Search Results for author: Susmit Jha

Found 37 papers, 7 papers with code

Concept-based Analysis of Neural Networks via Vision-Language Models

no code implementations28 Mar 2024 Ravi Mangal, Nina Narodytska, Divya Gopinath, Boyue Caroline Hu, Anirban Roy, Susmit Jha, Corina Pasareanu

The analysis of vision-based deep neural networks (DNNs) is highly desirable but it is very challenging due to the difficulty of expressing formal specifications for vision tasks and the lack of efficient verification procedures.

Calibration and Correctness of Language Models for Code

no code implementations3 Feb 2024 Claudio Spiess, David Gros, Kunal Suresh Pai, Michael Pradel, Md Rafiqul Islam Rabin, Amin Alipour, Susmit Jha, Prem Devanbu, Toufique Ahmed

Our contributions will lead to better-calibrated decision-making in the current use of code generated by language models, and offers a framework for future research to further improve calibration methods for generative models in Software Engineering.

Direct Amortized Likelihood Ratio Estimation

1 code implementation17 Nov 2023 Adam D. Cobb, Brian Matejek, Daniel Elenius, Anirban Roy, Susmit Jha

Our estimator is simple to train and estimates the likelihood ratio using a single forward pass of the neural estimator.

math-PVS: A Large Language Model Framework to Map Scientific Publications to PVS Theories

no code implementations25 Oct 2023 Hassen Saidi, Susmit Jha, Tuhin Sahai

As artificial intelligence (AI) gains greater adoption in a wide variety of applications, it has immense potential to contribute to mathematical discovery, by guiding conjecture generation, constructing counterexamples, assisting in formalizing mathematics, and discovering connections between different mathematical areas, to name a few.

Automated Theorem Proving Language Modelling +3

Neuro Symbolic Reasoning for Planning: Counterexample Guided Inductive Synthesis using Large Language Models and Satisfiability Solving

no code implementations28 Sep 2023 Sumit Kumar Jha, Susmit Jha, Patrick Lincoln, Nathaniel D. Bastian, Alvaro Velasquez, Rickard Ewetz, Sandeep Neema

We posit that we can use the satisfiability modulo theory (SMT) solvers as deductive reasoning engines to analyze the generated solutions from the LLMs, produce counterexamples when the solutions are incorrect, and provide that feedback to the LLMs exploiting the dialog capability of instruct-trained LLMs.

Hallucination Question Answering +1

Neural Stochastic Differential Equations for Robust and Explainable Analysis of Electromagnetic Unintended Radiated Emissions

no code implementations27 Sep 2023 Sumit Kumar Jha, Susmit Jha, Rickard Ewetz, Alvaro Velasquez

We provide an empirical demonstration of the fragility of ResNet-like models to Gaussian noise perturbations, where the model performance deteriorates sharply and its F1-score drops to near insignificance at 0. 008 with a Gaussian noise of only 0. 5 standard deviation.

Attribute Interpretable Machine Learning

Measuring Classification Decision Certainty and Doubt

no code implementations25 Mar 2023 Alexander M. Berenbeim, Iain J. Cruickshank, Susmit Jha, Robert H. Thomson, Nathaniel D. Bastian

Quantitative characterizations and estimations of uncertainty are of fundamental importance in optimization and decision-making processes.

Classification Decision Making

On the Robustness of AlphaFold: A COVID-19 Case Study

no code implementations10 Jan 2023 Ismail Alkhouri, Sumit Jha, Andre Beckus, George Atia, Alvaro Velasquez, Rickard Ewetz, Arvind Ramanathan, Susmit Jha

To measure the robustness of the predicted structures, we utilize (i) the root-mean-square deviation (RMSD) and (ii) the Global Distance Test (GDT) similarity measure between the predicted structure of the original sequence and the structure of its adversarially perturbed version.

Protein Folding

Design of Unmanned Air Vehicles Using Transformer Surrogate Models

1 code implementation11 Nov 2022 Adam D. Cobb, Anirban Roy, Daniel Elenius, Susmit Jha

In this paper, we develop an AI Designer that synthesizes novel UAV designs.

CODiT: Conformal Out-of-Distribution Detection in Time-Series Data

1 code implementation24 Jul 2022 Ramneet Kaur, Kaustubh Sridhar, Sangdon Park, Susmit Jha, Anirban Roy, Oleg Sokolsky, Insup Lee

Machine learning models are prone to making incorrect predictions on inputs that are far from the training distribution.

Anomaly Detection Autonomous Driving +6

Inferring and Conveying Intentionality: Beyond Numerical Rewards to Logical Intentions

no code implementations6 Jul 2022 Susmit Jha, John Rushby

Shared intentionality is a critical component in developing conscious AI agents capable of collaboration, self-reflection, deliberation, and reasoning.

reinforcement-learning Reinforcement Learning (RL)

Multiple Testing Framework for Out-of-Distribution Detection

no code implementations20 Jun 2022 Akshayaa Magesh, Venugopal V. Veeravalli, Anirban Roy, Susmit Jha

While a number of tests for OOD detection have been proposed in prior work, a formal framework for studying this problem is lacking.

Out-of-Distribution Detection Out of Distribution (OOD) Detection

Principal Manifold Flows

no code implementations14 Feb 2022 Edmond Cunningham, Adam Cobb, Susmit Jha

In this paper we characterize the geometric structure of flows using principal manifolds and understand the relationship between latent variables and samples using contours.

Density Estimation

Detecting out-of-context objects using contextual cues

no code implementations11 Feb 2022 Manoj Acharya, Anirban Roy, Kaushik Koneripalli, Susmit Jha, Christopher Kanan, Ajay Divakaran

GCRN consists of two separate graphs to predict object labels based on the contextual cues in the image: 1) a representation graph to learn object features based on the neighboring objects and 2) a context graph to explicitly capture contextual cues from the neighboring objects.

Anomaly Detection Object

Dual-Key Multimodal Backdoors for Visual Question Answering

1 code implementation CVPR 2022 Matthew Walmer, Karan Sikka, Indranil Sur, Abhinav Shrivastava, Susmit Jha

This is challenging for the attacker as the detector can distort or ignore the visual trigger entirely, which leads to models where backdoors are over-reliant on the language trigger.

Question Answering Visual Question Answering

Trigger Hunting with a Topological Prior for Trojan Detection

1 code implementation ICLR 2022 Xiaoling Hu, Xiao Lin, Michael Cogswell, Yi Yao, Susmit Jha, Chao Chen

Despite their success and popularity, deep neural networks (DNNs) are vulnerable when facing backdoor attacks.

Physical System Design Using Hamiltonian Monte Carlo over Learned Manifolds

no code implementations29 Sep 2021 Adam D. Cobb, Anirban Roy, Kaushik Koneripalli, Daniel Elenius, Susmit Jha

We use deep generative models to learn a manifold of the valid design space, followed by Hamiltonian Monte Carlo (HMC) with simulated annealing to explore and optimize design over the learned manifold, producing a diverse set of optimal designs.

valid

Protein Folding Neural Networks Are Not Robust

no code implementations9 Sep 2021 Sumit Kumar Jha, Arvind Ramanathan, Rickard Ewetz, Alvaro Velasquez, Susmit Jha

We define the robustness measure for the predicted structure of a protein sequence to be the inverse of the root-mean-square distance (RMSD) in the predicted structure and the structure of its adversarially perturbed sequence.

Adversarial Attack Protein Folding

Detecting OODs as datapoints with High Uncertainty

no code implementations13 Aug 2021 Ramneet Kaur, Susmit Jha, Anirban Roy, Sangdon Park, Oleg Sokolsky, Insup Lee

We demonstrate the difference in the detection ability of these techniques and propose an ensemble approach for detection of OODs as datapoints with high uncertainty (epistemic or aleatoric).

Autonomous Driving Management +2

MISA: Online Defense of Trojaned Models using Misattributions

no code implementations29 Mar 2021 Panagiota Kiourti, Wenchao Li, Anirban Roy, Karan Sikka, Susmit Jha

Recent studies have shown that neural networks are vulnerable to Trojan attacks, where a network is trained to respond to specially crafted trigger patterns in the inputs in specific and potentially malicious ways.

Traffic Sign Recognition

Are all outliers alike? On Understanding the Diversity of Outliers for Detecting OODs

no code implementations23 Mar 2021 Ramneet Kaur, Susmit Jha, Anirban Roy, Oleg Sokolsky, Insup Lee

Deep neural networks (DNNs) are known to produce incorrect predictions with very high confidence on out-of-distribution (OOD) inputs.

Autonomous Driving Management +1

Robust Ensembles of Neural Networks using Itô Processes

no code implementations1 Jan 2021 Sumit Kumar Jha, Susmit Jha, Rickard Ewetz, Alvaro Velasquez

We exploit this connection and the theory of stochastic dynamical systems to construct a novel ensemble of Itô processes as a new deep learning representation that is more robust than classical residual networks.

An Extension of Fano's Inequality for Characterizing Model Susceptibility to Membership Inference Attacks

no code implementations17 Sep 2020 Sumit Kumar Jha, Susmit Jha, Rickard Ewetz, Sunny Raj, Alvaro Velasquez, Laura L. Pullum, Ananthram Swami

We present a new extension of Fano's inequality and employ it to theoretically establish that the probability of success for a membership inference attack on a deep neural network can be bounded using the mutual information between its inputs and its activations.

Inference Attack Membership Inference Attack

Estimating the Density of States of Boolean Satisfiability Problems on Classical and Quantum Computing Platforms

no code implementations29 Oct 2019 Tuhin Sahai, Anurag Mishra, Jose Miguel Pasini, Susmit Jha

Given a Boolean formula $\phi(x)$ in conjunctive normal form (CNF), the density of states counts the number of variable assignments that violate exactly $e$ clauses, for all values of $e$.

On the Need for Topology-Aware Generative Models for Manifold-Based Defenses

no code implementations ICLR 2020 Uyeong Jang, Susmit Jha, Somesh Jha

These defenses rely on the assumption that data lie in a manifold of a lower dimension than the input space.

Data Augmentation

TrojDRL: Trojan Attacks on Deep Reinforcement Learning Agents

2 code implementations1 Mar 2019 Panagiota Kiourti, Kacper Wardega, Susmit Jha, Wenchao Li

Recent work has identified that classification models implemented as neural networks are vulnerable to data-poisoning and Trojan attacks at training time.

Data Poisoning General Classification +2

Trusted Neural Networks for Safety-Constrained Autonomous Control

no code implementations18 May 2018 Shalini Ghosh, Amaury Mercier, Dheeraj Pichapati, Susmit Jha, Vinod Yegneswaran, Patrick Lincoln

Experiments using our first approach of a multi-headed TNN model, on a dataset generated by a customized version of TORCS, show that (1) adding safety constraints to a neural network model results in increased performance and safety, and (2) the improvement increases with increasing importance of the safety constraints.

Self-Driving Cars

Learning Task Specifications from Demonstrations

no code implementations NeurIPS 2018 Marcell Vazquez-Chanlatte, Susmit Jha, Ashish Tiwari, Mark K. Ho, Sanjit A. Seshia

In this paper, we formulate the specification inference task as a maximum a posteriori (MAP) probability inference problem, apply the principle of maximum entropy to derive an analytic demonstration likelihood model and give an efficient approach to search for the most likely specification in a large candidate pool of specifications.

Output Range Analysis for Deep Neural Networks

no code implementations26 Sep 2017 Souradeep Dutta, Susmit Jha, Sriram Sanakaranarayanan, Ashish Tiwari

We demonstrate the effectiveness of the proposed approach for verification of NNs used in automated control as well as those used in classification.

General Classification Image Classification

Are There Good Mistakes? A Theoretical Analysis of CEGIS

no code implementations21 Jul 2014 Susmit Jha, Sanjit A. Seshia

The history bounded counterexample used in any iteration of CEGIS is bounded by the examples used in previous iterations of inductive synthesis.

Cannot find the paper you are looking for? You can Submit a new open access paper.