Skip to content

Commit ac50e06

Browse files
committed
update readme
1 parent 420d573 commit ac50e06

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

README.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
1-
# AIROBAS: AI ROBustness Assessment
1+
# AIROBAS: AI ROBustness ASsessment
22

33
## Introduction
44

5-
**What is Airobas?** `A(i)robas` is a library that allows the combinaison of verification tools for neural network into a pipeline.
5+
**What is AIROBAS?** It is a library that allows the combinaison of verification tools for neural network into a pipeline.
66

77
It provides functionalities to:
88

@@ -19,21 +19,21 @@ functionalities implemented in the Airbus open-source library [decomon](https://
1919

2020
– append new verification functions or link the code to the open-source libraries of one’s choice
2121

22-
We believe that Airobas is a complementary tool to existing libraries for the robustness verification of neural networks.
22+
AIROBAS is a complementary tool to existing libraries for the robustness verification of neural networks.
2323
This open source code is a complement to the publication ["Surrogate Neural Networks Local Stability for
2424
Aircraft Predictive Maintenance"](https://arxiv.org/abs/2401.06821) which was peer-reviewed and accepted at the 29th International Conference on Formal Methods for Industrial Critical Systems ([FMICS2024](https://fmics.inria.fr/2024/)).
2525

2626
**Complete Verification Pipeline for Stability**
2727

2828
Verification techniques for neural networks take test points, a trained model and a given property (robustness, stability, monotonicity etc.) as input and return for every test point an assessment of whether or not the property is violated or verified.
2929

30-
The current state-of-the-art mainly encaompasses three families of methods:
30+
The current state-of-the-art mainly encompasses three families of methods:
3131

32-
- The ’no/maybe’ methods (Family of techniques 'A' in paper): e.g. [adversarial attacks](https://github.com/cleverhans-lab/cleverhans). These methods essentially rely on the search for counterexamples that contradict the targeted property. If no counterexample is found, no conclusion can be drawn on the model output w.r.t to the targeted property.
32+
- The ’no/maybe’ methods (Family of techniques 'A' in paper): e.g. [adversarial attacks](https://github.com/cleverhans-lab/cleverhans). These methods essentially rely on the search for counterexamples that violate the targeted property. If no counterexample is found, no conclusion can be drawn on the model output w.r.t to the targeted property.
3333

34-
- The ’yes/maybe’ methods (Family of techniques 'B' in paper): e.g. the affine bounds generation methods implemented in the [decomon library](https://github.com/airbus/decomon). These techniques intend to bound the output values of a network. If the derived bounds respect the property, it is verified. If the bounds exceed it, no conclusion can be drawn. It can then either mean that the propety is violated or that the derived bounds are too loose. These methods are commonly refered to as 'incomplete' (since they can guarantee the property is respected but not that it is violated). They are however generally faster than 'complete' methods (see next).
34+
- The ’yes/maybe’ methods (Family of techniques 'B' in paper): e.g. the affine bounds generation methods implemented in the [decomon library](https://github.com/airbus/decomon). These techniques intend to bound the output values of a network. If the derived bounds respect the property, it is verified. If the bounds exceed it, no conclusion can be drawn. It can then either mean that the property is violated or that the derived bounds are too loose. These methods are commonly refered to as 'incomplete' (since they can guarantee the property is respected but not that it is violated). They are however generally faster than 'complete' methods (see next).
3535

36-
- The ’yes/no’ methods (Family of techniques 'C' in paper): e.g., [SMT](https://github.com/NeuralNetworkVerification/Marabou), [MILP](https://gurobi-machinelearning.readthedocs.io/en/stable/index.html) solvers etc. They can guarantee that the neural network output resepct or not the targeted property, at the cost of significant computation time. They are commonly refered to as 'complete' techniques.
36+
- The ’yes/no’ methods (Family of techniques 'C' in paper): e.g., [SMT](https://github.com/NeuralNetworkVerification/Marabou), [MILP](https://gurobi-machinelearning.readthedocs.io/en/stable/index.html) solvers etc. They can guarantee that the neural network output respect or not the targeted property, at the cost of significant computation time. They are commonly refered to as 'complete' techniques.
3737

3838
Here is an example of NN verification pipeline:
3939

0 commit comments

Comments
 (0)