ABSTRACT
Future autonomous systems will employ sophisticated machine learning techniques for the sensing and perception of the surroundings and the making corresponding decisions for planning, control, and other actions. They often operate in highly dynamic, uncertain and challenging environment, and need to meet stringent timing, resource, and mission requirements. In particular, it is critical and yet very challenging to ensure the safety of these autonomous systems, given the uncertainties of the system inputs, the constant disturbances on the system operations, and the lack of analyzability for many machine learning methods (particularly those based on neural networks). In this paper, we will discuss some of these challenges, and present our work in developing automated, quantitative, and formalized methods and tools for ensuring the safety of autonomous systems in their design and during their runtime adaptation. We argue that it is essential to take a holistic approach in addressing system safety and other safety-related properties, vertically across the functional, software, and hardware layers, and horizontally across the autonomy pipeline of sensing, perception, planning, and control modules. This approach could be further extended from a single autonomous system to a multi-agent system where multiple autonomous agents perform tasks in a collaborative manner. We will use connected and autonomous vehicles (CAVs) as the main application domain to illustrate the importance of such holistic approach and show our initial efforts in this direction.
- R. Banner, I. Hubara, E. Hoffer, and D. Soudry. Scalable methods for 8-bit training of neural networks. In S. Bengio, H. Wallach, H. Larochelle, K. Grauman, N. Cesa-Bianchi, and R. Garnett, editors, Advances in Neural Information Processing Systems, volume 31, pages 5145--5153. Curran Associates, Inc., 2018.Google Scholar
- O. Bastani, Y. Ioannou, L. Lampropoulos, D. Vytiniotis, A. Nori, and A. Criminisi. Measuring neural net robustness with constraints. In Advances in neural information processing systems, pages 2613--2621, 2016.Google Scholar
- C. Buciluă, R. Caruana, and A. Niculescu-Mizil. Model compression. In Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 535--541, 2006.Google ScholarDigital Library
- Z. Cao, E. Bıyık, W. Z. Wang, A. Raventos, A. Gaidon, G. Rosman, and D. Sadigh. Reinforcement learning based control of imitative policies for near-accident driving. arXiv preprint arXiv:2007.00178, 2020.Google Scholar
- G. Chen, W. Choi, X. Yu, T. Han, and M. Chandraker. Learning efficient object detection models with knowledge distillation. In Advances in Neural Information Processing Systems, pages 742--751, 2017.Google Scholar
- Q. A. Chen, Y. Yin, Y. Feng, Z. M. Mao, and H. X. Liu. Exposing congestion attack on emerging connected vehicle based traffic signal control. In NDSS, 2018.Google ScholarCross Ref
- X. Chen, E. Ábrahám, and S. Sankaranarayanan. Flow: An analyzer for nonlinear hybrid systems. In International Conference on Computer Aided Verification, pages 258--263. Springer, 2013.Google ScholarCross Ref
- Y. Chen, D. Zhao, L. Lv, and Q. Zhang. Multi-task learning for dangerous object detection in autonomous driving. Information Sciences, 432:559--571, 2018.Google ScholarCross Ref
- C.-H. Cheng, G. Nührenberg, and H. Ruess. Maximum resilience of artificial neural networks. In International Symposium on Automated Technology for Verification and Analysis, pages 251--268. Springer, 2017.Google ScholarCross Ref
- F. Chollet. Xception: Deep learning with depthwise separable convolutions. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), July 2017.Google ScholarCross Ref
- X. Chu, B. Zhang, and R. Xu. Moga: Searching beyond mobilenetv3. In ICASSP 2020--2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pages 4042--4046. IEEE, 2020.Google ScholarCross Ref
- J. Dai, Y. Li, K. He, and J. Sun. R-fcn: Object detection via region-based fully convolutional networks. In Advances in neural information processing systems, pages 379--387, 2016.Google Scholar
- B. De Brabandere, D. Neven, and L. Van Gool. Semantic instance segmentation for autonomous driving. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pages 7--9, 2017.Google ScholarCross Ref
- M. Denil, B. Shakibi, L. Dinh, M. Ranzato, and N. De Freitas. Predicting parameters in deep learning. In Advances in neural information processing systems, pages 2148--2156, 2013.Google ScholarDigital Library
- S. Dutta, X. Chen, and S. Sankaranarayanan. Reachability analysis for neural feedback systems using regressive polynomial rule inference. In Proceedings of the 22nd ACM International Conference on Hybrid Systems: Computation and Control, pages 157--168, 2019.Google ScholarDigital Library
- S. Dutta, S. Jha, S. Sankaranarayanan, and A. Tiwari. Output range analysis for deep feedforward neural networks. In NASA Formal Methods Symposium, pages 121--138. Springer, 2018.Google ScholarCross Ref
- A. B. Eriksen, C. Huang, J. Kildebogaard, H. Lahrmann, K. G. Larsen, M. Muniz, and J. H. Taankvist. Uppaal stratego for intelligent traffic lights.Google Scholar
- C. Fan, U. Mathur, S. Mitra, and M. Viswanathan. Controller synthesis made real: Reach-avoid specifications and linear dynamics. In H. Chockler and G. Weissenbacher, editors, Computer Aided Verification, pages 347--366, Cham, 2018. Springer International Publishing.Google ScholarCross Ref
- C. Fan, K. Miller, and S. Mitra. Fast and guaranteed safe controller synthesis for nonlinear vehicle models. In S. K. Lahiri and C. Wang, editors, Computer Aided Verification, pages 629--652, Cham, 2020. Springer International Publishing.Google ScholarCross Ref
- J. Fan, C. Huang, W. Li, X. Chen, and Q. Zhu. Towards verification-aware knowledge distillation for neural-network controlled systems. In IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pages 1--8. IEEE, 2019.Google ScholarCross Ref
- J. Fan, C. Huang, W. Li, X. Chen, and Q. Zhu. Reachnn: A tool for reachability analysis ofneural-network controlled systems. In International Symposium on Automated Technology for Verification and Analysis (ATVA), 2020.Google ScholarCross Ref
- M. Fazlyab, M. Morari, and G. J. Pappas. Safety verification and robustness analysis of neural networks via quadratic constraints and semidefinite programming. arXiv preprint arXiv:1903.01287, 2019.Google Scholar
- J. F. Fisac, A. Bajcsy, S. L. Herbert, D. Fridovich-Keil, S. Wang, C. J. Tomlin, and A. D. Dragan. Probabilistically safe robot planning with confidence-based human predictions. arXiv preprint arXiv:1806.00109, 2018.Google Scholar
- M. Fischetti and J. Jo. Deep neural networks as 0--1 mixed integer linear programs: A feasibility study. arXiv preprint arXiv:1712.06174, 2017.Google Scholar
- Y. Gal. Uncertainty in deep learning. University of Cambridge, 1(3), 2016.Google Scholar
- R. Gong, X. Liu, S. Jiang, T. Li, P. Hu, J. Lin, F. Yu, and J. Yan. Differentiable soft quantization: Bridging full-precision and low-bit neural networks. In Proceedings of the IEEE/CVF International Conference on Computer Vision (ICCV), October 2019.Google ScholarCross Ref
- I. J. Goodfellow, J. Shlens, and C. Szegedy. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572, 2014.Google Scholar
- E. Goubault and S. Putot. Forward inner-approximated reachability of nonlinear continuous systems. In Proceedings of the 20th International Conference on Hybrid Systems: Computation and Control, pages 1--10, 2017.Google ScholarDigital Library
- O. Grembek, A. A. Kurzhanskiy, A. Medury, P. Varaiya, and M. Yu. Introducing an intelligent intersection. ITS Reports, 2018(13), 2018.Google Scholar
- S. Han, J. Pool, J. Tran, and W. Dally. Learning both weights and connections for efficient neural network. In Advances in neural information processing systems, pages 1135--1143, 2015.Google ScholarDigital Library
- K. He, G. Gkioxari, P. Dollár, and R. Girshick. Mask r-cnn. In Proceedings of the IEEE international conference on computer vision, pages 2961--2969, 2017.Google ScholarCross Ref
- Y. He, X. Zhang, and J. Sun. Channel pruning for accelerating very deep neural networks. In Proceedings of the IEEE International Conference on Computer Vision, pages 1389--1397, 2017.Google ScholarCross Ref
- S. L. Herbert, M. Chen, S. Han, S. Bansal, J. F. Fisac, and C. J. Tomlin. Fastrack: A modular framework for fast and guaranteed safe motion planning. In 2017 IEEE 56th Annual Conference on Decision and Control (CDC), pages 1517--1522, 2017.Google ScholarCross Ref
- G. Hinton, O. Vinyals, and J. Dean. Distilling the knowledge in a neural network. arXiv preprint arXiv:1503.02531, 2015.Google Scholar
- A. G. Howard, M. Zhu, B. Chen, D. Kalenichenko, W. Wang, T. Weyand, M. Andreetto, and H. Adam. Mobilenets: Efficient convolutional neural networks for mobile vision applications. arXiv preprint arXiv:1704.04861, 2017.Google Scholar
- C.-H. Hsu, S.-H. Chang, J.-H. Liang, H.-P. Chou, C.-H. Liu, S.-C. Chang, J.-Y. Pan, Y.-T. Chen, W. Wei, and D.-C. Juan. Monas: Multi-objective neural architecture search using reinforcement learning. arXiv preprint arXiv:1806.10332, 2018.Google Scholar
- C. Huang, K.-C. Chang, C.-W. Lin, and Q. Zhu. Saw: A tool for safety analysis of weakly-hard systems. 32nd International Conference on Computer-Aided Verification (CAV'20), 2020.Google ScholarCross Ref
- C. Huang, X. Chen, W. Lin, Z. Yang, and X. Li. Probabilistic safety verification of stochastic hybrid systems using barrier certificates. TECS, 16(5s):186, 2017.Google ScholarDigital Library
- C. Huang, X. Chen, E. Tang, M. He, L. Bu, S. Qin, and Y. Zeng. Navigating discrete difference equation governed wmr by virtual linear leader guided hmpc. In 2020 International Conference on Robotics and Automation, 2020.Google ScholarCross Ref
- C. Huang, X. Chen, Y. Zhang, S. Qin, Y. Zeng, and X. Li. Hierarchical model predictive control for multi-robot navigation. In IJCAI, 2016.Google Scholar
- C. Huang, X. Chen, Y. Zhang, S. Qin, Y. Zeng, and X. Li. Switched linear multi-robot navigation using hierarchical model predictive control. In International Joint Conference on Artificial Intelligence 2017, 2017.Google ScholarCross Ref
- C. Huang, J. Fan, X. Chen, W. Li, and Q. Zhu. Divide and slide: Layer-wise refinement for output range analysis of deep neural networks. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 39(11):3323--3335, 2020.Google ScholarCross Ref
- C. Huang, J. Fan, W. Li, X. Chen, and Q. Zhu. Reachnn: Reachability analysis of neural-network controlled systems. ACM Transactions on Embedded Computing Systems (TECS), 18(5s):1--22, 2019.Google Scholar
- C. Huang, W. Li, and Q. Zhu. Formal verification of weakly-hard systems. In the 22nd ACM International Conference on Hybrid Systems: Computation and Control (HSCC), 2019.Google ScholarDigital Library
- C. Huang, S. Xu, Z. Wang, S. Lan, W. Li, and Q. Zhu. Opportunistic intermittent control with safety guarantees for autonomous systems. DAC, 2020.Google ScholarCross Ref
- G. Huang, S. Liu, L. Van der Maaten, and K. Q. Weinberger. Condensenet: An efficient densenet using learned group convolutions. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 2752--2761, 2018.Google Scholar
- Z. Huang, L. Huang, Y. Gong, C. Huang, and X. Wang. Mask scoring r-cnn. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 6409--6418, 2019.Google ScholarCross Ref
- R. Ivanov, J. Weimer, R. Alur, G. J. Pappas, and I. Lee. Verisig: verifying safety properties of hybrid systems with neural network controllers. In Proceedings of the 22nd ACM International Conference on Hybrid Systems: Computation and Control, pages 169--178, 2019.Google ScholarDigital Library
- S. Lan, R. Panda, Q. Zhu, and A. K. Roy-Chowdhury. Ffnet: Video fast-forwarding via reinforcement learning. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 6771--6780, 2018.Google ScholarCross Ref
- S. Lan, Z. Wang, A. K. Roy-Chowdhury, E. Wei, and Q. Zhu. Distributed multi-agent video fast-forwarding. In Proceedings of the 28th ACM International Conference on Multimedia, pages 1075--1084, 2020.Google ScholarDigital Library
- H. Law and J. Deng. Cornernet: Detecting objects as paired keypoints. In Proceedings of the European Conference on Computer Vision (ECCV), pages 734--750, 2018.Google ScholarDigital Library
- Y. LeCun, J. Denker, and S. Solla. Optimal brain damage. Advances in neural information processing systems, 2:598--605, 1989.Google Scholar
- Y. Lee and J. Park. Centermask: Real-time anchor-free instance segmentation. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pages 13906--13915, 2020.Google ScholarCross Ref
- H. Li, A. Kadav, I. Durdanovic, H. Samet, and H. P. Graf. Pruning filters for efficient convnets. arXiv preprint arXiv:1608.08710, 2016.Google Scholar
- Q. Li, S. Jin, and J. Yan. Mimicking very efficient network for object detection. In Proceedings of the ieee conference on computer vision and pattern recognition, pages 6356--6364, 2017.Google ScholarCross Ref
- H. Liang, M. Jagielski, B. Zheng, C.-W. Lin, E. Kang, S. Shiraishi, C. Nita-Rotaru, and Q. Zhu. Network and system level security in connected vehicle applications. In Proceedings of the International Conference on Computer-Aided Design, ICCAD '18, pages 94:1--94:7, New York, NY, USA, 2018. ACM.Google ScholarDigital Library
- H. Liang, Z. Wang, R. Jiao, and Q. Zhu. Leveraging weakly-hard constraints for improving system fault tolerance with functional and timing guarantees. In 2020 IEEE/ACM International Conference On Computer Aided Design (ICCAD), pages 1--9, 2020.Google ScholarDigital Library
- H. Liang, Z. Wang, D. Roy, S. Dey, S. Chakraborty, and Q. Zhu. Security-driven codesign with weakly-hard constraints for real-time embedded systems. In 2019 IEEE 37th International Conference on Computer Design (ICCD), pages 217--226, Nov 2019.Google ScholarCross Ref
- T.-Y. Lin, P. Goyal, R. Girshick, K. He, and P. Dollár. Focal loss for dense object detection. In Proceedings of the IEEE international conference on computer vision, pages 2980--2988, 2017.Google ScholarCross Ref
- X. Lin, C. Zhao, and W. Pan. Towards accurate binary convolutional neural network. In Advances in Neural Information Processing Systems, pages 345--353, 2017.Google ScholarDigital Library
- W. Liu, D. Anguelov, D. Erhan, C. Szegedy, S. Reed, C.-Y. Fu, and A. C. Berg. Ssd: Single shot multibox detector. In European conference on computer vision, pages 21--37. Springer, 2016.Google ScholarCross Ref
- X. Liu, N. Masoud, and Q. Zhu. Impact of sharing driving attitude information: A quantitative study on lane changing. In 2020 IEEE Intelligent Vehicles Symposium (IV), 11 2020.Google ScholarCross Ref
- X. Liu, N. Masoud, Q. Zhu, and A. Khojandi. A markov decision process framework to incorporate network-level data in motion planning for connected and automated vehicles. In Transportation Research Board 100th Annual Meeting, 1 2021.Google Scholar
- X. Liu, G. Zhao, N. Masoud, and Q. Zhu. Trajectory planning for connected and automated vehicles: Cruising and platooning in mixed traffic. In Transportation Research Board 99th Annual Meeting, 1 2020.Google Scholar
- Z. Liu, B. Wu, W. Luo, X. Yang, W. Liu, and K.-T. Cheng. Bi-real net: Enhancing the performance of 1-bit cnns with improved representational capability and advanced training algorithm. In Proceedings of the European Conference on Computer Vision (ECCV), September 2018.Google ScholarCross Ref
- A. Lomuscio and L. Maganti. An approach to reachability analysis for feedforward relu neural networks. arXiv preprint arXiv:1706.07351, 2017.Google Scholar
- A. Loquercio, M. Segu, and D. Scaramuzza. A general framework for uncertainty estimation in deep learning. IEEE Robotics and Automation Letters, 5(2):3153--3160, 2020.Google ScholarCross Ref
- R. Mehta and C. Ozturk. Object detection at 200 frames per second. In Proceedings of the European Conference on Computer Vision (ECCV), pages 0--0, 2018.Google Scholar
- P. Panda, A. Sengupta, and K. Roy. Conditional deep learning for energy-efficient and enhanced pattern recognition. In 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE), pages 475--480. IEEE, 2016.Google Scholar
- S. Prajna and A. Jadbabaie. Safety verification of hybrid systems using barrier certificates. In HSCC, pages 477--492. Springer, 2004.Google ScholarCross Ref
- A. Raghunathan, J. Steinhardt, and P. S. Liang. Semidefinite relaxations for certifying robustness to adversarial examples. In Advances in Neural Information Processing Systems, pages 10877--10887, 2018.Google Scholar
- S. Ramakrishna, C. Harstell, M. P. Burruss, G. Karsai, and A. Dubey. Dynamic-weighted simplex strategy for learning enabled cyber physical systems. Journal of Systems Architecture, page 101760, 2020.Google Scholar
- M. Rastegari, V. Ordonez, J. Redmon, and A. Farhadi. Xnor-net: Imagenet classification using binary convolutional neural networks. In European conference on computer vision, pages 525--542. Springer, 2016.Google ScholarCross Ref
- J. Redmon, S. Divvala, R. Girshick, and A. Farhadi. You only look once: Unified, real-time object detection. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 779--788, 2016.Google ScholarCross Ref
- S. Ren, K. He, R. Girshick, and J. Sun. Faster r-cnn: Towards real-time object detection with region proposal networks. In Advances in neural information processing systems, pages 91--99, 2015.Google ScholarDigital Library
- M. Sandler, A. Howard, M. Zhu, A. Zhmoginov, and L.-C. Chen. Mobilenetv2: Inverted residuals and linear bottlenecks. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 4510--4520, 2018.Google ScholarCross Ref
- D. Seto, B. Krogh, L. Sha, and A. Chutinan. The simplex architecture for safe online control system upgrades. In Proceedings of the 1998 American Control Conference. ACC (IEEE Cat. No. 98CH36207), volume 6, pages 3504--3508. IEEE, 1998.Google ScholarCross Ref
- G. Sharon and P. Stone. A protocol for mixed autonomous and human-operated vehicles at intersections. In International Conference on Autonomous Agents and Multiagent Systems, pages 151--167. Springer, 2017.Google ScholarCross Ref
- G. Singh, T. Gehr, M. Mirman, M. Püschel, and M. Vechev. Fast and effective robustness certification. In Advances in Neural Information Processing Systems, pages 10802--10813, 2018.Google ScholarDigital Library
- S. Singh, M. Chen, S. L. Herbert, C. J. Tomlin, and M. Pavone. Robust tracking with model mismatch for fast and safe planning: An sos optimization approach. In M. Morales, L. Tapia, G. Sánchez-Ante, and S. Hutchinson, editors, Algorithmic Foundations of Robotics XIII, pages 545--564, Cham, 2020. Springer International Publishing.Google ScholarCross Ref
- S. Srinivas and R. V. Babu. Data-free parameter pruning for deep neural networks. arXiv preprint arXiv:1507.06149, 2015.Google Scholar
- C. Szegedy, W. Zaremba, I. Sutskever, J. Bruna, D. Erhan, I. Goodfellow, and R. Fergus. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199, 2013.Google Scholar
- M. Tan and Q. V. Le. Efficientnet: Rethinking model scaling for convolutional neural networks. arXiv preprint arXiv:1905.11946, 2019.Google Scholar
- S. Teerapittayanon, B. McDanel, and H.-T. Kung. Branchynet: Fast inference via early exiting from deep neural networks. In 2016 23rd International Conference on Pattern Recognition (ICPR), pages 2464--2469. IEEE, 2016.Google ScholarCross Ref
- B. Tian, X. Deng, Z. Xu, Y. Zhang, and X. Zhao. Modeling and numerical analysis on communication delay boundary for cacc string stability. IEEE Access, 7:168870--168884, 2019.Google ScholarCross Ref
- Z. Tian, C. Shen, H. Chen, and T. He. Fcos: Fully convolutional one-stage object detection. In Proceedings of the IEEE international conference on computer vision, pages 9627--9636, 2019.Google ScholarCross Ref
- V. Tjeng, K. Xiao, and R. Tedrake. Evaluating robustness of neural networks with mixed integer programming. International Conference on Learning Representations, 2019.Google Scholar
- H.-D. Tran, S. Bak, W. Xiang, and T. T. Johnson. Verification of deep convolutional neural networks using imagestars. International conference on Computer-Aided Verification, 2020.Google ScholarCross Ref
- H.-D. Tran, X. Yang, D. M. Lopez, P. Musau, L. V. Nguyen, W. Xiang, S. Bak, and T. T. Johnson. NNV: The neural network verification tool for deep neural networks and learning-enabled cyber-physical systems. In 32nd International Conference on Computer-Aided Verification (CAV), July 2020.Google ScholarCross Ref
- W. Wang, W. Hong, F. Wang, and J. Yu. Gan-knowledge distillation for one-stage object detection. IEEE Access, 8:60719--60727, 2020.Google ScholarCross Ref
- X. Wang, M. Kan, S. Shan, and X. Chen. Fully learnable group convolution for acceleration of deep neural networks. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), June 2019.Google ScholarCross Ref
- Y. Wang, C. Huang, and Q. Zhu. Energy-efficient control adaptation with safety guarantees for learning-enabled cyber-physical systems. In 2020 IEEE/ACM International Conference On Computer Aided Design (ICCAD), pages 1--9. IEEE, 2020.Google ScholarDigital Library
- Z. Wang, H. Liang, C. Huang, and Q. Zhu. Cross-layer design of automotive systems. IEEE Design Test, pages 1--1, 2020.Google ScholarCross Ref
- Z. Wang, G. Wu, and M. J. Barth. A review on cooperative adaptive cruise control (cacc) systems: Architectures, controls, and applications. In 2018 21st International Conference on Intelligent Transportation Systems (ITSC), pages 2884--2891. IEEE, 2018.Google ScholarDigital Library
- B. Wu, F. Iandola, P. H. Jin, and K. Keutzer. Squeezedet: Unified, small, low power fully convolutional neural networks for real-time object detection for autonomous driving. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pages 129--137, 2017.Google ScholarCross Ref
- S. Xu, S. Lan, and Z. Qi. Maskplus: Improving mask generation for instance segmentation. In Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision (WACV), March 2020.Google ScholarCross Ref
- Z. Yang, C. Huang, X. Chen, W. Lin, and Z. Liu. A linear programming relaxation based approach for generating barrier certificates of hybrid systems. In FM, pages 721--738. Springer, 2016.Google ScholarCross Ref
- Y. Yao, L. Rao, X. Liu, and X. Zhou. Delay analysis and study of ieee 802.11p based dsrc safety communication in a highway environment. In 2013 Proceedings IEEE INFOCOM, pages 1591--1599, 2013.Google ScholarCross Ref
- W. Yawen, W. Zhepeng, J. Zhenge, S. Yiyu, and H. Jingtong. Intermittent inference with nonuniformly compressed multi-exit neural network for energy harvesting powered devices. arXiv preprint arXiv:2004.11293, 2020.Google Scholar
- F. Yu and V. Koltun. Multi-scale context aggregation by dilated convolutions. arXiv preprint arXiv:1511.07122, 2015.Google Scholar
- D. Zhang, J. Yang, D. Ye, and G. Hua. Lq-nets: Learned quantization for highly accurate and compact deep neural networks. In Proceedings of the European Conference on Computer Vision (ECCV), September 2018.Google ScholarCross Ref
- X. Zhang, X. Zhou, M. Lin, and J. Sun. Shufflenet: An extremely efficient convolutional neural network for mobile devices. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 6848--6856, 2018.Google ScholarCross Ref
- Z. Zhang, S. Fidler, and R. Urtasun. Instance-level segmentation for autonomous driving with deep densely connected mrfs. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 669--677, 2016.Google ScholarCross Ref
- B. Zheng, Y. Gao, Q. Zhu, and S. Gupta. Analysis and Optimization of Soft Error Tolerance Strategies for Real-Time Systems. In 2015 International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS), pages 55--64, October 2015.Google Scholar
- B. Zheng, C. W. Lin, H. Liang, S. Shiraishi, W. Li, and Q. Zhu. Delay-aware design, analysis and verification of intelligent intersection management. In 2017 IEEE International Conference on Smart Computing (SMARTCOMP), pages 1--8, May 2017.Google ScholarCross Ref
- B. Zheng, C.-W. Lin, S. Shiraishi, and Q. Zhu. Design and analysis of delay-tolerant intelligent intersection management. ACM Transactions on Cyber-Physical Systems, 4(1):1--27, 2019.Google ScholarDigital Library
- B. Zheng, C.-W. Lin, H. Yu, H. Liang, and Q. Zhu. CONVINCE: A Cross-Layer Modeling, Exploration and Validation Framework for Next-generation Connected Vehicles. In Computer-Aided Design (ICCAD), 2016 IEEE/ACM International Conference on, November 2016.Google Scholar
- B. Zheng, M. O. Sayin, C. W. Lin, S. Shiraishi, and Q. Zhu. Timing and security analysis of vanet-based intelligent transportation systems: (invited paper). In 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pages 984--991, Nov 2017.Google ScholarCross Ref
- Q. Zhu, W. Li, H. Kim, Y. Xiang, K. Wardega, Z. Wang, Y. Wang, H. Liang, C. Huang, J. Fan, and H. Choi. Know the unknowns: Addressing disturbances and uncertainties in autonomous systems: Invited paper. In 2020 IEEE/ACM International Conference On Computer Aided Design (ICCAD), pages 1--9, 2020.Google Scholar
Index Terms
- Safety-Assured Design and Adaptation of Learning-Enabled Autonomous Systems
Recommendations
Energy-efficient control adaptation with safety guarantees for learning-enabled cyber-physical systems
ICCAD '20: Proceedings of the 39th International Conference on Computer-Aided DesignNeural networks have been increasingly applied to control in learning-enabled cyber-physical systems (LE-CPSs) and demonstrated great promises in improving system performance and efficiency, as well as reducing the need for complex physical models. ...
Semantically Enabled Communication Framework for Autonomous Systems
Multi-agent systems MAS have recently gained much fame and have proved to be a potential technology that enables the construction and development of collaborative intelligent software systems. Development of such autonomous intelligent systems require a ...
Comments