亚洲男人的天堂2018av,欧美草比,久久久久久免费视频精选,国色天香在线看免费,久久久久亚洲av成人片仓井空

We present the first automated verification technique for confidence-based 2-safety properties, such as global robustness and global fairness, in deep neural networks (DNNs). Our approach combines self-composition to leverage existing reachability analysis techniques and a novel abstraction of the softmax function, which is amenable to automated verification. We characterize and prove the soundness of our static analysis technique. Furthermore, we implement it on top of Marabou, a safety analysis tool for neural networks, conducting a performance evaluation on several publicly available benchmarks for DNN verification.

相關內容

神(shen)(shen)經(jing)(jing)(jing)(jing)網(wang)絡(luo)(luo)(luo)(luo)(Neural Networks)是世界上三個(ge)最古老的(de)(de)(de)(de)神(shen)(shen)經(jing)(jing)(jing)(jing)建模(mo)學(xue)(xue)(xue)(xue)(xue)會(hui)的(de)(de)(de)(de)檔(dang)案期刊:國際神(shen)(shen)經(jing)(jing)(jing)(jing)網(wang)絡(luo)(luo)(luo)(luo)學(xue)(xue)(xue)(xue)(xue)會(hui)(INNS)、歐洲神(shen)(shen)經(jing)(jing)(jing)(jing)網(wang)絡(luo)(luo)(luo)(luo)學(xue)(xue)(xue)(xue)(xue)會(hui)(ENNS)和(he)(he)日本神(shen)(shen)經(jing)(jing)(jing)(jing)網(wang)絡(luo)(luo)(luo)(luo)學(xue)(xue)(xue)(xue)(xue)會(hui)(JNNS)。神(shen)(shen)經(jing)(jing)(jing)(jing)網(wang)絡(luo)(luo)(luo)(luo)提(ti)供了一個(ge)論壇,以發(fa)展(zhan)和(he)(he)培(pei)育一個(ge)國際社(she)(she)會(hui)的(de)(de)(de)(de)學(xue)(xue)(xue)(xue)(xue)者和(he)(he)實(shi)踐者感(gan)興(xing)趣(qu)的(de)(de)(de)(de)所(suo)有方面的(de)(de)(de)(de)神(shen)(shen)經(jing)(jing)(jing)(jing)網(wang)絡(luo)(luo)(luo)(luo)和(he)(he)相關(guan)方法(fa)的(de)(de)(de)(de)計(ji)(ji)算智能(neng)(neng)。神(shen)(shen)經(jing)(jing)(jing)(jing)網(wang)絡(luo)(luo)(luo)(luo)歡迎(ying)高質量論文(wen)的(de)(de)(de)(de)提(ti)交,有助于(yu)(yu)全面的(de)(de)(de)(de)神(shen)(shen)經(jing)(jing)(jing)(jing)網(wang)絡(luo)(luo)(luo)(luo)研究(jiu),從行為和(he)(he)大(da)腦建模(mo),學(xue)(xue)(xue)(xue)(xue)習算法(fa),通(tong)過數學(xue)(xue)(xue)(xue)(xue)和(he)(he)計(ji)(ji)算分(fen)析,系(xi)統的(de)(de)(de)(de)工程(cheng)和(he)(he)技術(shu)應(ying)用(yong),大(da)量使用(yong)神(shen)(shen)經(jing)(jing)(jing)(jing)網(wang)絡(luo)(luo)(luo)(luo)的(de)(de)(de)(de)概念(nian)和(he)(he)技術(shu)。這(zhe)一獨特而(er)廣(guang)泛的(de)(de)(de)(de)范圍促(cu)進了生(sheng)物(wu)(wu)和(he)(he)技術(shu)研究(jiu)之(zhi)(zhi)間的(de)(de)(de)(de)思想交流(liu),并有助于(yu)(yu)促(cu)進對生(sheng)物(wu)(wu)啟(qi)發(fa)的(de)(de)(de)(de)計(ji)(ji)算智能(neng)(neng)感(gan)興(xing)趣(qu)的(de)(de)(de)(de)跨學(xue)(xue)(xue)(xue)(xue)科(ke)(ke)社(she)(she)區的(de)(de)(de)(de)發(fa)展(zhan)。因此,神(shen)(shen)經(jing)(jing)(jing)(jing)網(wang)絡(luo)(luo)(luo)(luo)編(bian)委會(hui)代表的(de)(de)(de)(de)專家領域包括心理(li)學(xue)(xue)(xue)(xue)(xue),神(shen)(shen)經(jing)(jing)(jing)(jing)生(sheng)物(wu)(wu)學(xue)(xue)(xue)(xue)(xue),計(ji)(ji)算機科(ke)(ke)學(xue)(xue)(xue)(xue)(xue),工程(cheng),數學(xue)(xue)(xue)(xue)(xue),物(wu)(wu)理(li)。該雜志發(fa)表文(wen)章、信件和(he)(he)評論以及給編(bian)輯的(de)(de)(de)(de)信件、社(she)(she)論、時(shi)事、軟件調查和(he)(he)專利信息。文(wen)章發(fa)表在五個(ge)部(bu)分(fen)之(zhi)(zhi)一:認(ren)知(zhi)科(ke)(ke)學(xue)(xue)(xue)(xue)(xue),神(shen)(shen)經(jing)(jing)(jing)(jing)科(ke)(ke)學(xue)(xue)(xue)(xue)(xue),學(xue)(xue)(xue)(xue)(xue)習系(xi)統,數學(xue)(xue)(xue)(xue)(xue)和(he)(he)計(ji)(ji)算分(fen)析、工程(cheng)和(he)(he)應(ying)用(yong)。 官網(wang)地址:

Session types using affinity and exception handling mechanisms have been developed to ensure the communication safety of protocols implemented in concurrent and distributed programming languages. Nevertheless, current affine session types are inadequate for specifying real-world asynchronous protocols, as they are usually imposed by time constraints which enable timeout exceptions to prevent indefinite blocking while awaiting valid messages. This paper proposes the first formal integration of affinity, time constraints, timeouts, and time-failure handling based on multiparty session types for supporting reliability in asynchronous distributed systems. With this theory, we statically guarantee that asynchronous timed communication is deadlock-free, communication safe, while being fearless -- never hindered by timeout errors or abrupt terminations. To implement our theory, we introduce a Rust toolchain designed to facilitate the implementation of safe affine timed protocols. Our toolchain leverages generic types and the time library to handle timed communications, integrated with optional types for affinity. We evaluate our approach by extending diverse examples from the literature to incorporate time and timeouts, demonstrating that our solution incurs negligible overhead compared with an untimed implementation. We also showcase the correctness by construction of our approach by implementing various real-world use cases, including a remote data protocol from the Internet of Remote Things domain, as well as protocols from real-time systems like Android motion sensors and smartwatches.

Railroad transportation plays a vital role in the future of sustainable mobility. Besides building new infrastructure, capacity can be improved by modern train control systems, e.g., based on moving blocks. At the same time, there is only limited work on how to optimally route trains using the potential gained by these systems. Recently, an initial approach for train routing with moving block control has been proposed to address this demand. However, detailed evaluations on so-called lazy constraints are missing, and no publicly available implementation exists. In this work, we close this gap by providing an extended approach as well as a flexible open-source implementation that can use different solving strategies. Using that, we experimentally evaluate what choices should be made when implementing a lazy constraint approach. The corresponding implementation and benchmarks are publicly available as part of the Munich Train Control Toolkit (MTCT) at //github.com/cda-tum/mtct.

To address the challenges of sensor fusion and safety risk prediction, contemporary closed-loop autonomous driving neural networks leveraging imitation learning typically require a substantial volume of parameters and computational resources to run neural networks. Given the constrained computational capacities of onboard vehicular computers, we introduce a compact yet potent solution named EfficientFuser. This approach employs EfficientViT for visual information extraction and integrates feature maps via cross attention. Subsequently, it utilizes a decoder-only transformer for the amalgamation of multiple features. For prediction purposes, learnable vectors are embedded as tokens to probe the association between the task and sensor features through attention. Evaluated on the CARLA simulation platform, EfficientFuser demonstrates remarkable efficiency, utilizing merely 37.6% of the parameters and 8.7% of the computations compared to the state-of-the-art lightweight method with only 0.4% lower driving score, and the safety score neared that of the leading safety-enhanced method, showcasing its efficacy and potential for practical deployment in autonomous driving systems.

In the space sector, due to environmental conditions and restricted accessibility, robust fault detection methods are imperative for ensuring mission success and safeguarding valuable assets. This work proposes a novel approach leveraging Physics-Informed Real NVP neural networks, renowned for their ability to model complex and high-dimensional distributions, augmented with a self-supervised task based on sensors' data permutation. It focuses on enhancing fault detection within the satellite multivariate time series. The experiments involve various configurations, including pre-training with self-supervision, multi-task learning, and standalone self-supervised training. Results indicate significant performance improvements across all settings. In particular, employing only the self-supervised loss yields the best overall results, suggesting its efficacy in guiding the network to extract relevant features for fault detection. This study presents a promising direction for improving fault detection in space systems and warrants further exploration in other datasets and applications.

As the number of large language models (LLMs) released to the public grows, there is a pressing need to understand the safety implications associated with these models learning from third-party custom finetuning data. We explore the behavior of LLMs finetuned on noisy custom data containing unsafe content, represented by datasets that contain biases, toxicity, and harmfulness, finding that while aligned LLMs can readily learn this unsafe content, they also tend to forget it more significantly than other examples when subsequently finetuned on safer content. Drawing inspiration from the discrepancies in forgetting, we introduce the "ForgetFilter" algorithm, which filters unsafe data based on how strong the model's forgetting signal is for that data. We demonstrate that the ForgetFilter algorithm ensures safety in customized finetuning without compromising downstream task performance, unlike sequential safety finetuning. ForgetFilter outperforms alternative strategies like replay and moral self-correction in curbing LLMs' ability to assimilate unsafe content during custom finetuning, e.g. 75% lower than not applying any safety measures and 62% lower than using self-correction in toxicity score.

As autonomous driving systems being deployed to millions of vehicles, there is a pressing need of improving the system's scalability, safety and reducing the engineering cost. A realistic, scalable, and practical simulator of the driving world is highly desired. In this paper, we present an efficient solution based on generative models which learns the dynamics of the driving scenes. With this model, we can not only simulate the diverse futures of a given driving scenario but also generate a variety of driving scenarios conditioned on various prompts. Our innovative design allows the model to operate in both full-Autoregressive and partial-Autoregressive modes, significantly improving inference and training speed without sacrificing generative capability. This efficiency makes it ideal for being used as an online reactive environment for reinforcement learning, an evaluator for planning policies, and a high-fidelity simulator for testing. We evaluated our model against two real-world datasets: the Waymo motion dataset and the nuPlan dataset. On the simulation realism and scene generation benchmark, our model achieves the state-of-the-art performance. And in the planning benchmarks, our planner outperforms the prior arts. We conclude that the proposed generative model may serve as a foundation for a variety of motion planning tasks, including data generation, simulation, planning, and online training. Source code is public at //github.com/HorizonRobotics/GUMP/

Detecting undesired process behavior is one of the main tasks of process mining and various conformance-checking techniques have been developed to this end. These techniques typically require a normative process model as input, specifically designed for the processes to be analyzed. Such models are rarely available, though, and their creation involves considerable manual effort.However, reference process models serve as best-practice templates for organizational processes in a plethora of domains, containing valuable knowledge about general behavioral relations in well-engineered processes. These general models can thus mitigate the need for dedicated models by providing a basis to check for undesired behavior. Still, finding a perfectly matching reference model for a real-life event log is unrealistic because organizational needs can vary, despite similarities in process execution. Furthermore, event logs may encompass behavior related to different reference models, making traditional conformance checking impractical as it requires aligning process executions to individual models. To still use reference models for conformance checking, we propose a framework for mining declarative best-practice constraints from a reference model collection, automatically selecting constraints that are relevant for a given event log, and checking for best-practice violations. We demonstrate the capability of our framework to detect best-practice violations through an evaluation based on real-world process model collections and event logs.

Trustworthy prediction in Deep Neural Networks (DNNs), including Pre-trained Language Models (PLMs) is important for safety-critical applications in the real world. However, DNNs often suffer from uncertainty estimation, such as miscalibration. In particular, approaches that require multiple stochastic inference can mitigate this problem, but the expensive cost of inference makes them impractical. In this study, we propose $k$-Nearest Neighbor Uncertainty Estimation ($k$NN-UE), which is an uncertainty estimation method that uses the distances from the neighbors and label-existence ratio of neighbors. Experiments on sentiment analysis, natural language inference, and named entity recognition show that our proposed method outperforms the baselines or recent density-based methods in confidence calibration, selective prediction, and out-of-distribution detection. Moreover, our analyses indicate that introducing dimension reduction or approximate nearest neighbor search inspired by recent $k$NN-LM studies reduces the inference overhead without significantly degrading estimation performance when combined them appropriately.

Interpolation-based techniques become popular in recent years, as they can improve the scalability of existing verification techniques due to their inherent modularity and local reasoning capabilities. Synthesizing Craig interpolants is the cornerstone of these techniques. In this paper, we investigate nonlinear Craig interpolant synthesis for two polynomial formulas of the general form, essentially corresponding to the underlying mathematical problem to separate two disjoint semialgebraic sets. By combining the homogenization approach with existing techniques, we prove the existence of a novel class of non-polynomial interpolants called semialgebraic interpolants. These semialgebraic interpolants subsume polynomial interpolants as a special case. To the best of our knowledge, this is the first existence result of this kind. Furthermore, we provide complete sum-of-squares characterizations for both polynomial and semialgebraic interpolants, which can be efficiently solved as semidefinite programs. Examples are provided to demonstrate the effectiveness and efficiency of our approach.

Advances in artificial intelligence often stem from the development of new environments that abstract real-world situations into a form where research can be done conveniently. This paper contributes such an environment based on ideas inspired by elementary Microeconomics. Agents learn to produce resources in a spatially complex world, trade them with one another, and consume those that they prefer. We show that the emergent production, consumption, and pricing behaviors respond to environmental conditions in the directions predicted by supply and demand shifts in Microeconomics. We also demonstrate settings where the agents' emergent prices for goods vary over space, reflecting the local abundance of goods. After the price disparities emerge, some agents then discover a niche of transporting goods between regions with different prevailing prices -- a profitable strategy because they can buy goods where they are cheap and sell them where they are expensive. Finally, in a series of ablation experiments, we investigate how choices in the environmental rewards, bartering actions, agent architecture, and ability to consume tradable goods can either aid or inhibit the emergence of this economic behavior. This work is part of the environment development branch of a research program that aims to build human-like artificial general intelligence through multi-agent interactions in simulated societies. By exploring which environment features are needed for the basic phenomena of elementary microeconomics to emerge automatically from learning, we arrive at an environment that differs from those studied in prior multi-agent reinforcement learning work along several dimensions. For example, the model incorporates heterogeneous tastes and physical abilities, and agents negotiate with one another as a grounded form of communication.

北京阿比特科技有限公司