Caccamo","sequence":"additional","affiliation":[{"name":"TUM School of Engineering and Design, Technical University of Munich,Germany"}]},{"given":"Majid","family":"Zamani","sequence":"additional","affiliation":[{"name":"University of Colorado,Department of Computer Science,Boulder,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2016.2578706"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68167-2_19"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2012.2189792"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.arcontrol.2022.03.004"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2014.2364708"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.arcontrol.2019.04.011"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29662-9_15"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.nahs.2021.101110"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1536616.1536634"},{"key":"ref10","article-title":"Safe reinforcement learning for probabilistic reachability and safety specifications: A Lyapunov-based approach","author":"Huh","year":"2020","journal-title":"arXiv"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63461-2_1"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-0224-5"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50763-7"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2022.110696"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.23919\/ECC.2019.8796030"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/tac.2023.3267397"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2020.2998733"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/LCSYS.2020.3037840"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2021.109745"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2023.10.1575"},{"key":"ref21","article-title":"Secure-by-construction synthesis for control systems","author":"Zhong","year":"2023","journal-title":"arXiv"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W52860.2021.00019"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49052-6_9"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11797"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2021.3049335"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2018.2876389"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3302504.3311806"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2001.936213"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2014.21"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i12.26789"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2010.2046926"},{"volume-title":"Nonlinear Systems, ser. Pearson Education","year":"2002","author":"Khalil","key":"ref32"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.arcontrol.2018.04.002"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.05.033"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TMECH.2020.3017712"},{"volume-title":"MOSEK ApS, The MOSEK optimization toolbox for MATLAB manual. Version 9.3.6","year":"2019","key":"ref36"},{"key":"ref37","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-85729-959-8","volume-title":"Domain of attraction: analysis and control via SOS pro-gramming","volume":"20","author":"Chesi","year":"2011"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CACSD.2004.1393890"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.23919\/ECC.2013.6669862"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.29007\/zbkv"},{"article-title":"Continuous control with deep reinforce-ment learning","volume-title":"International Conference on Learning Representations(Poster)","author":"Lillicrap","key":"ref41"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1977.32"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.21236\/ADA367624"},{"key":"ref44","volume-title":"The Schur complement and its applications","volume":"4","author":"Zhang","year":"2006"}],"event":{"name":"2023 62nd IEEE Conference on Decision and Control (CDC)","start":{"date-parts":[[2023,12,13]]},"location":"Singapore, Singapore","end":{"date-parts":[[2023,12,15]]}},"container-title":["2023 62nd IEEE Conference on Decision and Control (CDC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10383192\/10383193\/10384154.pdf?arnumber=10384154","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,23]],"date-time":"2024-01-23T16:44:17Z","timestamp":1706028257000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10384154\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,13]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/cdc49753.2023.10384154","relation":{},"subject":[],"published":{"date-parts":[[2023,12,13]]}}}