no code implementations • 4 Feb 2025 • Preston K. Robinette, Taylor T. Johnson
Visible watermarks pose significant challenges for image restoration techniques, especially when the target background is unknown.
no code implementations • 10 Jan 2025 • Lucas C. Cordeiro, Matthew L. Daggitt, Julien Girard-Satabin, Omri Isac, Taylor T. Johnson, Guy Katz, Ekaterina Komendantskaya, Augustin Lemesle, Edoardo Manino, Artjoms Šinkarovs, Haoze Wu
Neural network verification is a new and rapidly developing field of research.
1 code implementation • 28 Dec 2024 • Christopher Brix, Stanley Bak, Taylor T. Johnson, Haoze Wu
This report summarizes the 5th International Verification of Neural Networks Competition (VNN-COMP 2024), held as a part of the 7th International Symposium on AI Verification (SAIV), that was collocated with the 36th International Conference on Computer-Aided Verification (CAV).
1 code implementation • 4 Dec 2024 • Dung Thuy Nguyen, Ngoc N. Tran, Taylor T. Johnson, Kevin Leach
In recent years, the rise of machine learning (ML) in cybersecurity has brought new challenges, including the increasing threat of backdoor poisoning attacks on ML malware classifiers.
no code implementations • 5 Nov 2024 • Dung Thuy Nguyen, Ziyan An, Taylor T. Johnson, Meiyi Ma, Kevin Leach
In this paper, we present FLORAL, a defense mechanism designed to mitigate poisoning attacks in federated learning for time-series tasks, even in scenarios with heterogeneous client data and a large number of adversarial participants.
no code implementations • 30 Oct 2024 • Dung Thuy Nguyen, Taylor T. Johnson, Kevin Leach
A significant challenge arises when client data comes from diverse domains (i. e., domain shift), leading to poor performance on unseen domains.
no code implementations • 18 Apr 2024 • Tianshu Bao, Hengrong Du, Weiming Xiang, Taylor T. Johnson
This paper presents the syntax and semantics of a novel type of hybrid automaton (HA) with partial differential equation (PDE) dynamic, partial differential hybrid automata (PDHA).
no code implementations • 15 Jan 2024 • Ziyan An, Taylor T. Johnson, Meiyi Ma
Recent advancements in federated learning (FL) have greatly facilitated the development of decentralized collaborative applications, particularly in the domain of Artificial Intelligence of Things (AIoT).
2 code implementations • 28 Dec 2023 • Christopher Brix, Stanley Bak, Changliu Liu, Taylor T. Johnson
This report summarizes the 4th International Verification of Neural Networks Competition (VNN-COMP 2023), held as a part of the 6th Workshop on Formal Methods for ML-Enabled Autonomous Systems (FoMLAS), that was collocated with the 35th International Conference on Computer-Aided Verification (CAV).
no code implementations • 27 Dec 2023 • Xia Wang, Anda Liang, Jonathan Sprinkle, Taylor T. Johnson
However, crucial decision issues related to security, fairness, and privacy should consider more human knowledge and principles to supervise such AI algorithms to reach more proper solutions and to benefit society more effectively.
1 code implementation • 23 Sep 2023 • Preston K. Robinette, Hanchen D. Wang, Nishan Shehadeh, Daniel Moyer, Taylor T. Johnson
To mitigate the shortcomings of steganalysis, this work focuses on a deep learning sanitization technique called SUDS that is not reliant upon knowledge of steganographic hiding techniques and is able to sanitize universal and dependent steganography.
no code implementations • 14 Jan 2023 • Christopher Brix, Mark Niklas Müller, Stanley Bak, Taylor T. Johnson, Changliu Liu
This paper presents a summary and meta-analysis of the first three iterations of the annual International Verification of Neural Networks Competition (VNN-COMP) held in 2020, 2021, and 2022.
1 code implementation • 20 Dec 2022 • Mark Niklas Müller, Christopher Brix, Stanley Bak, Changliu Liu, Taylor T. Johnson
This report summarizes the 3rd International Verification of Neural Networks Competition (VNN-COMP 2022), held as a part of the 5th Workshop on Formal Methods for ML-Enabled Autonomous Systems (FoMLAS), which was collocated with the 34th International Conference on Computer-Aided Verification (CAV).
1 code implementation • 13 Jul 2022 • Diego Manzanas Lopez, Patrick Musau, Nathaniel Hamilton, Taylor T. Johnson
We demonstrate the capabilities and efficacy of our methods through the analysis of a set of benchmarks that include neural ODEs used for classification, and in control and dynamical systems, including an evaluation of the efficacy and capabilities of our approach with respect to existing software tools within the continuous-time systems reachability literature, when it is possible to do so.
no code implementations • 3 May 2022 • Patrick Musau, Nathaniel Hamilton, Diego Manzanas Lopez, Preston Robinette, Taylor T. Johnson
One approach for providing runtime assurance of systems with components that may not be amenable to formal analysis is the simplex architecture, where an unverified component is wrapped with a safety controller and a switching logic designed to prevent dangerous behavior.
no code implementations • 26 Apr 2020 • Weiming Xiang, Hoang-Dung Tran, Xiaodong Yang, Taylor T. Johnson
Then, in combination with reachability methods developed for various dynamical system classes modeled by ordinary differential equations, a recursive algorithm is developed for over-approximating the reachable set of the closed-loop system.
1 code implementation • 12 Apr 2020 • Hoang-Dung Tran, Xiaodong Yang, Diego Manzanas Lopez, Patrick Musau, Luan Viet Nguyen, Weiming Xiang, Stanley Bak, Taylor T. Johnson
For learning-enabled CPS, such as closed-loop control systems incorporating neural networks, NNV provides exact and over-approximate reachability analysis schemes for linear plant models and FFNN controllers with piecewise-linear activation functions, such as ReLUs.
2 code implementations • 12 Apr 2020 • Hoang-Dung Tran, Stanley Bak, Weiming Xiang, Taylor T. Johnson
Set-based analysis methods can detect or prove the absence of bounded adversarial attacks, which can then be used to evaluate the effectiveness of neural network training methodology.
2 code implementations • 14 Dec 2018 • Weiming Xiang, Hoang-Dung Tran, Taylor T. Johnson
As such feedforward networks are memoryless, they can be abstractly represented as mathematical functions, and the reachability analysis of the neural network amounts to interval analysis problems.
2 code implementations • 3 Oct 2018 • Weiming Xiang, Patrick Musau, Ayana A. Wild, Diego Manzanas Lopez, Nathaniel Hamilton, Xiaodong Yang, Joel Rosenfeld, Taylor T. Johnson
This survey presents an overview of verification techniques for autonomous systems, with a focus on safety-critical autonomous cyber-physical systems (CPS) and subcomponents thereof.
2 code implementations • 25 May 2018 • Weiming Xiang, Taylor T. Johnson
This paper develops methods for estimating the reachable set and verifying safety properties of dynamical systems under control of neural network-based controllers that may be implemented in embedded software.
Systems and Control
no code implementations • 21 Dec 2017 • Weiming Xiang, Hoang-Dung Tran, Taylor T. Johnson
Due to the complicate, nonlinear, non-convex nature of neural networks, formal safety guarantees for the output behaviors of neural networks will be crucial for their applications in safety-critical systems. In this paper, the output reachable set computation and safety verification problems for a class of neural networks consisting of Rectified Linear Unit (ReLU) activation functions are addressed.
no code implementations • 9 Aug 2017 • Weiming Xiang, Hoang-Dung Tran, Taylor T. Johnson
In this paper, the output reachable estimation and safety verification problems for multi-layer perceptron neural networks are addressed.
1 code implementation • 10 Sep 2012 • Taylor T. Johnson, Sayan Mitra
For multiple targets, failures may cause deadlocks in the system, so we identify a class of non-deadlocking failures where all entities are able to make progress to their respective targets.
Robotics Distributed, Parallel, and Cluster Computing Multiagent Systems Systems and Control