Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–50 of 71 results for author: Johnson, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.05703  [pdf, other

    cs.CR

    Case Study: Neural Network Malware Detection Verification for Feature and Image Datasets

    Authors: Preston K. Robinette, Diego Manzanas Lopez, Serena Serbinowska, Kevin Leach, Taylor T. Johnson

    Abstract: Malware, or software designed with harmful intent, is an ever-evolving threat that can have drastic effects on both individuals and institutions. Neural network malware classification systems are key tools for combating these threats but are vulnerable to adversarial machine learning attacks. These attacks perturb input data to cause misclassification, bypassing protective systems. Existing defens… ▽ More

    Submitted 8 April, 2024; originally announced April 2024.

    Comments: In International Conference On Formal Methods in Software Engineering, 2024; (FormaliSE'24)

  2. arXiv:2402.15514  [pdf

    cs.CL cs.AI

    Large Scale Generative AI Text Applied to Sports and Music

    Authors: Aaron Baughman, Stephen Hammer, Rahul Agarwal, Gozde Akay, Eduardo Morales, Tony Johnson, Leonid Karlinsky, Rogerio Feris

    Abstract: We address the problem of scaling up the production of media content, including commentary and personalized news stories, for large-scale sports and music events worldwide. Our approach relies on generative AI models to transform a large volume of multimodal data (e.g., videos, articles, real-time scoring feeds, statistics, and fact sheets) into coherent and fluent text. Based on this approach, we… ▽ More

    Submitted 27 February, 2024; v1 submitted 31 January, 2024; originally announced February 2024.

    Comments: 9 pages, 8 figures, 5 tables

  3. arXiv:2401.07448  [pdf, other

    cs.AI cs.LG

    Formal Logic Enabled Personalized Federated Learning Through Property Inference

    Authors: Ziyan An, Taylor T. Johnson, Meiyi Ma

    Abstract: Recent advancements in federated learning (FL) have greatly facilitated the development of decentralized collaborative applications, particularly in the domain of Artificial Intelligence of Things (AIoT). However, a critical aspect missing from the current research landscape is the ability to enable data-driven client models with symbolic reasoning capabilities. Specifically, the inherent heteroge… ▽ More

    Submitted 23 January, 2024; v1 submitted 14 January, 2024; originally announced January 2024.

  4. arXiv:2312.16760  [pdf, other

    cs.LG cs.AI cs.SE

    The Fourth International Verification of Neural Networks Competition (VNN-COMP 2023): Summary and Results

    Authors: Christopher Brix, Stanley Bak, Changliu Liu, Taylor T. Johnson

    Abstract: This report summarizes the 4th International Verification of Neural Networks Competition (VNN-COMP 2023), held as a part of the 6th Workshop on Formal Methods for ML-Enabled Autonomous Systems (FoMLAS), that was collocated with the 35th International Conference on Computer-Aided Verification (CAV). VNN-COMP is held annually to facilitate the fair and objective comparison of state-of-the-art neural… ▽ More

    Submitted 27 December, 2023; originally announced December 2023.

    Comments: arXiv admin note: text overlap with arXiv:2212.10376

  5. arXiv:2312.16364  [pdf, other

    cs.AI

    Robustness Verification for Knowledge-Based Logic of Risky Driving Scenes

    Authors: Xia Wang, Anda Liang, Jonathan Sprinkle, Taylor T. Johnson

    Abstract: Many decision-making scenarios in modern life benefit from the decision support of artificial intelligence algorithms, which focus on a data-driven philosophy and automated programs or systems. However, crucial decision issues related to security, fairness, and privacy should consider more human knowledge and principles to supervise such AI algorithms to reach more proper solutions and to benefit… ▽ More

    Submitted 26 December, 2023; originally announced December 2023.

  6. arXiv:2311.12130  [pdf, other

    cs.SD cs.LG eess.AS

    Formal Verification of Long Short-Term Memory based Audio Classifiers: A Star based Approach

    Authors: Neelanjana Pal, Taylor T Johnson

    Abstract: Formally verifying audio classification systems is essential to ensure accurate signal classification across real-world applications like surveillance, automotive voice commands, and multimedia content management, preventing potential errors with serious consequences. Drawing from recent research, this study advances the utilization of star-set-based formal verification, extended through reachabil… ▽ More

    Submitted 16 November, 2023; originally announced November 2023.

    Comments: In Proceedings FMAS 2023, arXiv:2311.08987

    Journal ref: EPTCS 395, 2023, pp. 162-179

  7. Online Reachability Analysis and Space Convexification for Autonomous Racing

    Authors: Sergiy Bogomolov, Taylor T. Johnson, Diego Manzanas Lopez, Patrick Musau, Paulius Stankaitis

    Abstract: This paper presents an optimisation-based approach for an obstacle avoidance problem within an autonomous vehicle racing context. Our control regime leverages online reachability analysis and sensor data to compute the maximal safe traversable region that an agent can traverse within the environment. The idea is to first compute a non-convex safe region, which then can be convexified via a novel… ▽ More

    Submitted 16 November, 2023; originally announced November 2023.

    Comments: In Proceedings FMAS 2023, arXiv:2311.08987

    Journal ref: EPTCS 395, 2023, pp. 95-112

  8. arXiv:2311.05668  [pdf

    q-bio.OT cs.DB

    The Biological Data Sustainability Paradox

    Authors: Terence R. Johnson, Philip E. Bourne

    Abstract: Biological data in digital form has become a, if not the, driving force behind innovations in biology, medicine, and the environment. No study and no model would be complete without access to digital data (including text) collected by others and available in public repositories. With this ascent in the fundamental importance of data for reproducible scientific progress has come a troubling paradox… ▽ More

    Submitted 9 November, 2023; originally announced November 2023.

    Comments: 12 pages 5852 words 1 figure

  9. arXiv:2310.06951  [pdf, other

    cs.CR

    Monsters in the Dark: Sanitizing Hidden Threats with Diffusion Models

    Authors: Preston K. Robinette, Daniel Moyer, Taylor T. Johnson

    Abstract: Steganography is the art of hiding information in plain sight. This form of covert communication can be used by bad actors to propagate malware, exfiltrate victim data, and communicate with other bad actors. Current image steganography defenses rely upon steganalysis, or the detection of hidden messages. These methods, however, are non-blind as they require information about known steganography te… ▽ More

    Submitted 10 October, 2023; originally announced October 2023.

  10. SUDS: Sanitizing Universal and Dependent Steganography

    Authors: Preston K. Robinette, Hanchen D. Wang, Nishan Shehadeh, Daniel Moyer, Taylor T. Johnson

    Abstract: Steganography, or hiding messages in plain sight, is a form of information hiding that is most commonly used for covert communication. As modern steganographic mediums include images, text, audio, and video, this communication method is being increasingly used by bad actors to propagate malware, exfiltrate data, and discreetly communicate. Current protection mechanisms rely upon steganalysis, or t… ▽ More

    Submitted 23 September, 2023; originally announced September 2023.

    Comments: Accepted to European Conference on Artificial Intelligence (ECAI) 2023

  11. arXiv:2308.08438  [pdf

    cs.SD cs.LG eess.AS

    Accurate synthesis of Dysarthric Speech for ASR data augmentation

    Authors: Mohammad Soleymanpour, Michael T. Johnson, Rahim Soleymanpour, Jeffrey Berry

    Abstract: Dysarthria is a motor speech disorder often characterized by reduced speech intelligibility through slow, uncoordinated control of speech production muscles. Automatic Speech recognition (ASR) systems can help dysarthric talkers communicate more effectively. However, robust dysarthria-specific ASR requires a significant amount of training speech, which is not readily available for dysarthric talke… ▽ More

    Submitted 16 August, 2023; originally announced August 2023.

    Comments: arXiv admin note: text overlap with arXiv:2201.11571

  12. arXiv:2308.07890  [pdf, other

    cs.AI cs.FL cs.LO

    EduSAT: A Pedagogical Tool for Theory and Applications of Boolean Satisfiability

    Authors: Yiqi Zhao, Ziyan An, Meiyi Ma, Taylor Johnson

    Abstract: Boolean Satisfiability (SAT) and Satisfiability Modulo Theories (SMT) are widely used in automated verification, but there is a lack of interactive tools designed for educational purposes in this field. To address this gap, we present EduSAT, a pedagogical tool specifically developed to support learning and understanding of SAT and SMT solving. EduSAT offers implementations of key algorithms such… ▽ More

    Submitted 15 August, 2023; originally announced August 2023.

  13. arXiv:2307.13907  [pdf, other

    cs.LG cs.AI cs.CY cs.NE

    Robustness Verification of Deep Neural Networks using Star-Based Reachability Analysis with Variable-Length Time Series Input

    Authors: Neelanjana Pal, Diego Manzanas Lopez, Taylor T Johnson

    Abstract: Data-driven, neural network (NN) based anomaly detection and predictive maintenance are emerging research areas. NN-based analytics of time-series data offer valuable insights into past behaviors and estimates of critical parameters like remaining useful life (RUL) of equipment and state-of-charge (SOC) of batteries. However, input time series data can be exposed to intentional or unintentional no… ▽ More

    Submitted 25 July, 2023; originally announced July 2023.

    Comments: Under Review, 26 Pages, 14 figures, 2 tables

  14. Probabilistic Neural Data Fusion for Learning from an Arbitrary Number of Multi-fidelity Data Sets

    Authors: Carlos Mora, Jonathan Tammer Eweis-Labolle, Tyler Johnson, Likith Gadde, Ramin Bostanabad

    Abstract: In many applications in engineering and sciences analysts have simultaneous access to multiple data sources. In such cases, the overall cost of acquiring information can be reduced via data fusion or multi-fidelity (MF) modeling where one leverages inexpensive low-fidelity (LF) sources to reduce the reliance on expensive high-fidelity (HF) data. In this paper, we employ neural networks (NNs) for d… ▽ More

    Submitted 30 January, 2023; originally announced January 2023.

  15. arXiv:2301.05815  [pdf, other

    cs.LG cs.AI cs.SE

    First Three Years of the International Verification of Neural Networks Competition (VNN-COMP)

    Authors: Christopher Brix, Mark Niklas Müller, Stanley Bak, Taylor T. Johnson, Changliu Liu

    Abstract: This paper presents a summary and meta-analysis of the first three iterations of the annual International Verification of Neural Networks Competition (VNN-COMP) held in 2020, 2021, and 2022. In the VNN-COMP, participants submit software tools that analyze whether given neural networks satisfy specifications describing their input-output behavior. These neural networks and specifications cover a va… ▽ More

    Submitted 13 January, 2023; originally announced January 2023.

    Comments: 12 pages, journal preprint

  16. arXiv:2301.02330  [pdf

    cs.AI cs.HC q-bio.QM

    Evidence of behavior consistent with self-interest and altruism in an artificially intelligent agent

    Authors: Tim Johnson, Nick Obradovich

    Abstract: Members of various species engage in altruism--i.e. accepting personal costs to benefit others. Here we present an incentivized experiment to test for altruistic behavior among AI agents consisting of large language models developed by the private company OpenAI. Using real incentives for AI agents that take the form of tokens used to purchase their services, we first examine whether AI agents max… ▽ More

    Submitted 5 January, 2023; originally announced January 2023.

  17. arXiv:2212.13371  [pdf

    cs.AI cs.HC econ.GN

    Measuring an artificial intelligence agent's trust in humans using machine incentives

    Authors: Tim Johnson, Nick Obradovich

    Abstract: Scientists and philosophers have debated whether humans can trust advanced artificial intelligence (AI) agents to respect humanity's best interests. Yet what about the reverse? Will advanced AI agents trust humans? Gauging an AI agent's trust in humans is challenging because--absent costs for dishonesty--such agents might respond falsely about their trust in humans. Here we present a method for in… ▽ More

    Submitted 27 December, 2022; originally announced December 2022.

  18. arXiv:2212.10376  [pdf, other

    cs.LG cs.AI cs.SE

    The Third International Verification of Neural Networks Competition (VNN-COMP 2022): Summary and Results

    Authors: Mark Niklas Müller, Christopher Brix, Stanley Bak, Changliu Liu, Taylor T. Johnson

    Abstract: This report summarizes the 3rd International Verification of Neural Networks Competition (VNN-COMP 2022), held as a part of the 5th Workshop on Formal Methods for ML-Enabled Autonomous Systems (FoMLAS), which was collocated with the 34th International Conference on Computer-Aided Verification (CAV). VNN-COMP is held annually to facilitate the fair and objective comparison of state-of-the-art neura… ▽ More

    Submitted 16 February, 2023; v1 submitted 20 December, 2022; originally announced December 2022.

    Comments: Corrected a small error in instance-wise results; 54 pages, 27 tables, and 16 figures

  19. arXiv:2208.05360  [pdf, other

    cs.RO

    BehaVerify: Verifying Temporal Logic Specifications for Behavior Trees

    Authors: Serena S. Serbinowska, Taylor T. Johnson

    Abstract: Behavior Trees, which originated in video games as a method for controlling NPCs but have since gained traction within the robotics community, are a framework for describing the execution of a task. BehaVerify is a tool that creates a nuXmv model from a py_tree. For composite nodes, which are standardized, this process is automatic and requires no additional user input. A wide variety of leaf node… ▽ More

    Submitted 20 February, 2024; v1 submitted 10 August, 2022; originally announced August 2022.

  20. arXiv:2207.08775  [pdf, other

    cs.LO cs.FL cs.SC

    Model Checking for Rectangular Hybrid Systems: A Quantified Encoding Approach

    Authors: Luan V. Nguyen, Wesam Haddad, Taylor T. Johnson

    Abstract: Satisfiability Modulo Theories (SMT) solvers have been successfully applied to solve many problems in formal verification such as bounded model checking (BMC) for many classes of systems from integrated circuits to cyber-physical systems. Typically, BMC is performed by checking satisfiability of a possibly long, but quantifier-free formula. However, BMC problems can naturally be encoded as quantif… ▽ More

    Submitted 14 July, 2022; originally announced July 2022.

    Comments: In Proceedings SNR 2021, arXiv:2207.04391

    Journal ref: EPTCS 361, 2022, pp. 9-23

  21. Work In Progress: Safety and Robustness Verification of Autoencoder-Based Regression Models using the NNV Tool

    Authors: Neelanjana Pal, Taylor T Johnson

    Abstract: This work in progress paper introduces robustness verification for autoencoder-based regression neural network (NN) models, following state-of-the-art approaches for robustness verification of image classification NNs. Despite the ongoing progress in developing verification methods for safety and robustness in various deep neural networks (DNNs), robustness checking of autoencoder models has not y… ▽ More

    Submitted 14 July, 2022; originally announced July 2022.

    Comments: In Proceedings SNR 2021, arXiv:2207.04391

    Journal ref: EPTCS 361, 2022, pp. 79-88

  22. arXiv:2207.06531  [pdf, other

    cs.LG

    Reachability Analysis of a General Class of Neural Ordinary Differential Equations

    Authors: Diego Manzanas Lopez, Patrick Musau, Nathaniel Hamilton, Taylor T. Johnson

    Abstract: Continuous deep learning models, referred to as Neural Ordinary Differential Equations (Neural ODEs), have received considerable attention over the last several years. Despite their burgeoning impact, there is a lack of formal analysis techniques for these systems. In this paper, we consider a general class of neural ODEs with varying architectures and layers, and introduce a novel reachability fr… ▽ More

    Submitted 13 July, 2022; originally announced July 2022.

  23. Ablation Study of How Run Time Assurance Impacts the Training and Performance of Reinforcement Learning Agents

    Authors: Nathaniel Hamilton, Kyle Dunlap, Taylor T Johnson, Kerianne L Hobbs

    Abstract: Reinforcement Learning (RL) has become an increasingly important research area as the success of machine learning algorithms and methods grows. To combat the safety concerns surrounding the freedom given to RL agents while training, there has been an increase in work concerning Safe Reinforcement Learning (SRL). However, these new and safe methods have been held to less scrutiny than their unsafe… ▽ More

    Submitted 8 July, 2022; originally announced July 2022.

    Journal ref: 2023 IEEE 9th International Conference on Space Mission Challenges for Information Technology (SMC-IT), 2023, pp. 45-55

  24. arXiv:2206.07486  [pdf, other

    eess.SP cs.IT cs.LG

    Topological Simplification of Signals for Inference and Approximate Reconstruction

    Authors: Gary Koplik, Nathan Borggren, Sam Voisin, Gabrielle Angeloro, Jay Hineman, Tessa Johnson, Paul Bendich

    Abstract: As Internet of Things (IoT) devices become both cheaper and more powerful, researchers are increasingly finding solutions to their scientific curiosities both financially and computationally feasible. When operating with restricted power or communications budgets, however, devices can only send highly-compressed data. Such circumstances are common for devices placed away from electric grids that c… ▽ More

    Submitted 25 May, 2022; originally announced June 2022.

    Comments: 10 pages, 12 figures

  25. arXiv:2205.01419  [pdf, other

    cs.RO cs.CV cs.FL cs.LG eess.SY

    An Empirical Analysis of the Use of Real-Time Reachability for the Safety Assurance of Autonomous Vehicles

    Authors: Patrick Musau, Nathaniel Hamilton, Diego Manzanas Lopez, Preston Robinette, Taylor T. Johnson

    Abstract: Recent advances in machine learning technologies and sensing have paved the way for the belief that safe, accessible, and convenient autonomous vehicles may be realized in the near future. Despite tremendous advances within this context, fundamental challenges around safety and reliability are limiting their arrival and comprehensive adoption. Autonomous vehicles are often tasked with operating in… ▽ More

    Submitted 3 May, 2022; originally announced May 2022.

    Comments: 30 pages, 12 Figures, Submitted to Artificial Intelligence's Special Issue on "Risk-Aware Autonomous Systems: Theory and Practice."

  26. arXiv:2201.11571  [pdf

    eess.AS cs.CL cs.SD

    Synthesizing Dysarthric Speech Using Multi-talker TTS for Dysarthric Speech Recognition

    Authors: Mohammad Soleymanpour, Michael T. Johnson, Rahim Soleymanpour, Jeffrey Berry

    Abstract: Dysarthria is a motor speech disorder often characterized by reduced speech intelligibility through slow, uncoordinated control of speech production muscles. Automatic Speech recognition (ASR) systems may help dysarthric talkers communicate more effectively. To have robust dysarthria-specific ASR, sufficient training speech is required, which is not readily available. Recent advances in Text-To-Sp… ▽ More

    Submitted 27 January, 2022; originally announced January 2022.

    Comments: Accepted ICASSP 2022

  27. arXiv:2109.04626  [pdf, other

    cs.LG math.ST

    A Fast PC Algorithm with Reversed-order Pruning and A Parallelization Strategy

    Authors: Kai Zhang, Chao Tian, Kun Zhang, Todd Johnson, Xiaoqian Jiang

    Abstract: The PC algorithm is the state-of-the-art algorithm for causal structure discovery on observational data. It can be computationally expensive in the worst case due to the conditional independence tests are performed in an exhaustive-searching manner. This makes the algorithm computationally intractable when the task contains several hundred or thousand nodes, particularly when the true underlying c… ▽ More

    Submitted 9 September, 2021; originally announced September 2021.

    Comments: 37 pages

  28. arXiv:2109.00498  [pdf, other

    cs.LO cs.LG

    The Second International Verification of Neural Networks Competition (VNN-COMP 2021): Summary and Results

    Authors: Stanley Bak, Changliu Liu, Taylor Johnson

    Abstract: This report summarizes the second International Verification of Neural Networks Competition (VNN-COMP 2021), held as a part of the 4th Workshop on Formal Methods for ML-Enabled Autonomous Systems that was collocated with the 33rd International Conference on Computer-Aided Verification (CAV). Twelve teams participated in this competition. The goal of the competition is to provide an objective compa… ▽ More

    Submitted 30 August, 2021; originally announced September 2021.

  29. arXiv:2108.12105  [pdf, other

    cs.SD cs.LG eess.AS

    Full Attention Bidirectional Deep Learning Structure for Single Channel Speech Enhancement

    Authors: Yuzi Yan, Wei-Qiang Zhang, Michael T. Johnson

    Abstract: As the cornerstone of other important technologies, such as speech recognition and speech synthesis, speech enhancement is a critical area in audio signal processing. In this paper, a new deep learning structure for speech enhancement is demonstrated. The model introduces a "full" attention mechanism to a bidirectional sequence-to-sequence method to make use of latent information after each focal… ▽ More

    Submitted 26 August, 2021; originally announced August 2021.

    Comments: 4 pages

  30. arXiv:2108.04214  [pdf, other

    cs.LG

    Neural Network Repair with Reachability Analysis

    Authors: Xiaodong Yang, Tom Yamaguchi, Hoang-Dung Tran, Bardh Hoxha, Taylor T Johnson, Danil Prokhorov

    Abstract: Safety is a critical concern for the next generation of autonomy that is likely to rely heavily on deep neural networks for perception and control. Formally verifying the safety and robustness of well-trained DNNs and learning-enabled systems under attacks, model uncertainties, and sensing errors is essential for safe autonomy. This research proposes a framework to repair unsafe DNNs in safety-cri… ▽ More

    Submitted 9 August, 2021; originally announced August 2021.

  31. arXiv:2106.12074  [pdf, other

    cs.CV

    Reachability Analysis of Convolutional Neural Networks

    Authors: Xiaodong Yang, Tomoya Yamaguchi, Hoang-Dung Tran, Bardh Hoxha, Taylor T Johnson, Danil Prokhorov

    Abstract: Deep convolutional neural networks have been widely employed as an effective technique to handle complex and practical problems. However, one of the fundamental problems is the lack of formal methods to analyze their behavior. To address this challenge, we propose an approach to compute the exact reachable sets of a network given an input domain, where the reachable set is represented by the face… ▽ More

    Submitted 22 June, 2021; originally announced June 2021.

  32. arXiv:2101.12615  [pdf, other

    cs.LG

    DigitalExposome: Quantifying the Urban Environment Influence on Wellbeing based on Real-Time Multi-Sensor Fusion and Deep Belief Network

    Authors: Thomas Johnson, Eiman Kanjo, Kieran Woodward

    Abstract: In this paper, we define the term 'DigitalExposome' as a conceptual framework that takes us closer towards understanding the relationship between environment, personal characteristics, behaviour and wellbeing using multimodel mobile sensing technology. Specifically, we simultaneously collected (for the first time) multi-sensor data including urban environmental factors (e.g. air pollution includin… ▽ More

    Submitted 29 January, 2021; originally announced January 2021.

  33. arXiv:2011.14440  [pdf

    q-bio.PE cs.GT cs.SI econ.TH physics.app-ph

    Temporal assortment of cooperators in the spatial prisoner's dilemma

    Authors: Tim Johnson, Oleg Smirnov

    Abstract: We study a spatial, one-shot prisoner's dilemma (PD) model in which selection operates on both an organism's behavioral strategy (cooperate or defect) and its choice of when to implement that strategy across a set of discrete time slots. Cooperators evolve to fixation regularly in the model when we add time slots to lattices and small-world networks, and their portion of the population grows, albe… ▽ More

    Submitted 29 November, 2020; originally announced November 2020.

    Comments: 16 pages; 5 figures

    MSC Class: 91-08 ACM Class: J.2; J.3; J.4

  34. arXiv:2010.01572  [pdf

    cs.SD cs.HC eess.AS

    Resonant Processing of Instrumental Sound Controlled by Spatial Position

    Authors: Camille Goudeseune, Guy Garnett, Timothy Johnson

    Abstract: We present an acoustic musical instrument played through a resonance model of another sound. The resonance model is controlled in real time as part of the composite instrument. Our implementation uses an electric violin, whose spatial position modifies filter parameters of the resonance model. Simplicial interpolation defines the mapping from spatial position to filter parameters. With some effort… ▽ More

    Submitted 4 October, 2020; originally announced October 2020.

    Comments: Proceedings of the International Conference on New Interfaces for Musical Expression, 2001

    ACM Class: H.5.5

  35. arXiv:2007.08672  [pdf, other

    cs.AI cs.CL cs.RO

    Toward Forgetting-Sensitive Referring Expression Generationfor Integrated Robot Architectures

    Authors: Tom Williams, Torin Johnson, Will Culpepper, Kellyn Larson

    Abstract: To engage in human-like dialogue, robots require the ability to describe the objects, locations, and people in their environment, a capability known as "Referring Expression Generation." As speakers repeatedly refer to similar objects, they tend to re-use properties from previous descriptions, in part to help the listener, and in part due to cognitive availability of those properties in working me… ▽ More

    Submitted 16 July, 2020; originally announced July 2020.

    Comments: Accepted for (nonarchival) presentation at Advances in Cognitive Systems (ACS) 2020

  36. arXiv:2007.05105  [pdf, other

    cs.LG stat.ML

    AdaScale SGD: A User-Friendly Algorithm for Distributed Training

    Authors: Tyler B. Johnson, Pulkit Agrawal, Haijie Gu, Carlos Guestrin

    Abstract: When using large-batch training to speed up stochastic gradient descent, learning rates must adapt to new batch sizes in order to maximize speed-ups and preserve model quality. Re-tuning learning rates is resource intensive, while fixed scaling rules often degrade model quality. We propose AdaScale SGD, an algorithm that reliably adapts learning rates to large-batch training. By continually adapti… ▽ More

    Submitted 9 July, 2020; originally announced July 2020.

    Comments: ICML 2020

  37. arXiv:2007.02674  [pdf, other

    cs.HC

    Sensor Data and the City: Urban Visualisation and Aggregation of Well-Being Data

    Authors: Thomas Johnson, Eiman Kanjo, Kieran Woodward

    Abstract: The growth of mobile sensor technologies have made it possible for city councils to understand peoples' behaviour in urban spaces which could help to reduce stress around the city. We present a quantitative approach to convey a collective sense of urban places. The data was collected at a high level of granularity, navigating the space around a highly popular urban environment. We capture people's… ▽ More

    Submitted 3 July, 2020; originally announced July 2020.

    Comments: 4 pages, 5 figures

  38. arXiv:2006.12594  [pdf, other

    eess.AS cs.LG cs.SD

    Articulatory-WaveNet: Autoregressive Model For Acoustic-to-Articulatory Inversion

    Authors: Narjes Bozorg, Michael T. Johnson

    Abstract: This paper presents Articulatory-WaveNet, a new approach for acoustic-to-articulator inversion. The proposed system uses the WaveNet speech synthesis architecture, with dilated causal convolutional layers using previous values of the predicted articulatory trajectories conditioned on acoustic features. The system was trained and evaluated on the ElectroMagnetic Articulography corpus of Mandarin Ac… ▽ More

    Submitted 22 June, 2020; originally announced June 2020.

  39. arXiv:2005.01800  [pdf, other

    cs.CR cs.LG stat.ML

    Mind the Gap: On Bridging the Semantic Gap between Machine Learning and Information Security

    Authors: Michael R. Smith, Nicholas T. Johnson, Joe B. Ingram, Armida J. Carbajal, Ramyaa Ramyaa, Evelyn Domschot, Christopher C. Lamb, Stephen J. Verzi, W. Philip Kegelmeyer

    Abstract: Despite the potential of Machine learning (ML) to learn the behavior of malware, detect novel malware samples, and significantly improve information security (InfoSec) we see few, if any, high-impact ML techniques in deployed systems, notwithstanding multiple reported successes in open literature. We hypothesize that the failure of ML in making high-impacts in InfoSec are rooted in a disconnect be… ▽ More

    Submitted 4 May, 2020; originally announced May 2020.

    Comments: 14 pages, 2 Figures, 6 tables

  40. arXiv:2004.05519  [pdf, other

    eess.SY cs.LG

    NNV: The Neural Network Verification Tool for Deep Neural Networks and Learning-Enabled Cyber-Physical Systems

    Authors: Hoang-Dung Tran, Xiaodong Yang, Diego Manzanas Lopez, Patrick Musau, Luan Viet Nguyen, Weiming Xiang, Stanley Bak, Taylor T. Johnson

    Abstract: This paper presents the Neural Network Verification (NNV) software tool, a set-based verification framework for deep neural networks (DNNs) and learning-enabled cyber-physical systems (CPS). The crux of NNV is a collection of reachability algorithms that make use of a variety of set representations, such as polyhedra, star sets, zonotopes, and abstract-domain representations. NNV supports both exa… ▽ More

    Submitted 11 April, 2020; originally announced April 2020.

  41. arXiv:2004.05511  [pdf, other

    cs.LG cs.CV

    Verification of Deep Convolutional Neural Networks Using ImageStars

    Authors: Hoang-Dung Tran, Stanley Bak, Weiming Xiang, Taylor T. Johnson

    Abstract: Convolutional Neural Networks (CNN) have redefined the state-of-the-art in many real-world applications, such as facial recognition, image classification, human pose estimation, and semantic segmentation. Despite their success, CNNs are vulnerable to adversarial attacks, where slight changes to their inputs may lead to sharp changes in their output in even well-trained networks. Set-based analysis… ▽ More

    Submitted 14 May, 2020; v1 submitted 11 April, 2020; originally announced April 2020.

  42. arXiv:2003.01226  [pdf, other

    cs.AI cs.LG

    Reachability Analysis for Feed-Forward Neural Networks using Face Lattices

    Authors: Xiaodong Yang, Hoang-Dung Tran, Weiming Xiang, Taylor Johnson

    Abstract: Deep neural networks have been widely applied as an effective approach to handle complex and practical problems. However, one of the most fundamental open problems is the lack of formal methods to analyze the safety of their behaviors. To address this challenge, we propose a parallelizable technique to compute exact reachable sets of a neural network to an input set. Our method currently focuses o… ▽ More

    Submitted 2 March, 2020; originally announced March 2020.

  43. arXiv:1909.09087  [pdf, other

    cs.MA

    Real-Time Verification for Distributed Cyber-Physical Systems

    Authors: Hoang-Dung Tran, Luan Viet Nguyen, Patrick Musau, Weiming Xiang, Taylor T. Johnson

    Abstract: Safety-critical distributed cyber-physical systems (CPSs) have been found in a wide range of applications. Notably, they have displayed a great deal of utility in intelligent transportation, where autonomous vehicles communicate and cooperate with each other via a high-speed communication network. Such systems require an ability to identify maneuvers in real-time that cause dangerous circumstances… ▽ More

    Submitted 19 September, 2019; originally announced September 2019.

  44. arXiv:1907.02859  [pdf, other

    cs.PL

    GTIRB: Intermediate Representation for Binaries

    Authors: Eric Schulte, Jonathan Dorn, Antonio Flores-Montoya, Aaron Ballman, Tom Johnson

    Abstract: GTIRB is an intermediate representation for binary analysis and rewriting tools including disassemblers, lifters, analyzers, rewriters, and pretty-printers. GTIRB is designed to enable communication between tools in a format that provides the basic information necessary for analysis and rewriting while making no further assumptions about domain (e.g., malware vs. cleanware, or PE vs. ELF) or seman… ▽ More

    Submitted 2 April, 2020; v1 submitted 2 July, 2019; originally announced July 2019.

  45. arXiv:1904.02824  [pdf, other

    cs.DS

    Taming the Knight's Tour: Minimizing Turns and Crossings

    Authors: Juan Jose Besa, Timothy Johnson, Nil Mamano, Martha C. Osegueda, Parker Williams

    Abstract: We introduce two new metrics of "simplicity" for knight's tours: the number of turns and the number of crossings. We give a novel algorithm that produces tours with $9.25n+O(1)$ turns and $12n+O(1)$ crossings on an $n\times n$ board, and we show lower bounds of $(6-ε)n$ and $4n-O(1)$ on the respective problems of minimizing these metrics. Hence, our algorithm achieves approximation ratios of… ▽ More

    Submitted 17 January, 2022; v1 submitted 4 April, 2019; originally announced April 2019.

    Comments: 43 pages, 29 figures. FUN 2020 (FUN with Algorithms); FUN 2020 special issue in TCS

  46. arXiv:1812.06161  [pdf, other

    cs.LG cs.AI

    Specification-Guided Safety Verification for Feedforward Neural Networks

    Authors: Weiming Xiang, Hoang-Dung Tran, Taylor T. Johnson

    Abstract: This paper presents a specification-guided safety verification method for feedforward neural networks with general activation functions. As such feedforward networks are memoryless, they can be abstractly represented as mathematical functions, and the reachability analysis of the neural network amounts to interval analysis problems. In the framework of interval analysis, a computationally efficien… ▽ More

    Submitted 14 December, 2018; originally announced December 2018.

    Comments: To be presented in AAAI Spring Symposium on Verification of Neural Networks (VNN19)

  47. arXiv:1810.01989  [pdf, ps, other

    cs.AI cs.LG

    Verification for Machine Learning, Autonomy, and Neural Networks Survey

    Authors: Weiming Xiang, Patrick Musau, Ayana A. Wild, Diego Manzanas Lopez, Nathaniel Hamilton, Xiaodong Yang, Joel Rosenfeld, Taylor T. Johnson

    Abstract: This survey presents an overview of verification techniques for autonomous systems, with a focus on safety-critical autonomous cyber-physical systems (CPS) and subcomponents thereof. Autonomy in CPS is enabling by recent advances in artificial intelligence (AI) and machine learning (ML) through approaches such as deep neural networks (DNNs), embedded in so-called learning enabled components (LECs)… ▽ More

    Submitted 3 October, 2018; originally announced October 2018.

  48. arXiv:1808.03139  [pdf, other

    cs.CG

    Low Ply Drawings of Trees and 2-Trees

    Authors: Michael T. Goodrich, Timothy Johnson

    Abstract: Ply number is a recently developed graph drawing metric inspired by studying road networks. Informally, for each vertex v, which is associated with a point in the plane, a disk is drawn centered on v with a radius that is alpha times the length of the longest edge incident to v, for some constant alpha in (0, 0.5]. The ply number is the maximum number of disks that overlap at a single point. We sh… ▽ More

    Submitted 10 August, 2018; v1 submitted 9 August, 2018; originally announced August 2018.

  49. arXiv:1807.08046  [pdf, other

    stat.ML cs.LG

    A Fast, Principled Working Set Algorithm for Exploiting Piecewise Linear Structure in Convex Problems

    Authors: Tyler B. Johnson, Carlos Guestrin

    Abstract: By reducing optimization to a sequence of smaller subproblems, working set algorithms achieve fast convergence times for many machine learning problems. Despite such performance, working set implementations often resort to heuristics to determine subproblem size, makeup, and stopping criteria. We propose BlitzWS, a working set algorithm with useful theoretical guarantees. Our theory relates subpro… ▽ More

    Submitted 20 July, 2018; originally announced July 2018.

  50. arXiv:1806.09224  [pdf, other

    eess.SY cs.SE

    Cyber-Physical Specification Mismatches

    Authors: Luan V. Nguyen, Khaza Anuarul Hoque, Stanley Bak, Steven Drager, Taylor T. Johnson

    Abstract: Embedded systems use increasingly complex software and are evolving into cyber-physical systems (CPS) with sophisticated interaction and coupling between physical and computational processes. Many CPS operate in safety-critical environments and have stringent certification, reliability, and correctness requirements. These systems undergo changes throughout their lifetimes, where either the softwar… ▽ More

    Submitted 24 June, 2018; originally announced June 2018.