Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3679008.3685547acmconferencesArticle/Chapter ViewAbstractPublication PagesisstaConference Proceedingsconference-collections
research-article
Open access

Runtime Verified Neural Networks for Cyber-Physical Systems

Published: 13 September 2024 Publication History

Abstract

There is increasing use of artificial neural networks in Cyber-Physical Systems (CPS) such as autonomous vehicles (AVs). Here, convolutional neural networks (CNNs) are widely used for different types of computer-vision tasks. The complex nature of the CNN makes verification of CNN-based CPS extremely difficult. Through this work, we propose a formal runtime verification (RV) approach that employs user-specified policies constructed through Valued Discrete Timed Automata (VDTA). This innovative approach serves as a powerful tool for ensuring the adherence of the system to predefined safety-critical policies, providing a formalized method to handle the complexities of CNNs in safety-critical contexts by treating them as black boxes. To demonstrate the effectiveness of this runtime verification approach, we model a CNN-based AV that is embedded with a runtime monitor. The different control units of the AV are trained using RL-based Q-Learning technique and integrate them into some of its key components. We also analyse how increase in the number of properties to be monitored affects the execution time of the overall system.

References

[1]
2023. Self-Driving Car Accident Statistics. Kisling, Nestico & Redick, LLC (2023). https://www.knrlegal.com/car-
[2]
Anonymous. [n. d.]. Misclassification Analyzer. ([n. d.]). https://drive.google.com/file/d/1uGlMBK3wvr3l3moYa0xqNBGovw6Bw1ub/view?usp=sharing
[3]
Radhakisan Baheti and Helen Gill. 2011. Cyber-physical systems. The impact of control technology 12, 1 (2011), 161–166.
[4]
Andreas Bauer, Martin Leucker, and Christian Schallhart. 2011. Runtime Verification for LTL and TLTL. ACM Trans. Softw. Eng. Methodol. 20, 4, Article 14 (Sept. 2011), 14:1–14:64 pages. issn:1049-331X
[5]
DF Bedford, G Morgan, and J Austin. 1996. Requirements for a standard certifying the use of artificial neural networks in safety critical applications. In Proceedings of the international conference on artificial neural networks. Citeseer.
[6]
Gianluca Biggi and Jack Stilgoe. 2021. Artificial Intelligence in Self-Driving Cars Research and Innovation: A Scientometric and Bibliometric Analysis. SSRN Electronic Journal (01 2021).
[7]
Christopher M Bishop. 1994. Novelty detection and neural network validation. IEE Proceedings-Vision, Image and Signal processing 141, 4 (1994), 217–222.
[8]
Chih-Hong Cheng, Chung-Hao Huang, Harald Ruess, Hirotoshi Yasuoka, et al. 2018. Towards dependability metrics for neural networks. In 2018 16th ACM/IEEE International Conference on Formal Methods and Models for System Design (MEMOCODE). IEEE, 1–4.
[9]
Devin Coldewey. 2018. Uber in fatal crash detected pedestrian but had emergency braking disabled. (May 2018). https://techcrunch.com/2018/05/24/uber-in-fatal-crash-detected-pedestrian-but-had-emergency-braking-disabled/
[10]
Alexey Dosovitskiy, German Ros, Felipe Codevilla, Antonio Lopez, and Vladlen Koltun. 2017. CARLA: An Open Urban Driving Simulator. In Proceedings of the 1st Annual Conference on Robot Learning. 1–16.
[11]
Yliès Falcone, Jean-Claude Fernandez, and Laurent Mounier. 2009. Runtime Verification of Safety-Progress Properties. In Runtime Verification 2009 (LNCS, Vol. 5779). Springer, 40–59.
[12]
Timon Gehr, Matthew Mirman, Dana Drachsler-Cohen, Petar Tsankov, Swarat Chaudhuri, and Martin Vechev. 2018. AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation. In 2018 IEEE Symposium on Security and Privacy (SP). 3–18.
[13]
Jonathan Govette. 2022. The Truth about Healthcare AI and Why It has Failed So Far. (2022). https://oatmealhealth.com/why-has-ai-failed-so-far-in-healthcare-despite-billions-of-investment/
[14]
J Gu, Z Wang, J Kuen, L Ma, A Shahroudy, B Shuai, T Liu, X Wang, G Wang, J Cai, and T Chen. 2018. Recent advances in convolutional neural networks. Pattern recognition 77 (2018), 354–377.
[15]
Guy Katz, Clark Barrett, David L Dill, Kyle Julian, and Mykel J Kochenderfer. 2017. Reluplex: An efficient SMT solver for verifying deep neural networks. In Computer Aided Verification: 29th International Conference, CAV 2017, Heidelberg, Germany, July 24-28, 2017, Proceedings, Part I 30. Springer, 97–117.
[16]
Zeshan Kurd. 2005. Artificial neural networks in safety-critical applications. Ph. D. Dissertation. Citeseer.
[17]
Zeshan Kurd and Tim Kelly. 2003. Establishing safety criteria for artificial neural networks. In International Conference on Knowledge-Based and Intelligent Information and Engineering Systems. Springer, 163–169.
[18]
Francesco Leofante, Nina Narodytska, Luca Pulina, and Armando Tacchella. 2018. Automated Verification of Neural Networks: Advances, Challenges and Perspectives. ArXiv abs/1805.09938 (2018). https://api.semanticscholar.org/CorpusID:44064771
[19]
Kozo Okano and Toshifusa Sekizawa. 2014. Safety Verification of Multiple Autonomous Systems by Formal Approach. In Computer Safety, Reliability, and Security, Andrea Bondavalli, Andrea Ceccarelli, and Frank Ortmeier (Eds.). Springer International Publishing, Cham, 11–18. isbn:978-3-319-10557-4
[20]
Keiron O’shea and Ryan Nash. 2015. An introduction to convolutional neural networks. arXiv preprint arXiv:1511.08458 (2015).
[21]
Hammond A. Pearce, Srinivas Pinisetty, Partha S. Roop, Matthew M. Y. Kuo, and Abhisek Ukil. 2020. Smart I/O Modules for Mitigating Cyber-Physical Attacks on Industrial Control Systems. IEEE Trans. Ind. Informatics 16, 7 (2020), 4659–4669.
[22]
Srinivas Pinisetty, Partha S Roop, Vidula Sawant, and Gerardo Schneider. 2018. Security of Pacemakers using Runtime Verification. In 2018 16th ACM/IEEE International Conference on Formal Methods and Models for System Design (MEMOCODE). 1–11.
[23]
Srinivas Pinisetty, Partha S. Roop, Steven Smyth, Nathan Allen, Stavros Tripakis, and Reinhard von Hanxleden. 2017. Runtime Enforcement of Cyber-Physical Systems. ACM Transactions on Embedded Computing Systems (TECS) 16 (2017), 1 – 25. https://api.semanticscholar.org/CorpusID:2115438
[24]
Y Rebahi, B Hilliger, P Lowin, B Zheng, G Da Bormida, and K Ladjeri. 2023. Towards AI-Based Condition Monitoring and Predictive Maintenance for Water Smart Pipes: The SANDMAN Approach. Artificial Intelligence and Applications 2, 2 (Dec. 2023), 100–110.
[25]
David M Rodvold. 1999. A software development process model for artificial neural networks in critical applications. In IJCNN’99. International Joint Conference on Neural Networks. Proceedings (Cat. No. 99CH36339), Vol. 5. IEEE, 3317–3322.
[26]
Sanjit A Seshia, Dorsa Sadigh, and S Shankar Sastry. 2022. Toward verified artificial intelligence. Commun. ACM 65, 7 (2022), 46–55.
[27]
Sandro Skansi and Sandro Skansi. 2018. Convolutional neural networks. Introduction to Deep Learning: from logical calculus to artificial intelligence (2018), 121–133.
[28]
W Xu, D Evans, and Y Qi. 2017. Feature squeezing: Detecting adversarial examples in deep neural networks. arXiv preprint arXiv:1704.01155 (2017).

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
VORTEX 2024: Proceedings of the 7th ACM International Workshop on Verification and Monitoring at Runtime Execution
September 2024
51 pages
ISBN:9798400711190
DOI:10.1145/3679008
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 September 2024

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Artificial Neural Networks
  2. Cyber-physical Systems
  3. Online Monitoring
  4. Runtime Verification

Qualifiers

  • Research-article

Conference

VORTEX '24
Sponsor:

Upcoming Conference

ISSTA '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 210
    Total Downloads
  • Downloads (Last 12 months)210
  • Downloads (Last 6 weeks)48
Reflects downloads up to 17 Feb 2025

Other Metrics

Citations

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media