Skip to main content

Showing 1–19 of 19 results for author: Weimer, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2310.06171  [pdf, other

    cs.LG cs.AI cs.RO

    Memory-Consistent Neural Networks for Imitation Learning

    Authors: Kaustubh Sridhar, Souradeep Dutta, Dinesh Jayaraman, James Weimer, Insup Lee

    Abstract: Imitation learning considerably simplifies policy synthesis compared to alternative approaches by exploiting access to expert demonstrations. For such imitation policies, errors away from the training samples are particularly critical. Even rare slip-ups in the policy action outputs can compound quickly over time, since they lead to unfamiliar future states where the policy is still more likely to… ▽ More

    Submitted 16 March, 2024; v1 submitted 9 October, 2023; originally announced October 2023.

    Comments: ICLR 2024. 26 pages (9 main pages)

  2. arXiv:2309.00543  [pdf, other

    cs.LG cs.AI

    Curating Naturally Adversarial Datasets for Learning-Enabled Medical Cyber-Physical Systems

    Authors: Sydney Pugh, Ivan Ruchkin, Insup Lee, James Weimer

    Abstract: Deep learning models have shown promising predictive accuracy for time-series healthcare applications. However, ensuring the robustness of these models is vital for building trustworthy AI systems. Existing research predominantly focuses on robustness to synthetic adversarial examples, crafted by adding imperceptible perturbations to clean input data. However, these synthetic adversarial examples… ▽ More

    Submitted 7 November, 2023; v1 submitted 1 September, 2023; originally announced September 2023.

  3. arXiv:2304.13919  [pdf, other

    cs.CV cs.CR cs.LG

    Detection of Adversarial Physical Attacks in Time-Series Image Data

    Authors: Ramneet Kaur, Yiannis Kantaros, Wenwen Si, James Weimer, Insup Lee

    Abstract: Deep neural networks (DNN) have become a common sensing modality in autonomous systems as they allow for semantically perceiving the ambient environment given input images. Nevertheless, DNN models have proven to be vulnerable to adversarial digital and physical attacks. To mitigate this issue, several detection frameworks have been proposed to detect whether a single input image has been manipula… ▽ More

    Submitted 26 April, 2023; originally announced April 2023.

  4. arXiv:2212.01346  [pdf, other

    cs.LG cs.AI cs.RO

    Guaranteed Conformance of Neurosymbolic Models to Natural Constraints

    Authors: Kaustubh Sridhar, Souradeep Dutta, James Weimer, Insup Lee

    Abstract: Deep neural networks have emerged as the workhorse for a large section of robotics and control applications, especially as models for dynamical systems. Such data-driven models are in turn used for designing and verifying autonomous systems. They are particularly useful in modeling medical systems where data can be leveraged to individualize treatment. In safety-critical applications, it is import… ▽ More

    Submitted 7 November, 2023; v1 submitted 2 December, 2022; originally announced December 2022.

    Comments: Accepted to L4DC 2023 and Neurosymbolic Generative Models workshop, ICLR 2023

  5. arXiv:2210.07531  [pdf, other

    cs.CR

    Let's Talk Through Physics! Covert Cyber-Physical Data Exfiltration on Air-Gapped Edge Devices

    Authors: Matthew Chan, Nathaniel Snyder, Marcus Lucas, Luis Garcia, Oleg Sokolsky, James Weimer, Insup Lee, Paulo Tabuada, Saman Zonouz, Mani Srivastava

    Abstract: Although organizations are continuously making concerted efforts to harden their systems against network attacks by air-gap** critical systems, attackers continuously adapt and uncover covert channels to exfiltrate data from air-gapped systems. For instance, attackers have demonstrated the feasibility of exfiltrating data from a computer sitting in a Faraday cage by exfiltrating data using magne… ▽ More

    Submitted 14 October, 2022; originally announced October 2022.

  6. arXiv:2206.06496  [pdf, other

    cs.LG

    Towards Alternative Techniques for Improving Adversarial Robustness: Analysis of Adversarial Training at a Spectrum of Perturbations

    Authors: Kaustubh Sridhar, Souradeep Dutta, Ramneet Kaur, James Weimer, Oleg Sokolsky, Insup Lee

    Abstract: Adversarial training (AT) and its variants have spearheaded progress in improving neural network robustness to adversarial perturbations and common corruptions in the last few years. Algorithm design of AT and its variants are focused on training models at a specified perturbation strength $ε$ and only using the feedback from the performance of that $ε$-robust model to improve the algorithm. In th… ▽ More

    Submitted 13 June, 2022; originally announced June 2022.

  7. arXiv:2205.08650  [pdf, other

    eess.SY cs.CR

    A Framework for Checkpointing and Recovery of Hierarchical Cyber-Physical Systems

    Authors: Kaustubh Sridhar, Radoslav Ivanov, Vuk Lesi, Marcio Juliato, Manoj Sastry, Lily Yang, James Weimer, Oleg Sokolsky, Insup Lee

    Abstract: This paper tackles the problem of making complex resource-constrained cyber-physical systems (CPS) resilient to sensor anomalies. In particular, we present a framework for checkpointing and roll-forward recovery of state-estimates in nonlinear, hierarchical CPS with anomalous sensor data. We introduce three checkpointing paradigms for ensuring different levels of checkpointing consistency across t… ▽ More

    Submitted 17 May, 2022; originally announced May 2022.

  8. arXiv:2202.12967  [pdf, other

    cs.LG cs.AI stat.ML

    Exploring with Sticky Mittens: Reinforcement Learning with Expert Interventions via Option Templates

    Authors: Souradeep Dutta, Kaustubh Sridhar, Osbert Bastani, Edgar Dobriban, James Weimer, Insup Lee, Julia Parish-Morris

    Abstract: Long horizon robot learning tasks with sparse rewards pose a significant challenge for current reinforcement learning algorithms. A key feature enabling humans to learn challenging control tasks is that they often receive expert intervention that enables them to understand the high-level structure of the task before mastering low-level control actions. We propose a framework for leveraging expert… ▽ More

    Submitted 17 November, 2022; v1 submitted 25 February, 2022; originally announced February 2022.

    Comments: Conference on Robot Learning (CoRL) 2022

  9. CHEF: A Cheap and Fast Pipeline for Iteratively Cleaning Label Uncertainties (Technical Report)

    Authors: Yinjun Wu, James Weimer, Susan B. Davidson

    Abstract: High-quality labels are expensive to obtain for many machine learning tasks, such as medical image classification tasks. Therefore, probabilistic (weak) labels produced by weak supervision tools are used to seed a process in which influential samples with weak labels are identified and cleaned by several human annotators to improve the model performance. To lower the overall cost and computational… ▽ More

    Submitted 24 July, 2021; v1 submitted 18 July, 2021; originally announced July 2021.

    Comments: Accepted by VLDB 2021

  10. arXiv:2106.02078  [pdf, other

    stat.ML cs.CV cs.LG eess.SY

    Improving Neural Network Robustness via Persistency of Excitation

    Authors: Kaustubh Sridhar, Oleg Sokolsky, Insup Lee, James Weimer

    Abstract: Improving adversarial robustness of neural networks remains a major challenge. Fundamentally, training a neural network via gradient descent is a parameter estimation problem. In adaptive control, maintaining persistency of excitation (PoE) is integral to ensuring convergence of parameter estimates in dynamical systems to their true values. We show that parameter estimation with gradient descent c… ▽ More

    Submitted 15 October, 2021; v1 submitted 3 June, 2021; originally announced June 2021.

  11. arXiv:2104.15006  [pdf, other

    eess.SY cs.LG

    ModelGuard: Runtime Validation of Lipschitz-continuous Models

    Authors: Taylor J. Carpenter, Radoslav Ivanov, Insup Lee, James Weimer

    Abstract: This paper presents ModelGuard, a sampling-based approach to runtime model validation for Lipschitz-continuous models. Although techniques exist for the validation of many classes of models the majority of these methods cannot be applied to the whole of Lipschitz-continuous models, which includes neural network models. Additionally, existing techniques generally consider only white-box models. By… ▽ More

    Submitted 30 April, 2021; originally announced April 2021.

  12. arXiv:2102.12680  [pdf, other

    cs.LG

    Confidence Calibration with Bounded Error Using Transformations

    Authors: Sooyong Jang, Radoslav Ivanov, Insup Lee, James Weimer

    Abstract: As machine learning techniques become widely adopted in new domains, especially in safety-critical systems such as autonomous vehicles, it is crucial to provide accurate output uncertainty estimation. As a result, many approaches have been proposed to calibrate neural networks to accurately estimate the likelihood of misclassification. However, while these methods achieve low calibration error, th… ▽ More

    Submitted 23 December, 2021; v1 submitted 24 February, 2021; originally announced February 2021.

  13. arXiv:2011.04182  [pdf, other

    cs.LG

    Improving Classifier Confidence using Lossy Label-Invariant Transformations

    Authors: Sooyong Jang, Insup Lee, James Weimer

    Abstract: Providing reliable model uncertainty estimates is imperative to enabling robust decision making by autonomous agents and humans alike. While recently there have been significant advances in confidence calibration for trained models, examples with poor calibration persist in most calibrated models. Consequently, multiple techniques have been proposed that leverage label-invariant transformations of… ▽ More

    Submitted 8 November, 2020; originally announced November 2020.

  14. arXiv:2003.00343  [pdf, other

    cs.LG stat.ML

    Calibrated Prediction with Covariate Shift via Unsupervised Domain Adaptation

    Authors: Sangdon Park, Osbert Bastani, James Weimer, Insup Lee

    Abstract: Reliable uncertainty estimates are an important tool for hel** autonomous agents or human decision makers understand and leverage predictive models. However, existing approaches to estimating uncertainty largely ignore the possibility of covariate shift--i.e., where the real-world data distribution may differ from the training distribution. As a consequence, existing algorithms can overestimate… ▽ More

    Submitted 20 May, 2020; v1 submitted 29 February, 2020; originally announced March 2020.

    Comments: Accepted to AISTATS 2020

  15. arXiv:2002.09792  [pdf, other

    cs.CV cs.RO eess.IV

    Real-Time Detectors for Digital and Physical Adversarial Inputs to Perception Systems

    Authors: Yiannis Kantaros, Taylor Carpenter, Kaustubh Sridhar, Yahan Yang, Insup Lee, James Weimer

    Abstract: Deep neural network (DNN) models have proven to be vulnerable to adversarial digital and physical attacks. In this paper, we propose a novel attack- and dataset-agnostic and real-time detector for both types of adversarial inputs to DNN-based perception systems. In particular, the proposed detector relies on the observation that adversarial images are sensitive to certain label-invariant transform… ▽ More

    Submitted 21 April, 2022; v1 submitted 22 February, 2020; originally announced February 2020.

  16. arXiv:2001.00090  [pdf, other

    cs.CY cs.DC eess.SY

    Resilient Cyberphysical Systems and their Application Drivers: A Technology Roadmap

    Authors: Somali Chaterji, Parinaz Naghizadeh, Muhammad Ashraful Alam, Saurabh Bagchi, Mung Chiang, David Corman, Brian Henz, Suman Jana, Na Li, Shaoshuai Mou, Meeko Oishi, Chunyi Peng, Tiark Rompf, Ashutosh Sabharwal, Shreyas Sundaram, James Weimer, Jennifer Weller

    Abstract: Cyberphysical systems (CPS) are ubiquitous in our personal and professional lives, and they promise to dramatically improve micro-communities (e.g., urban farms, hospitals), macro-communities (e.g., cities and metropolises), urban structures (e.g., smart homes and cars), and living structures (e.g., human bodies, synthetic genomes). The question that we address in this article pertains to designin… ▽ More

    Submitted 19 December, 2019; originally announced January 2020.

    Comments: 36 pages, 2 figures, NSF-supported workshop on Grand Challenges in Resilience, held at Purdue, March 20-21, 2019

    MSC Class: C.5.3; D.4.5; H.4.0 ACM Class: C.5.3; D.4.5; H.4.0

  17. arXiv:1910.11309  [pdf, other

    eess.SY cs.RO

    Case Study: Verifying the Safety of an Autonomous Racing Car with a Neural Network Controller

    Authors: Radoslav Ivanov, Taylor J. Carpenter, James Weimer, Rajeev Alur, George J. Pappas, Insup Lee

    Abstract: This paper describes a verification case study on an autonomous racing car with a neural network (NN) controller. Although several verification approaches have been proposed over the last year, they have only been evaluated on low-dimensional systems or systems with constrained environments. To explore the limits of existing approaches, we present a challenging benchmark in which the NN takes raw… ▽ More

    Submitted 24 October, 2019; originally announced October 2019.

  18. arXiv:1806.08810  [pdf, other

    cs.LO cs.RO eess.SY

    Self-Driving Vehicle Verification Towards a Benchmark

    Authors: Nima Roohi, Ramneet Kaur, James Weimer, Oleg Sokolsky, Insup Lee

    Abstract: Industrial cyber-physical systems are hybrid systems with strict safety requirements. Despite not having a formal semantics, most of these systems are modeled using Stateflow/Simulink for mainly two reasons: (1) it is easier to model, test, and simulate using these tools, and (2) dynamics of these systems are not supported by most other tools. Furthermore, with the ever growing complexity of cyber… ▽ More

    Submitted 20 June, 2018; originally announced June 2018.

    Comments: 7 pages

  19. arXiv:1708.03366  [pdf, other

    cs.LG cs.AI cs.CR eess.SY

    Resilient Linear Classification: An Approach to Deal with Attacks on Training Data

    Authors: Sangdon Park, James Weimer, Insup Lee

    Abstract: Data-driven techniques are used in cyber-physical systems (CPS) for controlling autonomous vehicles, handling demand responses for energy management, and modeling human physiology for medical devices. These data-driven techniques extract models from training data, where their performance is often analyzed with respect to random errors in the training data. However, if the training data is maliciou… ▽ More

    Submitted 15 August, 2017; v1 submitted 10 August, 2017; originally announced August 2017.

    Comments: Accepted as a conference paper at ICCPS17