You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,8 +1,8 @@
1
-
# AIROBAS: AI ROBustness Assessment
1
+
# AIROBAS: AI ROBustness ASsessment
2
2
3
3
## Introduction
4
4
5
-
**What is Airobas?**`A(i)robas` is a library that allows the combinaison of verification tools for neural network into a pipeline.
5
+
**What is AIROBAS?**It is a library that allows the combinaison of verification tools for neural network into a pipeline.
6
6
7
7
It provides functionalities to:
8
8
@@ -19,21 +19,21 @@ functionalities implemented in the Airbus open-source library [decomon](https://
19
19
20
20
– append new verification functions or link the code to the open-source libraries of one’s choice
21
21
22
-
We believe that Airobas is a complementary tool to existing libraries for the robustness verification of neural networks.
22
+
AIROBAS is a complementary tool to existing libraries for the robustness verification of neural networks.
23
23
This open source code is a complement to the publication ["Surrogate Neural Networks Local Stability for
24
24
Aircraft Predictive Maintenance"](https://arxiv.org/abs/2401.06821) which was peer-reviewed and accepted at the 29th International Conference on Formal Methods for Industrial Critical Systems ([FMICS2024](https://fmics.inria.fr/2024/)).
25
25
26
26
**Complete Verification Pipeline for Stability**
27
27
28
28
Verification techniques for neural networks take test points, a trained model and a given property (robustness, stability, monotonicity etc.) as input and return for every test point an assessment of whether or not the property is violated or verified.
29
29
30
-
The current state-of-the-art mainly encaompasses three families of methods:
30
+
The current state-of-the-art mainly encompasses three families of methods:
31
31
32
-
- The ’no/maybe’ methods (Family of techniques 'A' in paper): e.g. [adversarial attacks](https://github.com/cleverhans-lab/cleverhans). These methods essentially rely on the search for counterexamples that contradict the targeted property. If no counterexample is found, no conclusion can be drawn on the model output w.r.t to the targeted property.
32
+
- The ’no/maybe’ methods (Family of techniques 'A' in paper): e.g. [adversarial attacks](https://github.com/cleverhans-lab/cleverhans). These methods essentially rely on the search for counterexamples that violate the targeted property. If no counterexample is found, no conclusion can be drawn on the model output w.r.t to the targeted property.
33
33
34
-
- The ’yes/maybe’ methods (Family of techniques 'B' in paper): e.g. the affine bounds generation methods implemented in the [decomon library](https://github.com/airbus/decomon). These techniques intend to bound the output values of a network. If the derived bounds respect the property, it is verified. If the bounds exceed it, no conclusion can be drawn. It can then either mean that the propety is violated or that the derived bounds are too loose. These methods are commonly refered to as 'incomplete' (since they can guarantee the property is respected but not that it is violated). They are however generally faster than 'complete' methods (see next).
34
+
- The ’yes/maybe’ methods (Family of techniques 'B' in paper): e.g. the affine bounds generation methods implemented in the [decomon library](https://github.com/airbus/decomon). These techniques intend to bound the output values of a network. If the derived bounds respect the property, it is verified. If the bounds exceed it, no conclusion can be drawn. It can then either mean that the property is violated or that the derived bounds are too loose. These methods are commonly refered to as 'incomplete' (since they can guarantee the property is respected but not that it is violated). They are however generally faster than 'complete' methods (see next).
35
35
36
-
- The ’yes/no’ methods (Family of techniques 'C' in paper): e.g., [SMT](https://github.com/NeuralNetworkVerification/Marabou), [MILP](https://gurobi-machinelearning.readthedocs.io/en/stable/index.html) solvers etc. They can guarantee that the neural network output resepct or not the targeted property, at the cost of significant computation time. They are commonly refered to as 'complete' techniques.
36
+
- The ’yes/no’ methods (Family of techniques 'C' in paper): e.g., [SMT](https://github.com/NeuralNetworkVerification/Marabou), [MILP](https://gurobi-machinelearning.readthedocs.io/en/stable/index.html) solvers etc. They can guarantee that the neural network output respect or not the targeted property, at the cost of significant computation time. They are commonly refered to as 'complete' techniques.
0 commit comments