Search Results for author: Taylor T. Johnson

Found 24 papers, 12 papers with code

Blind Visible Watermark Removal with Morphological Dilation

no code implementations4 Feb 2025 Preston K. Robinette, Taylor T. Johnson

Visible watermarks pose significant challenges for image restoration techniques, especially when the target background is unknown.

Image Restoration

The Fifth International Verification of Neural Networks Competition (VNN-COMP 2024): Summary and Results

1 code implementation28 Dec 2024 Christopher Brix, Stanley Bak, Taylor T. Johnson, Haoze Wu

This report summarizes the 5th International Verification of Neural Networks Competition (VNN-COMP 2024), held as a part of the 7th International Symposium on AI Verification (SAIV), that was collocated with the 36th International Conference on Computer-Aided Verification (CAV).

PBP: Post-training Backdoor Purification for Malware Classifiers

1 code implementation4 Dec 2024 Dung Thuy Nguyen, Ngoc N. Tran, Taylor T. Johnson, Kevin Leach

In recent years, the rise of machine learning (ML) in cybersecurity has brought new challenges, including the increasing threat of backdoor poisoning attacks on ML malware classifiers.

Backdoor Attack

Formal Logic-guided Robust Federated Learning against Poisoning Attacks

no code implementations5 Nov 2024 Dung Thuy Nguyen, Ziyan An, Taylor T. Johnson, Meiyi Ma, Kevin Leach

In this paper, we present FLORAL, a defense mechanism designed to mitigate poisoning attacks in federated learning for time-series tasks, even in scenarios with heterogeneous client data and a large number of adversarial participants.

Federated Learning Formal Logic +2

FISC: Federated Domain Generalization via Interpolative Style Transfer and Contrastive Learning

no code implementations30 Oct 2024 Dung Thuy Nguyen, Taylor T. Johnson, Kevin Leach

A significant challenge arises when client data comes from diverse domains (i. e., domain shift), leading to poor performance on unseen domains.

Contrastive Learning Domain Generalization +2

A New Hybrid Automaton Framework with Partial Differential Equation Dynamics

no code implementations18 Apr 2024 Tianshu Bao, Hengrong Du, Weiming Xiang, Taylor T. Johnson

This paper presents the syntax and semantics of a novel type of hybrid automaton (HA) with partial differential equation (PDE) dynamic, partial differential hybrid automata (PDHA).

Formal Logic Enabled Personalized Federated Learning Through Property Inference

no code implementations15 Jan 2024 Ziyan An, Taylor T. Johnson, Meiyi Ma

Recent advancements in federated learning (FL) have greatly facilitated the development of decentralized collaborative applications, particularly in the domain of Artificial Intelligence of Things (AIoT).

Formal Logic Personalized Federated Learning

The Fourth International Verification of Neural Networks Competition (VNN-COMP 2023): Summary and Results

2 code implementations28 Dec 2023 Christopher Brix, Stanley Bak, Changliu Liu, Taylor T. Johnson

This report summarizes the 4th International Verification of Neural Networks Competition (VNN-COMP 2023), held as a part of the 6th Workshop on Formal Methods for ML-Enabled Autonomous Systems (FoMLAS), that was collocated with the 35th International Conference on Computer-Aided Verification (CAV).

Robustness Verification for Knowledge-Based Logic of Risky Driving Scenes

no code implementations27 Dec 2023 Xia Wang, Anda Liang, Jonathan Sprinkle, Taylor T. Johnson

However, crucial decision issues related to security, fairness, and privacy should consider more human knowledge and principles to supervise such AI algorithms to reach more proper solutions and to benefit society more effectively.

Decision Making Fairness +1

SUDS: Sanitizing Universal and Dependent Steganography

1 code implementation23 Sep 2023 Preston K. Robinette, Hanchen D. Wang, Nishan Shehadeh, Daniel Moyer, Taylor T. Johnson

To mitigate the shortcomings of steganalysis, this work focuses on a deep learning sanitization technique called SUDS that is not reliant upon knowledge of steganographic hiding techniques and is able to sanitize universal and dependent steganography.

Steganalysis

First Three Years of the International Verification of Neural Networks Competition (VNN-COMP)

no code implementations14 Jan 2023 Christopher Brix, Mark Niklas Müller, Stanley Bak, Taylor T. Johnson, Changliu Liu

This paper presents a summary and meta-analysis of the first three iterations of the annual International Verification of Neural Networks Competition (VNN-COMP) held in 2020, 2021, and 2022.

Image Classification reinforcement-learning +1

The Third International Verification of Neural Networks Competition (VNN-COMP 2022): Summary and Results

1 code implementation20 Dec 2022 Mark Niklas Müller, Christopher Brix, Stanley Bak, Changliu Liu, Taylor T. Johnson

This report summarizes the 3rd International Verification of Neural Networks Competition (VNN-COMP 2022), held as a part of the 5th Workshop on Formal Methods for ML-Enabled Autonomous Systems (FoMLAS), which was collocated with the 34th International Conference on Computer-Aided Verification (CAV).

Reachability Analysis of a General Class of Neural Ordinary Differential Equations

1 code implementation13 Jul 2022 Diego Manzanas Lopez, Patrick Musau, Nathaniel Hamilton, Taylor T. Johnson

We demonstrate the capabilities and efficacy of our methods through the analysis of a set of benchmarks that include neural ODEs used for classification, and in control and dynamical systems, including an evaluation of the efficacy and capabilities of our approach with respect to existing software tools within the continuous-time systems reachability literature, when it is possible to do so.

An Empirical Analysis of the Use of Real-Time Reachability for the Safety Assurance of Autonomous Vehicles

no code implementations3 May 2022 Patrick Musau, Nathaniel Hamilton, Diego Manzanas Lopez, Preston Robinette, Taylor T. Johnson

One approach for providing runtime assurance of systems with components that may not be amenable to formal analysis is the simplex architecture, where an unverified component is wrapped with a safety controller and a switching logic designed to prevent dangerous behavior.

Autonomous Vehicles

Reachable Set Estimation for Neural Network Control Systems: A Simulation-Guided Approach

no code implementations26 Apr 2020 Weiming Xiang, Hoang-Dung Tran, Xiaodong Yang, Taylor T. Johnson

Then, in combination with reachability methods developed for various dynamical system classes modeled by ordinary differential equations, a recursive algorithm is developed for over-approximating the reachable set of the closed-loop system.

NNV: The Neural Network Verification Tool for Deep Neural Networks and Learning-Enabled Cyber-Physical Systems

1 code implementation12 Apr 2020 Hoang-Dung Tran, Xiaodong Yang, Diego Manzanas Lopez, Patrick Musau, Luan Viet Nguyen, Weiming Xiang, Stanley Bak, Taylor T. Johnson

For learning-enabled CPS, such as closed-loop control systems incorporating neural networks, NNV provides exact and over-approximate reachability analysis schemes for linear plant models and FFNN controllers with piecewise-linear activation functions, such as ReLUs.

Verification of Deep Convolutional Neural Networks Using ImageStars

2 code implementations12 Apr 2020 Hoang-Dung Tran, Stanley Bak, Weiming Xiang, Taylor T. Johnson

Set-based analysis methods can detect or prove the absence of bounded adversarial attacks, which can then be used to evaluate the effectiveness of neural network training methodology.

Image Classification Pose Estimation +1

Specification-Guided Safety Verification for Feedforward Neural Networks

2 code implementations14 Dec 2018 Weiming Xiang, Hoang-Dung Tran, Taylor T. Johnson

As such feedforward networks are memoryless, they can be abstractly represented as mathematical functions, and the reachability analysis of the neural network amounts to interval analysis problems.

Verification for Machine Learning, Autonomy, and Neural Networks Survey

2 code implementations3 Oct 2018 Weiming Xiang, Patrick Musau, Ayana A. Wild, Diego Manzanas Lopez, Nathaniel Hamilton, Xiaodong Yang, Joel Rosenfeld, Taylor T. Johnson

This survey presents an overview of verification techniques for autonomous systems, with a focus on safety-critical autonomous cyber-physical systems (CPS) and subcomponents thereof.

BIG-bench Machine Learning General Classification +1

Reachability Analysis and Safety Verification for Neural Network Control Systems

2 code implementations25 May 2018 Weiming Xiang, Taylor T. Johnson

This paper develops methods for estimating the reachable set and verifying safety properties of dynamical systems under control of neural network-based controllers that may be implemented in embedded software.

Systems and Control

Reachable Set Computation and Safety Verification for Neural Networks with ReLU Activations

no code implementations21 Dec 2017 Weiming Xiang, Hoang-Dung Tran, Taylor T. Johnson

Due to the complicate, nonlinear, non-convex nature of neural networks, formal safety guarantees for the output behaviors of neural networks will be crucial for their applications in safety-critical systems. In this paper, the output reachable set computation and safety verification problems for a class of neural networks consisting of Rectified Linear Unit (ReLU) activation functions are addressed.

Output Reachable Set Estimation and Verification for Multi-Layer Neural Networks

no code implementations9 Aug 2017 Weiming Xiang, Hoang-Dung Tran, Taylor T. Johnson

In this paper, the output reachable estimation and safety verification problems for multi-layer perceptron neural networks are addressed.

Safe and Stabilizing Distributed Multi-Path Cellular Flows

1 code implementation10 Sep 2012 Taylor T. Johnson, Sayan Mitra

For multiple targets, failures may cause deadlocks in the system, so we identify a class of non-deadlocking failures where all entities are able to make progress to their respective targets.

Robotics Distributed, Parallel, and Cluster Computing Multiagent Systems Systems and Control

Cannot find the paper you are looking for? You can Submit a new open access paper.