Skip to main content

Showing 1–24 of 24 results for author: Bensalem, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.02622  [pdf, other

    cs.CR cs.AI

    Safeguarding Large Language Models: A Survey

    Authors: Yi Dong, Ronghui Mu, Yanghao Zhang, Siqi Sun, Tianle Zhang, Changshun Wu, Gaojie **, Yi Qi, **wei Hu, Jie Meng, Saddek Bensalem, Xiaowei Huang

    Abstract: In the burgeoning field of Large Language Models (LLMs), develo** a robust safety mechanism, colloquially known as "safeguards" or "guardrails", has become imperative to ensure the ethical use of LLMs within prescribed boundaries. This article provides a systematic literature review on the current status of this critical mechanism. It discusses its major challenges and how it can be enhanced int… ▽ More

    Submitted 3 June, 2024; originally announced June 2024.

    Comments: under review. arXiv admin note: text overlap with arXiv:2402.01822

  2. arXiv:2404.16663  [pdf, other

    cs.LG cs.AI cs.CY cs.LO cs.SE

    Formal Specification, Assessment, and Enforcement of Fairness for Generative AIs

    Authors: Chih-Hong Cheng, Changshun Wu, Harald Ruess, Xingyu Zhao, Saddek Bensalem

    Abstract: Reinforcing or even exacerbating societal biases and inequalities will increase significantly as generative AI increasingly produces useful artifacts, from text to images and beyond, for the real world. We address these issues by formally characterizing the notion of fairness for generative AI as a basis for monitoring and enforcing fairness. We define two levels of fairness using the notion of in… ▽ More

    Submitted 6 May, 2024; v1 submitted 25 April, 2024; originally announced April 2024.

  3. arXiv:2403.18373  [pdf, other

    cs.CV

    BAM: Box Abstraction Monitors for Real-time OoD Detection in Object Detection

    Authors: Changshun Wu, Weicheng He, Chih-Hong Cheng, Xiaowei Huang, Saddek Bensalem

    Abstract: Out-of-distribution (OoD) detection techniques for deep neural networks (DNNs) become crucial thanks to their filtering of abnormal inputs, especially when DNNs are used in safety-critical applications and interact with an open and dynamic environment. Nevertheless, integrating OoD detection into state-of-the-art (SOTA) object detection DNNs poses significant challenges, partly due to the complexi… ▽ More

    Submitted 27 March, 2024; originally announced March 2024.

  4. arXiv:2402.09097  [pdf, other

    cs.RO cs.AI eess.SY

    A Digital Twin prototype for traffic sign recognition of a learning-enabled autonomous vehicle

    Authors: Mohamed AbdElSalam, Loai Ali, Saddek Bensalem, Weicheng He, Panagiotis Katsaros, Nikolaos Kekatos, Doron Peled, Anastasios Temperekidis, Changshun Wu

    Abstract: In this paper, we present a novel digital twin prototype for a learning-enabled self-driving vehicle. The primary objective of this digital twin is to perform traffic sign recognition and lane kee**. The digital twin architecture relies on co-simulation and uses the Functional Mock-up Interface and SystemC Transaction Level Modeling standards. The digital twin consists of four clients, i) a vehi… ▽ More

    Submitted 14 February, 2024; originally announced February 2024.

  5. arXiv:2307.11784  [pdf, other

    cs.LG cs.AI cs.SE eess.SY

    What, Indeed, is an Achievable Provable Guarantee for Learning-Enabled Safety Critical Systems

    Authors: Saddek Bensalem, Chih-Hong Cheng, Wei Huang, Xiaowei Huang, Changshun Wu, Xingyu Zhao

    Abstract: Machine learning has made remarkable advancements, but confidently utilising learning-enabled components in safety-critical domains still poses challenges. Among the challenges, it is known that a rigorous, yet practical, way of achieving safety guarantees is one of the most prominent. In this paper, we first discuss the engineering and research challenges associated with the design and verificati… ▽ More

    Submitted 20 July, 2023; originally announced July 2023.

  6. arXiv:2306.08447  [pdf, other

    cs.LG

    Towards Rigorous Design of OoD Detectors

    Authors: Chih-Hong Cheng, Changshun Wu, Harald Ruess, Saddek Bensalem

    Abstract: Out-of-distribution (OoD) detection techniques are instrumental for safety-related neural networks. We are arguing, however, that current performance-oriented OoD detection techniques geared towards matching metrics such as expected calibration error, are not sufficient for establishing safety claims. What is missing is a rigorous design approach for develo**, verifying, and validating OoD detec… ▽ More

    Submitted 14 June, 2023; originally announced June 2023.

  7. arXiv:2305.11391  [pdf, other

    cs.AI cs.LG

    A Survey of Safety and Trustworthiness of Large Language Models through the Lens of Verification and Validation

    Authors: Xiaowei Huang, Wenjie Ruan, Wei Huang, Gaojie **, Yi Dong, Changshun Wu, Saddek Bensalem, Ronghui Mu, Yi Qi, Xingyu Zhao, Kaiwen Cai, Yanghao Zhang, Sihao Wu, Peipei Xu, Dengyu Wu, Andre Freitas, Mustafa A. Mustafa

    Abstract: Large Language Models (LLMs) have exploded a new heatwave of AI for their ability to engage end-users in human-level conversations with detailed and articulate answers across many knowledge domains. In response to their fast adoption in many industrial applications, this survey concerns their safety and trustworthiness. First, we review known vulnerabilities and limitations of the LLMs, categorisi… ▽ More

    Submitted 27 August, 2023; v1 submitted 18 May, 2023; originally announced May 2023.

  8. arXiv:2205.07736  [pdf, other

    cs.SE cs.LG

    Prioritizing Corners in OoD Detectors via Symbolic String Manipulation

    Authors: Chih-Hong Cheng, Changshun Wu, Emmanouil Seferis, Saddek Bensalem

    Abstract: For safety assurance of deep neural networks (DNNs), out-of-distribution (OoD) monitoring techniques are essential as they filter spurious input that is distant from the training dataset. This paper studies the problem of systematically testing OoD monitors to avoid cases where an input data point is tested as in-distribution by the monitor, but the DNN produces spurious output predictions. We con… ▽ More

    Submitted 16 May, 2022; originally announced May 2022.

  9. arXiv:2104.14435  [pdf, other

    cs.LG cs.AI cs.CV

    Customizable Reference Runtime Monitoring of Neural Networks using Resolution Boxes

    Authors: Changshun Wu, Yliès Falcone, Saddek Bensalem

    Abstract: Classification neural networks fail to detect inputs that do not fall inside the classes they have been trained for. Runtime monitoring techniques on the neuron activation pattern can be used to detect such inputs. We present an approach for monitoring classification systems via data abstraction. Data abstraction relies on the notion of box with a resolution. Box-based abstraction consists in repr… ▽ More

    Submitted 12 July, 2021; v1 submitted 25 April, 2021; originally announced April 2021.

  10. arXiv:2011.00556  [pdf, ps, other

    cs.SE

    Institution-based Encoding and Verification of Simple UML State Machines in CASL/SPASS

    Authors: Tobias Rosenberger, Saddek Bensalem, Alexander Knapp, Markus Roggenbach

    Abstract: This paper provides the first correct semantical representation of UML state-machines within the logical framework of an institution (previous attempts were flawed). A novel encoding of this representation into first-order logic enables symbolic analyses through a multitude of theorem-provers. UML state-machines are central to model-based systems-engineering. Till now, state-machine analysis has… ▽ More

    Submitted 1 November, 2020; originally announced November 2020.

  11. arXiv:1905.01607  [pdf, other

    cs.NI cs.FL

    Performance Evaluation of the NDN Data Plane Using Statistical Model Checking

    Authors: Siham Khoussi, Ayoub Nouri, Junxiao Shi, James Filliben, Lotfi Benmohamed, Abdella Battou, Saddek Bensalem

    Abstract: Named Data Networking (NDN) is an emerging technology for a future internet architecture that addresses weaknesses of the Internet Protocol (IP). Since Internet users and applications have demonstrated an ever-increasing need for high speed packet forwarding, research groups have investigated different designs and implementation for fast NDN data plane forwarders and claimed they were capable of a… ▽ More

    Submitted 26 July, 2019; v1 submitted 5 May, 2019; originally announced May 2019.

  12. Proceedings of the 1st International Workshop on Methods and Tools for Rigorous System Design

    Authors: Simon Bliudze, Saddek Bensalem

    Abstract: This volume contains the proceedings of the 1st International Workshop on Methods and Tools for Rigorous System Design (MeTRiD 2018), held on the 15th of April, 2018 in Thessaloniki, Greece as part of ETAPS 2018, the European Joint Conferences on Theory and Practice of Software. The term "Rigorous System Design" (RSD) denotes the design approach that is based on a formal, accountable and iterati… ▽ More

    Submitted 25 June, 2018; originally announced June 2018.

    Journal ref: EPTCS 272, 2018

  13. arXiv:1803.09511  [pdf, other

    cs.LO

    Left-eigenvectors are certificates of the Orbit Problem

    Authors: Steven de Oliveira, Virgile Prevosto, Peter Habermehl, Saddek Bensalem

    Abstract: This paper investigates the connexion between the Kannan-Lipton Orbit Problem and the polynomial invariant generator algorithm PILA based on eigenvectors computation. Namely, we reduce the problem of generating linear and polynomial certificates of non-reachability for the Orbit Problem for linear transformations with rational coefficients to the generalized eigenvector problem. Also, we prove the… ▽ More

    Submitted 26 March, 2018; originally announced March 2018.

    Comments: 12 pages + references, submutted to ICALP 2018

  14. arXiv:1705.05242  [pdf, other

    cs.SE

    Monitoring Distributed Component-Based Systems

    Authors: Hosein Nazarpour, Yliès Falcone, Mohamad Jaber, Saddek Bensalem, Marius Bozga

    Abstract: This paper addresses the online monitoring of distributed component-based systems with multi-party interactions against user-provided properties expressed in linear-temporal logic and referring to global states. We consider intrinsically independent components whose interactions are partitioned on distributed controllers. In this context, the problem that arises is that a global state of the syste… ▽ More

    Submitted 15 May, 2017; originally announced May 2017.

  15. arXiv:1612.06154  [pdf, other

    cs.SE

    Concurrency-Preserving and Sound Monitoring of Multi-Threaded Component-Based Systems

    Authors: Hosein Nazarpour, Yliès Falcone, Saddek Bensalem, Marius Bozga

    Abstract: This paper addresses the monitoring of logic-independent linear-time user-provided properties in multi-threaded component-based systems. We consider intrinsically independent components that can be executed concurrently with a centralized coordination for multiparty interactions. In this context, the problem that arises is that a global state of the system is not available to the monitor. A naive… ▽ More

    Submitted 23 January, 2017; v1 submitted 19 December, 2016; originally announced December 2016.

  16. arXiv:1611.07753  [pdf, other

    cs.LO

    Synthesizing invariants by solving solvable loops

    Authors: Steven de Oliveira, Saddek Bensalem, Virgile Prevosto

    Abstract: When proving invariance properties of a program, we face two problems. The first problem is related to the necessity of proving tautologies of considered assertion language, whereas the second manifests in the need of finding sufficiently strong invariants. This paper focuses on the second problem and describes a new method for the automatic generation of loop invariants that handles polynomial an… ▽ More

    Submitted 23 November, 2016; originally announced November 2016.

    Comments: 15 pages + 3 appendix

  17. arXiv:1611.07726  [pdf, ps, other

    cs.LO

    Polynomial invariants by linear algebra

    Authors: Steven de Oliveira, Saddek Bensalem, Virgile Prevosto

    Abstract: We present in this paper a new technique for generating polynomial invariants, divided in two independent parts : a procedure that reduces polynomial assignments composed loops analysis to linear loops under certain hypotheses and a procedure for generating inductive invariants for linear loops. Both of these techniques have a polynomial complexity for a bounded number of variables and we guarante… ▽ More

    Submitted 23 November, 2016; originally announced November 2016.

    Comments: 15 pages + 6 appendix

    Journal ref: Automated Technology for Verification and Analysis 2016 Volume 9938 of the series Lecture Notes in Computer Science pp 479-494

  18. Compositional Verification for Timed Systems Based on Automatic Invariant Generation

    Authors: Lacramioara Astefanoaei, Souha Ben Rayana, Saddek Bensalem, Marius Bozga, Jacques Combaz

    Abstract: We propose a method for compositional verification to address the state space explosion problem inherent to model-checking timed systems with a large number of components. The main challenge is to obtain pertinent global timing constraints from the timings in the components alone. To this end, we make use of auxiliary clocks to automatically generate new invariants which capture the constraints i… ▽ More

    Submitted 16 September, 2015; v1 submitted 16 June, 2015; originally announced June 2015.

    Journal ref: Logical Methods in Computer Science, Volume 11, Issue 3 (September 17, 2015) lmcs:1591

  19. arXiv:1504.05513  [pdf, other

    cs.FL cs.LO cs.SC

    Timed Orchestration for Component-based Systems

    Authors: Chih-Hong Cheng, Lacramioara Astefanoaei, Harald Ruess, Souha Ben Rayana, Saddek Bensalem

    Abstract: Individual machines in flexible production lines explicitly expose capabilities at their interfaces by means of parametric skills. Given such a set of configurable machines, a line integrator is faced with the problem of finding and tuning parameters for each machine such that the overall production line implements given safety and temporal requirements in an optimized and robust fashion. We forma… ▽ More

    Submitted 20 May, 2016; v1 submitted 21 April, 2015; originally announced April 2015.

    Comments: Timestamp of the work, with evaluation added by creating MES orchestration examples. (v3): typo fix and bring back definition and citation in en^t as in v1

  20. arXiv:1309.0442  [pdf

    cs.RO cs.SE

    A Verifiable and Correct-by-Construction Controller for Robot Functional Levels

    Authors: Saddek Bensalem, Lavindra de Silva, Félix Ingrand, Rongjie Yan

    Abstract: Autonomous robots are complex systems that require the interaction and cooperation between numerous heterogeneous software components. In recent times, robots are being increasingly used for complex and safety-critical tasks, such as exploring Mars and assisting/replacing humans. Consequently, robots are becoming critical systems that must meet safety properties, in particular, logical, temporal a… ▽ More

    Submitted 2 September, 2013; originally announced September 2013.

    Journal ref: Journal of Software Engineering for Robotics, 2(1), September 2011, pages 1-19

  21. arXiv:1306.3456  [pdf, other

    cs.LO

    EFSMT: A Logical Framework for Cyber-Physical Systems

    Authors: Chih-Hong Cheng, Natarajan Shankar, Harald Ruess, Saddek Bensalem

    Abstract: The design of cyber-physical systems is challenging in that it includes the analysis and synthesis of distributed and embedded real-time systems for controlling, often in a nonlinear way, the environment. We address this challenge with EFSMT, the exists-forall quantified first-order fragment of propositional combinations over constraints (including nonlinear arithmetic), as the logical framework a… ▽ More

    Submitted 14 June, 2013; originally announced June 2013.

  22. arXiv:1211.6189  [pdf, other

    eess.SY cs.LO

    Distributed Priority Synthesis

    Authors: Chih-Hong Cheng, Rongjie Yan, Saddek Bensalem, Harald Ruess

    Abstract: Given a set of interacting components with non-deterministic variable update and given safety requirements, the goal of priority synthesis is to restrict, by means of priorities, the set of possible interactions in such a way as to guarantee the given safety conditions for all possible runs. In distributed priority synthesis we are interested in obtaining local sets of priorities, which are de… ▽ More

    Submitted 26 November, 2012; originally announced November 2012.

    Comments: In Proceedings SSV 2012, arXiv:1211.5873

    Journal ref: EPTCS 102, 2012, pp. 57-72

  23. arXiv:1112.1783  [pdf, other

    cs.LO cs.GT

    Distributed Priority Synthesis and its Applications

    Authors: Chih-Hong Cheng, Saddek Bensalem, Rongjie Yan, Harald Ruess, Christian Buckl, Alois Knoll

    Abstract: Given a set of interacting components with non-deterministic variable update and given safety requirements, the goal of priority synthesis is to restrict, by means of priorities, the set of possible interactions in such a way as to guarantee the given safety conditions for all possible runs. In distributed priority synthesis we are interested in obtaining local sets of priorities, which are deploy… ▽ More

    Submitted 27 January, 2012; v1 submitted 8 December, 2011; originally announced December 2011.

    Comments: 1. Timestamp the joint work "Distributed Priority Synthesis" from four institutes (Verimag, TUM, ISCAS, fortiss). 2. This version (v.2) updates related work in distributed synthesis

  24. arXiv:1107.1383  [pdf, other

    cs.LO eess.SY

    Algorithms for Synthesizing Priorities in Component-based Systems

    Authors: Chih-Hong Cheng, Saddek Bensalem, Yu-Fang Chen, Rongjie Yan, Barbara Jobstmann, Harald Ruess, Christian Buckl, Alois Knoll

    Abstract: We present algorithms to synthesize component-based systems that are safe and deadlock-free using priorities, which define stateless-precedence between enabled actions. Our core method combines the concept of fault-localization (using safety-game) and fault-repair (using SAT for conflict resolution). For complex systems, we propose three complementary methods as preprocessing steps for priority sy… ▽ More

    Submitted 7 October, 2011; v1 submitted 6 July, 2011; originally announced July 2011.

    Comments: Full version of the ATVA'11 paper (compared to the 1st arXiv version, we add one additional sentence to avoid confusion)