73 research outputs found

    Counterexample-Preserving Reduction for Symbolic Model Checking

    Get PDF
    The cost of LTL model checking is highly sensitive to the length of the formula under verification. We observe that, under some specific conditions, the input LTL formula can be reduced to an easier-to-handle one before model checking. In our reduction, these two formulae need not to be logically equivalent, but they share the same counterexample set w.r.t the model. In the case that the model is symbolically represented, the condition enabling such reduction can be detected with a lightweight effort (e.g., with SAT-solving). In this paper, we tentatively name such technique "Counterexample-Preserving Reduction" (CePRe for short), and finally the proposed technquie is experimentally evaluated by adapting NuSMV

    On Sufficient and Necessary Conditions in Bounded CTL

    Get PDF

    On the Properties of Kullback-Leibler Divergence Between Multivariate Gaussian Distributions

    Full text link
    Kullback-Leibler (KL) divergence is one of the most important divergence measures between probability distributions. In this paper, we prove several properties of KL divergence between multivariate Gaussian distributions. First, for any two nn-dimensional Gaussian distributions N1\mathcal{N}_1 and N2\mathcal{N}_2, we give the supremum of KL(N1∣∣N2)KL(\mathcal{N}_1||\mathcal{N}_2) when KL(N2∣∣N1)≤ε (ε>0)KL(\mathcal{N}_2||\mathcal{N}_1)\leq \varepsilon\ (\varepsilon>0). For small ε\varepsilon, we show that the supremum is ε+2ε1.5+O(ε2)\varepsilon + 2\varepsilon^{1.5} + O(\varepsilon^2). This quantifies the approximate symmetry of small KL divergence between Gaussians. We also find the infimum of KL(N1∣∣N2)KL(\mathcal{N}_1||\mathcal{N}_2) when KL(N2∣∣N1)≥M (M>0)KL(\mathcal{N}_2||\mathcal{N}_1)\geq M\ (M>0). We give the conditions when the supremum and infimum can be attained. Second, for any three nn-dimensional Gaussians N1\mathcal{N}_1, N2\mathcal{N}_2, and N3\mathcal{N}_3, we find an upper bound of KL(N1∣∣N3)KL(\mathcal{N}_1||\mathcal{N}_3) if KL(N1∣∣N2)≤ε1KL(\mathcal{N}_1||\mathcal{N}_2)\leq \varepsilon_1 and KL(N2∣∣N3)≤ε2KL(\mathcal{N}_2||\mathcal{N}_3)\leq \varepsilon_2 for ε1,ε2≥0\varepsilon_1,\varepsilon_2\ge 0. For small ε1\varepsilon_1 and ε2\varepsilon_2, we show the upper bound is 3ε1+3ε2+2ε1ε2+o(ε1)+o(ε2)3\varepsilon_1+3\varepsilon_2+2\sqrt{\varepsilon_1\varepsilon_2}+o(\varepsilon_1)+o(\varepsilon_2). This reveals that KL divergence between Gaussians follows a relaxed triangle inequality. Importantly, all the bounds in the theorems presented in this paper are independent of the dimension nn. Finally, We discuss the applications of our theorems in explaining counterintuitive phenomenon of flow-based model, deriving deep anomaly detection algorithm, and extending one-step robustness guarantee to multiple steps in safe reinforcement learning.Comment: arXiv admin note: text overlap with arXiv:2002.0332

    Verifying Safety of Neural Networks from Topological Perspectives

    Full text link
    Neural networks (NNs) are increasingly applied in safety-critical systems such as autonomous vehicles. However, they are fragile and are often ill-behaved. Consequently, their behaviors should undergo rigorous guarantees before deployment in practice. In this paper, we propose a set-boundary reachability method to investigate the safety verification problem of NNs from a topological perspective. Given an NN with an input set and a safe set, the safety verification problem is to determine whether all outputs of the NN resulting from the input set fall within the safe set. In our method, the homeomorphism property and the open map property of NNs are mainly exploited, which establish rigorous guarantees between the boundaries of the input set and the boundaries of the output set. The exploitation of these two properties facilitates reachability computations via extracting subsets of the input set rather than the entire input set, thus controlling the wrapping effect in reachability analysis and facilitating the reduction of computation burdens for safety verification. The homeomorphism property exists in some widely used NNs such as invertible residual networks (i-ResNets) and Neural ordinary differential equations (Neural ODEs), and the open map is a less strict property and easier to satisfy compared with the homeomorphism property. For NNs establishing either of these properties, our set-boundary reachability method only needs to perform reachability analysis on the boundary of the input set. Moreover, for NNs that do not feature these properties with respect to the input set, we explore subsets of the input set for establishing the local homeomorphism property and then abandon these subsets for reachability computations. Finally, some examples demonstrate the performance of the proposed method.Comment: 25 pages, 11 figures. arXiv admin note: substantial text overlap with arXiv:2210.0417

    Safety Verification for Neural Networks Based on Set-boundary Analysis

    Full text link
    Neural networks (NNs) are increasingly applied in safety-critical systems such as autonomous vehicles. However, they are fragile and are often ill-behaved. Consequently, their behaviors should undergo rigorous guarantees before deployment in practice. In this paper we propose a set-boundary reachability method to investigate the safety verification problem of NNs from a topological perspective. Given an NN with an input set and a safe set, the safety verification problem is to determine whether all outputs of the NN resulting from the input set fall within the safe set. In our method, the homeomorphism property of NNs is mainly exploited, which establishes a relationship mapping boundaries to boundaries. The exploitation of this property facilitates reachability computations via extracting subsets of the input set rather than the entire input set, thus controlling the wrapping effect in reachability analysis and facilitating the reduction of computation burdens for safety verification. The homeomorphism property exists in some widely used NNs such as invertible NNs. Notable representations are invertible residual networks (i-ResNets) and Neural ordinary differential equations (Neural ODEs). For these NNs, our set-boundary reachability method only needs to perform reachability analysis on the boundary of the input set. For NNs which do not feature this property with respect to the input set, we explore subsets of the input set for establishing the local homeomorphism property, and then abandon these subsets for reachability computations. Finally, some examples demonstrate the performance of the proposed method.Comment: 19 pages, 7 figure
    • …
    corecore