close this message

Donate to arXiv

Please join the Simons Foundation and our generous member organizations in supporting arXiv during our giving campaign September 23-27. 100% of your contribution will fund improvements and new initiatives to benefit arXiv's global scientific community.

DONATE

[secure site, no need to create account]

Skip to main content
Cornell University
We gratefully acknowledge support from
the Simons Foundation and member institutions.
arXiv.org > cs > arXiv:1906.10395

Help | Advanced Search

arXiv
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Computer Science > Cryptography and Security

arXiv:1906.10395 (cs)
[Submitted on 25 Jun 2019]

Title:Quantitative Verification of Neural Networks And its Security Applications

Authors:Teodora Baluta, Shiqi Shen, Shweta Shinde, Kuldeep S. Meel, Prateek Saxena
Download PDF
Abstract: Neural networks are increasingly employed in safety-critical domains. This has prompted interest in verifying or certifying logically encoded properties of neural networks. Prior work has largely focused on checking existential properties, wherein the goal is to check whether there exists any input that violates a given property of interest. However, neural network training is a stochastic process, and many questions arising in their analysis require probabilistic and quantitative reasoning, i.e., estimating how many inputs satisfy a given property. To this end, our paper proposes a novel and principled framework to quantitative verification of logical properties specified over neural networks. Our framework is the first to provide PAC-style soundness guarantees, in that its quantitative estimates are within a controllable and bounded error from the true count. We instantiate our algorithmic framework by building a prototype tool called NPAQ that enables checking rich properties over binarized neural networks. We show how emerging security analyses can utilize our framework in 3 concrete point applications: quantifying robustness to adversarial inputs, efficacy of trojan attacks, and fairness/bias of given neural networks.
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Logic in Computer Science (cs.LO)
Cite as: arXiv:1906.10395 [cs.CR]
  (or arXiv:1906.10395v1 [cs.CR] for this version)

Submission history

From: Teodora Baluta [view email]
[v1] Tue, 25 Jun 2019 09:08:03 UTC (272 KB)
Full-text links:

Download:

  • PDF
  • Other formats
(license)
Current browse context:
cs.CR
< prev   |   next >
new | recent | 1906
Change to browse by:
cs
cs.AI
cs.LG
cs.LO

References & Citations

  • NASA ADS
  • Google Scholar
  • Semantic Scholar

DBLP - CS Bibliography

listing | bibtex
Teodora Baluta
Shiqi Shen
Shweta Shinde
Kuldeep S. Meel
Prateek Saxena

Bookmark

BibSonomy logo Mendeley logo Reddit logo ScienceWISE logo
Which authors of this paper are endorsers? | Disable MathJax (What is MathJax?) Browse v0.3.2.5 released 2020-07-27   
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack