Search Results for author: Taylor T. Johnson

Found 18 papers, 9 papers with code

A New Hybrid Automaton Framework with Partial Differential Equation Dynamics

no code implementations18 Apr 2024 Tianshu Bao, Hengrong Du, Weiming Xiang, Taylor T. Johnson

This paper presents the syntax and semantics of a novel type of hybrid automaton (HA) with partial differential equation (PDE) dynamic, partial differential hybrid automata (PDHA).

Formal Logic Enabled Personalized Federated Learning Through Property Inference

no code implementations15 Jan 2024 Ziyan An, Taylor T. Johnson, Meiyi Ma

Recent advancements in federated learning (FL) have greatly facilitated the development of decentralized collaborative applications, particularly in the domain of Artificial Intelligence of Things (AIoT).

Formal Logic Personalized Federated Learning

The Fourth International Verification of Neural Networks Competition (VNN-COMP 2023): Summary and Results

2 code implementations28 Dec 2023 Christopher Brix, Stanley Bak, Changliu Liu, Taylor T. Johnson

This report summarizes the 4th International Verification of Neural Networks Competition (VNN-COMP 2023), held as a part of the 6th Workshop on Formal Methods for ML-Enabled Autonomous Systems (FoMLAS), that was collocated with the 35th International Conference on Computer-Aided Verification (CAV).

Robustness Verification for Knowledge-Based Logic of Risky Driving Scenes

no code implementations27 Dec 2023 Xia Wang, Anda Liang, Jonathan Sprinkle, Taylor T. Johnson

However, crucial decision issues related to security, fairness, and privacy should consider more human knowledge and principles to supervise such AI algorithms to reach more proper solutions and to benefit society more effectively.

Decision Making Fairness +1

SUDS: Sanitizing Universal and Dependent Steganography

1 code implementation23 Sep 2023 Preston K. Robinette, Hanchen D. Wang, Nishan Shehadeh, Daniel Moyer, Taylor T. Johnson

To mitigate the shortcomings of steganalysis, this work focuses on a deep learning sanitization technique called SUDS that is not reliant upon knowledge of steganographic hiding techniques and is able to sanitize universal and dependent steganography.

Steganalysis

First Three Years of the International Verification of Neural Networks Competition (VNN-COMP)

no code implementations14 Jan 2023 Christopher Brix, Mark Niklas Müller, Stanley Bak, Taylor T. Johnson, Changliu Liu

This paper presents a summary and meta-analysis of the first three iterations of the annual International Verification of Neural Networks Competition (VNN-COMP) held in 2020, 2021, and 2022.

Image Classification reinforcement-learning +1

The Third International Verification of Neural Networks Competition (VNN-COMP 2022): Summary and Results

1 code implementation20 Dec 2022 Mark Niklas Müller, Christopher Brix, Stanley Bak, Changliu Liu, Taylor T. Johnson

This report summarizes the 3rd International Verification of Neural Networks Competition (VNN-COMP 2022), held as a part of the 5th Workshop on Formal Methods for ML-Enabled Autonomous Systems (FoMLAS), which was collocated with the 34th International Conference on Computer-Aided Verification (CAV).

Reachability Analysis of a General Class of Neural Ordinary Differential Equations

1 code implementation13 Jul 2022 Diego Manzanas Lopez, Patrick Musau, Nathaniel Hamilton, Taylor T. Johnson

We demonstrate the capabilities and efficacy of our methods through the analysis of a set of benchmarks that include neural ODEs used for classification, and in control and dynamical systems, including an evaluation of the efficacy and capabilities of our approach with respect to existing software tools within the continuous-time systems reachability literature, when it is possible to do so.

An Empirical Analysis of the Use of Real-Time Reachability for the Safety Assurance of Autonomous Vehicles

no code implementations3 May 2022 Patrick Musau, Nathaniel Hamilton, Diego Manzanas Lopez, Preston Robinette, Taylor T. Johnson

One approach for providing runtime assurance of systems with components that may not be amenable to formal analysis is the simplex architecture, where an unverified component is wrapped with a safety controller and a switching logic designed to prevent dangerous behavior.

Autonomous Vehicles

Reachable Set Estimation for Neural Network Control Systems: A Simulation-Guided Approach

no code implementations26 Apr 2020 Weiming Xiang, Hoang-Dung Tran, Xiaodong Yang, Taylor T. Johnson

Then, in combination with reachability methods developed for various dynamical system classes modeled by ordinary differential equations, a recursive algorithm is developed for over-approximating the reachable set of the closed-loop system.

Verification of Deep Convolutional Neural Networks Using ImageStars

2 code implementations12 Apr 2020 Hoang-Dung Tran, Stanley Bak, Weiming Xiang, Taylor T. Johnson

Set-based analysis methods can detect or prove the absence of bounded adversarial attacks, which can then be used to evaluate the effectiveness of neural network training methodology.

Image Classification Pose Estimation +1

NNV: The Neural Network Verification Tool for Deep Neural Networks and Learning-Enabled Cyber-Physical Systems

no code implementations12 Apr 2020 Hoang-Dung Tran, Xiaodong Yang, Diego Manzanas Lopez, Patrick Musau, Luan Viet Nguyen, Weiming Xiang, Stanley Bak, Taylor T. Johnson

For learning-enabled CPS, such as closed-loop control systems incorporating neural networks, NNV provides exact and over-approximate reachability analysis schemes for linear plant models and FFNN controllers with piecewise-linear activation functions, such as ReLUs.

Specification-Guided Safety Verification for Feedforward Neural Networks

1 code implementation14 Dec 2018 Weiming Xiang, Hoang-Dung Tran, Taylor T. Johnson

As such feedforward networks are memoryless, they can be abstractly represented as mathematical functions, and the reachability analysis of the neural network amounts to interval analysis problems.

Verification for Machine Learning, Autonomy, and Neural Networks Survey

1 code implementation3 Oct 2018 Weiming Xiang, Patrick Musau, Ayana A. Wild, Diego Manzanas Lopez, Nathaniel Hamilton, Xiaodong Yang, Joel Rosenfeld, Taylor T. Johnson

This survey presents an overview of verification techniques for autonomous systems, with a focus on safety-critical autonomous cyber-physical systems (CPS) and subcomponents thereof.

BIG-bench Machine Learning General Classification

Reachability Analysis and Safety Verification for Neural Network Control Systems

1 code implementation25 May 2018 Weiming Xiang, Taylor T. Johnson

This paper develops methods for estimating the reachable set and verifying safety properties of dynamical systems under control of neural network-based controllers that may be implemented in embedded software.

Systems and Control

Reachable Set Computation and Safety Verification for Neural Networks with ReLU Activations

no code implementations21 Dec 2017 Weiming Xiang, Hoang-Dung Tran, Taylor T. Johnson

Due to the complicate, nonlinear, non-convex nature of neural networks, formal safety guarantees for the output behaviors of neural networks will be crucial for their applications in safety-critical systems. In this paper, the output reachable set computation and safety verification problems for a class of neural networks consisting of Rectified Linear Unit (ReLU) activation functions are addressed.

Output Reachable Set Estimation and Verification for Multi-Layer Neural Networks

no code implementations9 Aug 2017 Weiming Xiang, Hoang-Dung Tran, Taylor T. Johnson

In this paper, the output reachable estimation and safety verification problems for multi-layer perceptron neural networks are addressed.

Safe and Stabilizing Distributed Multi-Path Cellular Flows

1 code implementation10 Sep 2012 Taylor T. Johnson, Sayan Mitra

For multiple targets, failures may cause deadlocks in the system, so we identify a class of non-deadlocking failures where all entities are able to make progress to their respective targets.

Robotics Distributed, Parallel, and Cluster Computing Multiagent Systems Systems and Control

Cannot find the paper you are looking for? You can Submit a new open access paper.