Skip to main content

Showing 1–33 of 33 results for author: Albarghouthi, A

.
  1. arXiv:2405.17361  [pdf, other

    cs.CL

    A One-Layer Decoder-Only Transformer is a Two-Layer RNN: With an Application to Certified Robustness

    Authors: Yuhao Zhang, Aws Albarghouthi, Loris D'Antoni

    Abstract: This paper reveals a key insight that a one-layer decoder-only Transformer is equivalent to a two-layer Recurrent Neural Network (RNN). Building on this insight, we propose ARC-Tran, a novel approach for verifying the robustness of decoder-only Transformers against arbitrary perturbation spaces. Compared to ARC-Tran, current robustness verification techniques are limited either to specific and len… ▽ More

    Submitted 27 May, 2024; originally announced May 2024.

  2. Crowdsourcing Task Traces for Service Robotics

    Authors: David Porfirio, Allison Sauppé, Maya Cakmak, Aws Albarghouthi, Bilge Mutlu

    Abstract: Demonstration is an effective end-user development paradigm for teaching robots how to perform new tasks. In this paper, we posit that demonstration is useful not only as a teaching tool, but also as a way to understand and assist end-user developers in thinking about a task at hand. As a first step toward gaining this understanding, we constructed a lightweight web interface to crowdsource step-b… ▽ More

    Submitted 20 March, 2024; originally announced March 2024.

    Comments: Published in the companion proceedings of the 2023 ACM/IEEE International Conference on Human-Robot Interaction

  3. arXiv:2403.03773  [pdf, other

    cs.LG

    Verified Training for Counterfactual Explanation Robustness under Data Shift

    Authors: Anna P. Meyer, Yuhao Zhang, Aws Albarghouthi, Loris D'Antoni

    Abstract: Counterfactual explanations (CEs) enhance the interpretability of machine learning models by describing what changes to an input are necessary to change its prediction to a desired class. These explanations are commonly used to guide users' actions, e.g., by describing how a user whose loan application was denied can be approved for a loan in the future. Existing approaches generate CEs by focusin… ▽ More

    Submitted 6 March, 2024; originally announced March 2024.

    Comments: 16 pages, 2 figures. Accepted at DMLR workshop at ICLR 2024

  4. arXiv:2311.18042  [pdf, other

    quant-ph cs.PL

    Compilation for Surface Code Quantum Computers

    Authors: Abtin Molavi, Amanda Xu, Swamit Tannu, Aws Albarghouthi

    Abstract: Practical applications of quantum computing depend on fault-tolerant devices with error correction. Today, the most promising approach is a class of error-correcting codes called surface codes. In this paper, we study the problem of compiling quantum circuits for quantum computers implementing surface codes. The problem involves (1) map** circuit qubits to the device qubits and (2) routing execu… ▽ More

    Submitted 29 November, 2023; originally announced November 2023.

  5. arXiv:2304.10655  [pdf, other

    cs.LG cs.CY

    The Dataset Multiplicity Problem: How Unreliable Data Impacts Predictions

    Authors: Anna P. Meyer, Aws Albarghouthi, Loris D'Antoni

    Abstract: We introduce dataset multiplicity, a way to study how inaccuracies, uncertainty, and social bias in training datasets impact test-time predictions. The dataset multiplicity framework asks a counterfactual question of what the set of resultant models (and associated test-time predictions) would be if we could somehow access all hypothetical, unbiased versions of the dataset. We discuss how to use t… ▽ More

    Submitted 20 April, 2023; originally announced April 2023.

    Comments: 25 pages, 8 figures. Accepted at FAccT '23

  6. Sketching Robot Programs On the Fly

    Authors: David Porfirio, Laura Stegner, Maya Cakmak, Allison Sauppé, Aws Albarghouthi, Bilge Mutlu

    Abstract: Service robots for personal use in the home and the workplace require end-user development solutions for swiftly scripting robot tasks as the need arises. Many existing solutions preserve ease, efficiency, and convenience through simple programming interfaces or by restricting task complexity. Others facilitate meticulous task design but often do so at the expense of simplicity and efficiency. The… ▽ More

    Submitted 6 February, 2023; originally announced February 2023.

    Comments: Accepted at HRI '23, March 13-16, 2023, Stockholm, Sweden

  7. arXiv:2301.11824  [pdf, other

    cs.CR cs.LG

    PECAN: A Deterministic Certified Defense Against Backdoor Attacks

    Authors: Yuhao Zhang, Aws Albarghouthi, Loris D'Antoni

    Abstract: Neural networks are vulnerable to backdoor poisoning attacks, where the attackers maliciously poison the training set and insert triggers into the test input to change the prediction of the victim model. Existing defenses for backdoor attacks either provide no formal guarantees or come with expensive-to-compute and ineffective probabilistic guarantees. We present PECAN, an efficient and certified… ▽ More

    Submitted 20 May, 2024; v1 submitted 27 January, 2023; originally announced January 2023.

  8. arXiv:2211.09691  [pdf, other

    cs.PL quant-ph

    Synthesizing Quantum-Circuit Optimizers

    Authors: Amanda Xu, Abtin Molavi, Lauren Pick, Swamit Tannu, Aws Albarghouthi

    Abstract: Near-term quantum computers are expected to work in an environment where each operation is noisy, with no error correction. Therefore, quantum-circuit optimizers are applied to minimize the number of noisy operations. Today, physicists are constantly experimenting with novel devices and architectures. For every new physical substrate and for every modification of a quantum computer, we need to mod… ▽ More

    Submitted 10 May, 2023; v1 submitted 17 November, 2022; originally announced November 2022.

    Comments: Full version of PLDI 2023 paper

  9. arXiv:2208.14362  [pdf, other

    cs.LG cs.AI cs.CV stat.ML

    AutoWS-Bench-101: Benchmarking Automated Weak Supervision with 100 Labels

    Authors: Nicholas Roberts, Xintong Li, Tzu-Heng Huang, Dyah Adila, Spencer Schoenberg, Cheng-Yu Liu, Lauren Pick, Haotian Ma, Aws Albarghouthi, Frederic Sala

    Abstract: Weak supervision (WS) is a powerful method to build labeled datasets for training supervised models in the face of little-to-no labeled data. It replaces hand-labeling data with aggregating multiple noisy-but-cheap label estimates expressed by labeling functions (LFs). While it has been used successfully in many domains, weak supervision's application scope is limited by the difficulty of construc… ▽ More

    Submitted 24 November, 2023; v1 submitted 30 August, 2022; originally announced August 2022.

    Comments: NeurIPS 2022 Datasets and Benchmarks Track

  10. arXiv:2208.13679  [pdf, other

    cs.AR quant-ph

    Qubit Map** and Routing via MaxSAT

    Authors: Abtin Molavi, Amanda Xu, Martin Diges, Lauren Pick, Swamit Tannu, Aws Albarghouthi

    Abstract: Near-term quantum computers will operate in a noisy environment, without error correction. A critical problem for near-term quantum computing is laying out a logical circuit onto a physical device with limited connectivity between qubits. This is known as the qubit map** and routing (QMR) problem, an intractable combinatorial problem. It is important to solve QMR as optimally as possible to redu… ▽ More

    Submitted 29 August, 2022; originally announced August 2022.

  11. arXiv:2206.03575  [pdf, other

    cs.LG

    Certifying Data-Bias Robustness in Linear Regression

    Authors: Anna P. Meyer, Aws Albarghouthi, Loris D'Antoni

    Abstract: Datasets typically contain inaccuracies due to human error and societal biases, and these inaccuracies can affect the outcomes of models trained on such datasets. We present a technique for certifying whether linear regression models are pointwise-robust to label bias in the training dataset, i.e., whether bounded perturbations to the labels of a training dataset result in models that change the p… ▽ More

    Submitted 7 June, 2022; originally announced June 2022.

    Comments: 19 pages, 8 figures

  12. arXiv:2205.13634  [pdf, other

    cs.LG

    BagFlip: A Certified Defense against Data Poisoning

    Authors: Yuhao Zhang, Aws Albarghouthi, Loris D'Antoni

    Abstract: Machine learning models are vulnerable to data-poisoning attacks, in which an attacker maliciously modifies the training set to change the prediction of a learned model. In a trigger-less attack, the attacker can modify the training set but not the test inputs, while in a backdoor attack the attacker can also modify test inputs. Existing model-agnostic defense approaches either cannot handle backd… ▽ More

    Submitted 16 October, 2022; v1 submitted 26 May, 2022; originally announced May 2022.

    Comments: Neurips 2022

  13. arXiv:2110.04363  [pdf, other

    cs.LG cs.CY

    Certifying Robustness to Programmable Data Bias in Decision Trees

    Authors: Anna P. Meyer, Aws Albarghouthi, Loris D'Antoni

    Abstract: Datasets can be biased due to societal inequities, human biases, under-representation of minorities, etc. Our goal is to certify that models produced by a learning algorithm are pointwise-robust to potential dataset biases. This is a challenging problem: it entails learning models for a large, or even infinite, number of datasets, ensuring that they all produce the same prediction. We focus on dec… ▽ More

    Submitted 8 October, 2021; originally announced October 2021.

    Comments: To be published at NeurIPS 2021. 22 pages, 4 figures

    ACM Class: I.2.2; I.5.0; K.4.2

  14. arXiv:2109.10317  [pdf, other

    cs.LG cs.AI cs.PL

    Introduction to Neural Network Verification

    Authors: Aws Albarghouthi

    Abstract: Deep learning has transformed the way we think of software and what it can do. But deep neural networks are fragile and their behaviors are often surprising. In many settings, we need to provide formal guarantees on the safety, security, correctness, or robustness of neural networks. This book covers foundational ideas from formal verification and their adaptation to reasoning about neural network… ▽ More

    Submitted 4 October, 2021; v1 submitted 21 September, 2021; originally announced September 2021.

  15. arXiv:2102.07818  [pdf, other

    cs.LG

    Certified Robustness to Programmable Transformations in LSTMs

    Authors: Yuhao Zhang, Aws Albarghouthi, Loris D'Antoni

    Abstract: Deep neural networks for natural language processing are fragile in the face of adversarial examples -- small input perturbations, like synonym substitution or word duplication, which cause a neural network to change its prediction. We present an approach to certifying the robustness of LSTMs (and extensions of LSTMs) and training models that can be efficiently certified. Our approach can certify… ▽ More

    Submitted 7 September, 2021; v1 submitted 15 February, 2021; originally announced February 2021.

    Comments: EMNLP 2021

  16. arXiv:2101.00961  [pdf, other

    cs.CR cs.LG cs.PL

    Learning Differentially Private Mechanisms

    Authors: Subhajit Roy, Justin Hsu, Aws Albarghouthi

    Abstract: Differential privacy is a formal, mathematical definition of data privacy that has gained traction in academia, industry, and government. The task of correctly constructing differentially private algorithms is non-trivial, and mistakes have been made in foundational algorithms. Currently, there is no automated support for converting an existing, non-private program into a differentially private ve… ▽ More

    Submitted 4 January, 2021; originally announced January 2021.

  17. arXiv:2007.06093  [pdf, other

    cs.LG cs.PL stat.ML

    Interval Universal Approximation for Neural Networks

    Authors: Zi Wang, Aws Albarghouthi, Gautam Prakriya, Somesh Jha

    Abstract: To verify safety and robustness of neural networks, researchers have successfully applied abstract interpretation, primarily using the interval abstract domain. In this paper, we study the theoretical power and limits of the interval domain for neural-network verification. First, we introduce the interval universal approximation (IUA) theorem. IUA shows that neural networks not only can approxim… ▽ More

    Submitted 14 July, 2021; v1 submitted 12 July, 2020; originally announced July 2020.

  18. Backdoors in Neural Models of Source Code

    Authors: Goutham Ramakrishnan, Aws Albarghouthi

    Abstract: Deep neural networks are vulnerable to a range of adversaries. A particularly pernicious class of vulnerabilities are backdoors, where model predictions diverge in the presence of subtle triggers in inputs. An attacker can implant a backdoor by poisoning the training data to yield a desired target prediction on triggered inputs. We study backdoors in the context of deep-learning for source code. (… ▽ More

    Submitted 11 June, 2020; originally announced June 2020.

  19. arXiv:2005.08439  [pdf, other

    cs.DB

    A Comparative Exploration of ML Techniques for Tuning Query Degree of Parallelism

    Authors: Zhiwei Fan, Rathijit Sen, Paraschos Koutris, Aws Albarghouthi

    Abstract: There is a large body of recent work applying machine learning (ML) techniques to query optimization and query performance prediction in relational database management systems (RDBMSs). However, these works typically ignore the effect of \textit{intra-parallelism} -- a key component used to boost the performance of OLAP queries in practice -- on query performance prediction. In this paper, we take… ▽ More

    Submitted 21 May, 2020; v1 submitted 17 May, 2020; originally announced May 2020.

  20. arXiv:2002.09579  [pdf, other

    cs.LG stat.ML

    Robustness to Programmable String Transformations via Augmented Abstract Training

    Authors: Yuhao Zhang, Aws Albarghouthi, Loris D'Antoni

    Abstract: Deep neural networks for natural language processing tasks are vulnerable to adversarial input perturbations. In this paper, we present a versatile language for programmatically specifying string transformations -- e.g., insertions, deletions, substitutions, swaps, etc. -- that are relevant to the task at hand. We then present an approach to adversarially training models that are robust to such us… ▽ More

    Submitted 2 September, 2020; v1 submitted 21 February, 2020; originally announced February 2020.

    Comments: 12 pages, ICML 2020

  21. Semantic Robustness of Models of Source Code

    Authors: Goutham Ramakrishnan, Jordan Henkel, Zi Wang, Aws Albarghouthi, Somesh Jha, Thomas Reps

    Abstract: Deep neural networks are vulnerable to adversarial examples - small input perturbations that result in incorrect predictions. We study this problem for models of source code, where we want the network to be robust to source-code modifications that preserve code functionality. (1) We define a powerful adversary that can employ sequences of parametric, semantics-preserving program transformations; (… ▽ More

    Submitted 11 June, 2020; v1 submitted 7 February, 2020; originally announced February 2020.

  22. arXiv:1912.00981  [pdf, other

    cs.PL cs.AI cs.CR cs.LG

    Proving Data-Poisoning Robustness in Decision Trees

    Authors: Samuel Drews, Aws Albarghouthi, Loris D'Antoni

    Abstract: Machine learning models are brittle, and small changes in the training data can result in different predictions. We study the problem of proving that a prediction is robust to data poisoning, where an attacker can inject a number of malicious elements into the training set to influence the learned model. We target decision-tree models, a popular and simple class of machine learning models that und… ▽ More

    Submitted 23 June, 2020; v1 submitted 2 December, 2019; originally announced December 2019.

    Comments: Changes: revisions to main text for clarity of presentation, and corrections to proofs in the appendices

  23. Synthesizing Action Sequences for Modifying Model Decisions

    Authors: Goutham Ramakrishnan, Yun Chan Lee, Aws Albarghouthi

    Abstract: When a model makes a consequential decision, e.g., denying someone a loan, it needs to additionally generate actionable, realistic feedback on what the person can do to favorably change the decision. We cast this problem through the lens of program synthesis, in which our goal is to synthesize an optimal (realistically cheapest or simplest) sequence of actions that if a person executes successfull… ▽ More

    Submitted 9 October, 2019; v1 submitted 30 September, 2019; originally announced October 2019.

  24. arXiv:1906.07840  [pdf, other

    cs.DC cs.LG

    A Static Analysis-based Cross-Architecture Performance Prediction Using Machine Learning

    Authors: Newsha Ardalani, Urmish Thakker, Aws Albarghouthi, Karu Sankaralingam

    Abstract: Porting code from CPU to GPU is costly and time-consuming; Unless much time is invested in development and optimization, it is not obvious, a priori, how much speed-up is achievable or how much room is left for improvement. Knowing the potential speed-up a priori can be very useful: It can save hundreds of engineering hours, help programmers with prioritization and algorithm selection. We aim to a… ▽ More

    Submitted 18 June, 2019; originally announced June 2019.

    Comments: Published at 2nd International Workshop on AI-assisted Design for Architecture Phoenix, AZ, June 22, 2019, colocated with ISCA

  25. arXiv:1905.08364  [pdf, ps, other

    cs.PL

    Efficient Synthesis with Probabilistic Constraints

    Authors: Samuel Drews, Aws Albarghouthi, Loris D'Antoni

    Abstract: We consider the problem of synthesizing a program given a probabilistic specification of its desired behavior. Specifically, we study the recent paradigm of distribution-guided inductive synthesis (DIGITS), which iteratively calls a synthesizer on finite sample sets from a given distribution. We make theoretical and algorithmic contributions: (i) We prove the surprising result that DIGITS only req… ▽ More

    Submitted 20 May, 2019; originally announced May 2019.

  26. arXiv:1812.03975  [pdf, other

    cs.DB

    Scaling-Up In-Memory Datalog Processing: Observations and Techniques

    Authors: Zhiwei Fan, Jianqiao Zhu, Zuyu Zhang, Aws Albarghouthi, Paraschos Koutris, Jignesh Patel

    Abstract: Recursive query processing has experienced a recent resurgence, as a result of its use in many modern application domains, including data integration, graph analytics, security, program analysis, networking and decision making. Due to the large volumes of data being processed, several research efforts, across multiple communities, have explored how to scale up recursive queries, typically expresse… ▽ More

    Submitted 10 December, 2018; originally announced December 2018.

  27. arXiv:1810.12396  [pdf, other

    cs.PL

    Trace Abstraction Modulo Probability

    Authors: Calvin Smith, Justin Hsu, Aws Albarghouthi

    Abstract: We propose trace abstraction modulo probability, a proof technique for verifying high-probability accuracy guarantees of probabilistic programs. Our proofs overapproximate the set of program traces using failure automata, finite-state automata that upper bound the probability of failing to satisfy a target specification. We automate proof construction by reducing probabilistic reasoning to logical… ▽ More

    Submitted 29 October, 2018; originally announced October 2018.

  28. arXiv:1809.04059  [pdf, other

    cs.PL cs.LG cs.SE

    Neural-Augmented Static Analysis of Android Communication

    Authors: **man Zhao, Aws Albarghouthi, Vaibhav Rastogi, Somesh Jha, Damien Octeau

    Abstract: We address the problem of discovering communication links between applications in the popular Android mobile operating system, an important problem for security and privacy in Android. Any scalable static analysis in this complex setting is bound to produce an excessive amount of false-positives, rendering it impractical. To improve precision, we propose to augment static analysis with a trained n… ▽ More

    Submitted 11 September, 2018; originally announced September 2018.

    Comments: Appears in Proceedings of the 2018 ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE)

  29. arXiv:1804.04052  [pdf, other

    cs.PL

    Constraint-Based Synthesis of Coupling Proofs

    Authors: Aws Albarghouthi, Justin Hsu

    Abstract: Proof by coupling is a classical technique for proving properties about pairs of randomized algorithms by carefully relating (or coupling) two probabilistic executions. In this paper, we show how to automatically construct such proofs for probabilistic programs. First, we present f-coupled postconditions, an abstraction describing two correlated program executions. Second, we show how properties o… ▽ More

    Submitted 11 April, 2018; originally announced April 2018.

  30. Synthesizing Coupling Proofs of Differential Privacy

    Authors: Aws Albarghouthi, Justin Hsu

    Abstract: Differential privacy has emerged as a promising probabilistic formulation of privacy, generating intense interest within academia and industry. We present a push-button, automated technique for verifying $\varepsilon$-differential privacy of sophisticated randomized algorithms. We make several conceptual, algorithmic, and practical contributions: (i) Inspired by the recent advances on approximate… ▽ More

    Submitted 8 November, 2017; v1 submitted 15 September, 2017; originally announced September 2017.

  31. arXiv:1702.05437  [pdf, other

    cs.PL cs.AI

    Quantifying Program Bias

    Authors: Aws Albarghouthi, Loris D'Antoni, Samuel Drews, Aditya Nori

    Abstract: With the range and sensitivity of algorithmic decisions expanding at a break-neck speed, it is imperative that we aggressively investigate whether programs are biased. We propose a novel probabilistic program analysis technique and apply it to quantifying bias in decision-making programs. Specifically, we (i) present a sound and complete automated verification technique for proving quantitative pr… ▽ More

    Submitted 6 March, 2017; v1 submitted 17 February, 2017; originally announced February 2017.

  32. arXiv:1610.06067  [pdf, other

    cs.PL cs.AI

    Fairness as a Program Property

    Authors: Aws Albarghouthi, Loris D'Antoni, Samuel Drews, Aditya Nori

    Abstract: We explore the following question: Is a decision-making program fair, for some useful definition of fairness? First, we describe how several algorithmic fairness questions can be phrased as program verification problems. Second, we discuss an automated verification technique for proving or disproving fairness of decision-making programs with respect to a probabilistic model of the population.

    Submitted 19 October, 2016; originally announced October 2016.

  33. arXiv:1501.04100  [pdf, other

    cs.LO cs.PL

    Spatial Interpolants

    Authors: Aws Albarghouthi, Josh Berdine, Byron Cook, Zachary Kincaid

    Abstract: We propose Splinter, a new technique for proving properties of heap-manipulating programs that marries (1) a new separation logic-based analysis for heap reasoning with (2) an interpolation-based technique for refining heap-shape invariants with data invariants. Splinter is property directed, precise, and produces counterexample traces when a property does not hold. Using the novel notion of spati… ▽ More

    Submitted 16 January, 2015; originally announced January 2015.

    Comments: Short version published in ESOP 2015