Skip to main content

Showing 1–8 of 8 results for author: Baluta, T

.
  1. arXiv:2306.06294  [pdf, other

    cs.AI

    Explaining SAT Solving Using Causal Reasoning

    Authors: Jiong Yang, Arijit Shaw, Teodora Baluta, Mate Soos, Kuldeep S. Meel

    Abstract: The past three decades have witnessed notable success in designing efficient SAT solvers, with modern solvers capable of solving industrial benchmarks containing millions of variables in just a few seconds. The success of modern SAT solvers owes to the widely-used CDCL algorithm, which lacks comprehensive theoretical investigation. Furthermore, it has been observed that CDCL solvers still struggle… ▽ More

    Submitted 9 June, 2023; originally announced June 2023.

    Comments: 17 pages, 3 figures, to be published in SAT23

  2. arXiv:2301.11220  [pdf, other

    cs.PL cs.SE

    User-Customizable Transpilation of Scripting Languages

    Authors: Bo Wang, Aashish Kolluri, Ivica Nikolić, Teodora Baluta, Prateek Saxena

    Abstract: A transpiler converts code from one programming language to another. Many practical uses of transpilers require the user to be able to guide or customize the program produced from a given input program. This customizability is important for satisfying many application-specific goals for the produced code such as ensuring performance, readability, maintainability, compatibility, and so on. Conventi… ▽ More

    Submitted 6 March, 2023; v1 submitted 26 January, 2023; originally announced January 2023.

    Comments: To be published in OOPSLA 2023

    ACM Class: D.2.3; D.2.5; D.3.0

  3. arXiv:2209.08615  [pdf, other

    cs.LG cs.AI cs.CR

    Membership Inference Attacks and Generalization: A Causal Perspective

    Authors: Teodora Baluta, Shiqi Shen, S. Hitarth, Shruti Tople, Prateek Saxena

    Abstract: Membership inference (MI) attacks highlight a privacy weakness in present stochastic training methods for neural networks. It is not well understood, however, why they arise. Are they a natural consequence of imperfect generalization only? Which underlying causes should we address during training to mitigate these attacks? Towards answering such questions, we propose the first approach to explain… ▽ More

    Submitted 30 October, 2022; v1 submitted 18 September, 2022; originally announced September 2022.

    Comments: 26 pages, 15 figures; added CC-license block icons and links, typos corrected, added reference to Github

  4. arXiv:2205.03105  [pdf, other

    cs.LG cs.AI cs.CR cs.SI

    LPGNet: Link Private Graph Networks for Node Classification

    Authors: Aashish Kolluri, Teodora Baluta, Bryan Hooi, Prateek Saxena

    Abstract: Classification tasks on labeled graph-structured data have many important applications ranging from social recommendation to financial modeling. Deep neural networks are increasingly being used for node classification on graphs, wherein nodes with similar features have to be given the same label. Graph convolutional networks (GCNs) are one such widely studied neural network architecture that perfo… ▽ More

    Submitted 7 September, 2022; v1 submitted 6 May, 2022; originally announced May 2022.

    Comments: Accepted at CCS'22

  5. SynGuar: Guaranteeing Generalization in Programming by Example

    Authors: Bo Wang, Teodora Baluta, Aashish Kolluri, Prateek Saxena

    Abstract: Programming by Example (PBE) is a program synthesis paradigm in which the synthesizer creates a program that matches a set of given examples. In many applications of such synthesis (e.g., program repair or reverse engineering), we are to reconstruct a program that is close to a specific target program, not merely to produce some program that satisfies the seen examples. In such settings, we wish t… ▽ More

    Submitted 22 June, 2021; originally announced June 2021.

    ACM Class: D.3.0; D.2.0

  6. arXiv:2105.09057  [pdf, other

    cs.CR cs.SI

    Private Hierarchical Clustering in Federated Networks

    Authors: Aashish Kolluri, Teodora Baluta, Prateek Saxena

    Abstract: Analyzing structural properties of social networks, such as identifying their clusters or finding their most central nodes, has many applications. However, these applications are not supported by federated social networks that allow users to store their social links locally on their end devices. In the federated regime, users want access to personalized services while also kee** their social lin… ▽ More

    Submitted 19 May, 2021; originally announced May 2021.

    Comments: 18 pages, In Submission

  7. arXiv:2002.06864  [pdf, other

    cs.LG stat.ML

    Scalable Quantitative Verification For Deep Neural Networks

    Authors: Teodora Baluta, Zheng Leong Chua, Kuldeep S. Meel, Prateek Saxena

    Abstract: Despite the functional success of deep neural networks (DNNs), their trustworthiness remains a crucial open challenge. To address this challenge, both testing and verification techniques have been proposed. But these existing techniques provide either scalability to large networks or formal guarantees, not both. In this paper, we propose a scalable quantitative verification framework for deep neur… ▽ More

    Submitted 23 March, 2021; v1 submitted 17 February, 2020; originally announced February 2020.

  8. arXiv:1906.10395  [pdf, other

    cs.CR cs.AI cs.LG cs.LO

    Quantitative Verification of Neural Networks And its Security Applications

    Authors: Teodora Baluta, Shiqi Shen, Shweta Shinde, Kuldeep S. Meel, Prateek Saxena

    Abstract: Neural networks are increasingly employed in safety-critical domains. This has prompted interest in verifying or certifying logically encoded properties of neural networks. Prior work has largely focused on checking existential properties, wherein the goal is to check whether there exists any input that violates a given property of interest. However, neural network training is a stochastic process… ▽ More

    Submitted 25 June, 2019; originally announced June 2019.