Dynamic and Scalable Deep Neural Network Verification Algorithm

被引:6
作者
Ibn Khedher, Mohamed [1 ]
Ibn-Khedher, Hatem [2 ]
Hadji, Makhlouf [2 ]
机构
[1] IRT SystemX, 8 Ave Vauve, F-91120 Palaiseau, France
[2] Univ Paris, F-75006 Paris, France
来源
ICAART: PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON AGENTS AND ARTIFICIAL INTELLIGENCE - VOL 2 | 2021年
关键词
Feed-forward Neural Network; Neural Network Verification; Big-M Optimization; Robustness;
D O I
10.5220/0010323811221130
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Deep neural networks have widely used for dealing with complex real-world problems. However, a major concern in applying them to safety-critical systems is the great difficulty in providing formal guarantees about their behavior. Verifying its behavior means study the evolution of its outputs depending on the variation of its inputs. This verification is crucial in an uncertain environment where neural network inputs are noisy. In this paper, we propose an efficient technique for verifying feed-forward neural networks properties. In order to quantify the behavior of the proposed algorithm, we introduce different neural network scenarios to highlight the robustness according to predefined metrics and constraints. The proposed technique is based on the linearization of the non-convex Rectified Linear Unit (ReLU) activation function using the Big-M optimization approach. Moreover, we contribute by an iterative process to find the largest input range verifying (and then defining) the neural network proprieties of neural networks.
引用
收藏
页码:1122 / 1130
页数:9
相关论文
共 14 条
[1]  
[Anonymous], 2017, ABS170501320 CORR
[2]   Audio Adversarial Examples: Targeted Attacks on Speech-to-Text [J].
Carlini, Nicholas ;
Wagner, David .
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, :1-7
[3]  
Dvijotham K, 2018, UNCERTAINTY IN ARTIFICIAL INTELLIGENCE, P550
[4]  
Garnett R., 2018, ADV NEURAL INFORM PR, P4790
[5]   AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation [J].
Gehr, Timon ;
Mirman, Matthew ;
Drachsler-Cohen, Dana ;
Tsankov, Petar ;
Chaudhuri, Swarat ;
Vechev, Martin .
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2018, :3-18
[6]   Siamese Network Based Feature Learning for Improved Intrusion Detection [J].
Jmila, Houda ;
Ibn Khedher, Mohamed ;
Blanc, Gregory ;
El Yacoubi, Mounim A. .
NEURAL INFORMATION PROCESSING (ICONIP 2019), PT I, 2019, 11953 :377-389
[7]   Reluplex: An Efficient SMT Solver for Verifying Deep Neural Networks [J].
Katz, Guy ;
Barrett, Clark ;
Dill, David L. ;
Julian, Kyle ;
Kochenderfer, Mykel J. .
COMPUTER AIDED VERIFICATION, CAV 2017, PT I, 2017, 10426 :97-117
[8]  
Khedher M.I., 2018, P 2018 INT JOINT C N, P1, DOI [10.1109/IJCNN.2018.8489111, DOI 10.1109/IJCNN.2018.8489111]
[9]  
Lomuscio Alessio, 2017, ABS170607351 CORR
[10]  
Raghunathan A., 2018, 6 INT C LEARN REPR I