skip to main content
10.1145/3394885.3431623acmconferencesArticle/Chapter ViewAbstractPublication PagesaspdacConference Proceedingsconference-collections
research-article
Public Access

Safety-Assured Design and Adaptation of Learning-Enabled Autonomous Systems

Authors Info & Claims
Published:29 January 2021Publication History

ABSTRACT

Future autonomous systems will employ sophisticated machine learning techniques for the sensing and perception of the surroundings and the making corresponding decisions for planning, control, and other actions. They often operate in highly dynamic, uncertain and challenging environment, and need to meet stringent timing, resource, and mission requirements. In particular, it is critical and yet very challenging to ensure the safety of these autonomous systems, given the uncertainties of the system inputs, the constant disturbances on the system operations, and the lack of analyzability for many machine learning methods (particularly those based on neural networks). In this paper, we will discuss some of these challenges, and present our work in developing automated, quantitative, and formalized methods and tools for ensuring the safety of autonomous systems in their design and during their runtime adaptation. We argue that it is essential to take a holistic approach in addressing system safety and other safety-related properties, vertically across the functional, software, and hardware layers, and horizontally across the autonomy pipeline of sensing, perception, planning, and control modules. This approach could be further extended from a single autonomous system to a multi-agent system where multiple autonomous agents perform tasks in a collaborative manner. We will use connected and autonomous vehicles (CAVs) as the main application domain to illustrate the importance of such holistic approach and show our initial efforts in this direction.

References

  1. R. Banner, I. Hubara, E. Hoffer, and D. Soudry. Scalable methods for 8-bit training of neural networks. In S. Bengio, H. Wallach, H. Larochelle, K. Grauman, N. Cesa-Bianchi, and R. Garnett, editors, Advances in Neural Information Processing Systems, volume 31, pages 5145--5153. Curran Associates, Inc., 2018.Google ScholarGoogle Scholar
  2. O. Bastani, Y. Ioannou, L. Lampropoulos, D. Vytiniotis, A. Nori, and A. Criminisi. Measuring neural net robustness with constraints. In Advances in neural information processing systems, pages 2613--2621, 2016.Google ScholarGoogle Scholar
  3. C. Buciluă, R. Caruana, and A. Niculescu-Mizil. Model compression. In Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 535--541, 2006.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Z. Cao, E. Bıyık, W. Z. Wang, A. Raventos, A. Gaidon, G. Rosman, and D. Sadigh. Reinforcement learning based control of imitative policies for near-accident driving. arXiv preprint arXiv:2007.00178, 2020.Google ScholarGoogle Scholar
  5. G. Chen, W. Choi, X. Yu, T. Han, and M. Chandraker. Learning efficient object detection models with knowledge distillation. In Advances in Neural Information Processing Systems, pages 742--751, 2017.Google ScholarGoogle Scholar
  6. Q. A. Chen, Y. Yin, Y. Feng, Z. M. Mao, and H. X. Liu. Exposing congestion attack on emerging connected vehicle based traffic signal control. In NDSS, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  7. X. Chen, E. Ábrahám, and S. Sankaranarayanan. Flow: An analyzer for nonlinear hybrid systems. In International Conference on Computer Aided Verification, pages 258--263. Springer, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  8. Y. Chen, D. Zhao, L. Lv, and Q. Zhang. Multi-task learning for dangerous object detection in autonomous driving. Information Sciences, 432:559--571, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  9. C.-H. Cheng, G. Nührenberg, and H. Ruess. Maximum resilience of artificial neural networks. In International Symposium on Automated Technology for Verification and Analysis, pages 251--268. Springer, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  10. F. Chollet. Xception: Deep learning with depthwise separable convolutions. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), July 2017.Google ScholarGoogle ScholarCross RefCross Ref
  11. X. Chu, B. Zhang, and R. Xu. Moga: Searching beyond mobilenetv3. In ICASSP 2020--2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pages 4042--4046. IEEE, 2020.Google ScholarGoogle ScholarCross RefCross Ref
  12. J. Dai, Y. Li, K. He, and J. Sun. R-fcn: Object detection via region-based fully convolutional networks. In Advances in neural information processing systems, pages 379--387, 2016.Google ScholarGoogle Scholar
  13. B. De Brabandere, D. Neven, and L. Van Gool. Semantic instance segmentation for autonomous driving. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pages 7--9, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  14. M. Denil, B. Shakibi, L. Dinh, M. Ranzato, and N. De Freitas. Predicting parameters in deep learning. In Advances in neural information processing systems, pages 2148--2156, 2013.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. S. Dutta, X. Chen, and S. Sankaranarayanan. Reachability analysis for neural feedback systems using regressive polynomial rule inference. In Proceedings of the 22nd ACM International Conference on Hybrid Systems: Computation and Control, pages 157--168, 2019.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. S. Dutta, S. Jha, S. Sankaranarayanan, and A. Tiwari. Output range analysis for deep feedforward neural networks. In NASA Formal Methods Symposium, pages 121--138. Springer, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  17. A. B. Eriksen, C. Huang, J. Kildebogaard, H. Lahrmann, K. G. Larsen, M. Muniz, and J. H. Taankvist. Uppaal stratego for intelligent traffic lights.Google ScholarGoogle Scholar
  18. C. Fan, U. Mathur, S. Mitra, and M. Viswanathan. Controller synthesis made real: Reach-avoid specifications and linear dynamics. In H. Chockler and G. Weissenbacher, editors, Computer Aided Verification, pages 347--366, Cham, 2018. Springer International Publishing.Google ScholarGoogle ScholarCross RefCross Ref
  19. C. Fan, K. Miller, and S. Mitra. Fast and guaranteed safe controller synthesis for nonlinear vehicle models. In S. K. Lahiri and C. Wang, editors, Computer Aided Verification, pages 629--652, Cham, 2020. Springer International Publishing.Google ScholarGoogle ScholarCross RefCross Ref
  20. J. Fan, C. Huang, W. Li, X. Chen, and Q. Zhu. Towards verification-aware knowledge distillation for neural-network controlled systems. In IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pages 1--8. IEEE, 2019.Google ScholarGoogle ScholarCross RefCross Ref
  21. J. Fan, C. Huang, W. Li, X. Chen, and Q. Zhu. Reachnn: A tool for reachability analysis ofneural-network controlled systems. In International Symposium on Automated Technology for Verification and Analysis (ATVA), 2020.Google ScholarGoogle ScholarCross RefCross Ref
  22. M. Fazlyab, M. Morari, and G. J. Pappas. Safety verification and robustness analysis of neural networks via quadratic constraints and semidefinite programming. arXiv preprint arXiv:1903.01287, 2019.Google ScholarGoogle Scholar
  23. J. F. Fisac, A. Bajcsy, S. L. Herbert, D. Fridovich-Keil, S. Wang, C. J. Tomlin, and A. D. Dragan. Probabilistically safe robot planning with confidence-based human predictions. arXiv preprint arXiv:1806.00109, 2018.Google ScholarGoogle Scholar
  24. M. Fischetti and J. Jo. Deep neural networks as 0--1 mixed integer linear programs: A feasibility study. arXiv preprint arXiv:1712.06174, 2017.Google ScholarGoogle Scholar
  25. Y. Gal. Uncertainty in deep learning. University of Cambridge, 1(3), 2016.Google ScholarGoogle Scholar
  26. R. Gong, X. Liu, S. Jiang, T. Li, P. Hu, J. Lin, F. Yu, and J. Yan. Differentiable soft quantization: Bridging full-precision and low-bit neural networks. In Proceedings of the IEEE/CVF International Conference on Computer Vision (ICCV), October 2019.Google ScholarGoogle ScholarCross RefCross Ref
  27. I. J. Goodfellow, J. Shlens, and C. Szegedy. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572, 2014.Google ScholarGoogle Scholar
  28. E. Goubault and S. Putot. Forward inner-approximated reachability of nonlinear continuous systems. In Proceedings of the 20th International Conference on Hybrid Systems: Computation and Control, pages 1--10, 2017.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. O. Grembek, A. A. Kurzhanskiy, A. Medury, P. Varaiya, and M. Yu. Introducing an intelligent intersection. ITS Reports, 2018(13), 2018.Google ScholarGoogle Scholar
  30. S. Han, J. Pool, J. Tran, and W. Dally. Learning both weights and connections for efficient neural network. In Advances in neural information processing systems, pages 1135--1143, 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. K. He, G. Gkioxari, P. Dollár, and R. Girshick. Mask r-cnn. In Proceedings of the IEEE international conference on computer vision, pages 2961--2969, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  32. Y. He, X. Zhang, and J. Sun. Channel pruning for accelerating very deep neural networks. In Proceedings of the IEEE International Conference on Computer Vision, pages 1389--1397, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  33. S. L. Herbert, M. Chen, S. Han, S. Bansal, J. F. Fisac, and C. J. Tomlin. Fastrack: A modular framework for fast and guaranteed safe motion planning. In 2017 IEEE 56th Annual Conference on Decision and Control (CDC), pages 1517--1522, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  34. G. Hinton, O. Vinyals, and J. Dean. Distilling the knowledge in a neural network. arXiv preprint arXiv:1503.02531, 2015.Google ScholarGoogle Scholar
  35. A. G. Howard, M. Zhu, B. Chen, D. Kalenichenko, W. Wang, T. Weyand, M. Andreetto, and H. Adam. Mobilenets: Efficient convolutional neural networks for mobile vision applications. arXiv preprint arXiv:1704.04861, 2017.Google ScholarGoogle Scholar
  36. C.-H. Hsu, S.-H. Chang, J.-H. Liang, H.-P. Chou, C.-H. Liu, S.-C. Chang, J.-Y. Pan, Y.-T. Chen, W. Wei, and D.-C. Juan. Monas: Multi-objective neural architecture search using reinforcement learning. arXiv preprint arXiv:1806.10332, 2018.Google ScholarGoogle Scholar
  37. C. Huang, K.-C. Chang, C.-W. Lin, and Q. Zhu. Saw: A tool for safety analysis of weakly-hard systems. 32nd International Conference on Computer-Aided Verification (CAV'20), 2020.Google ScholarGoogle ScholarCross RefCross Ref
  38. C. Huang, X. Chen, W. Lin, Z. Yang, and X. Li. Probabilistic safety verification of stochastic hybrid systems using barrier certificates. TECS, 16(5s):186, 2017.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. C. Huang, X. Chen, E. Tang, M. He, L. Bu, S. Qin, and Y. Zeng. Navigating discrete difference equation governed wmr by virtual linear leader guided hmpc. In 2020 International Conference on Robotics and Automation, 2020.Google ScholarGoogle ScholarCross RefCross Ref
  40. C. Huang, X. Chen, Y. Zhang, S. Qin, Y. Zeng, and X. Li. Hierarchical model predictive control for multi-robot navigation. In IJCAI, 2016.Google ScholarGoogle Scholar
  41. C. Huang, X. Chen, Y. Zhang, S. Qin, Y. Zeng, and X. Li. Switched linear multi-robot navigation using hierarchical model predictive control. In International Joint Conference on Artificial Intelligence 2017, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  42. C. Huang, J. Fan, X. Chen, W. Li, and Q. Zhu. Divide and slide: Layer-wise refinement for output range analysis of deep neural networks. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 39(11):3323--3335, 2020.Google ScholarGoogle ScholarCross RefCross Ref
  43. C. Huang, J. Fan, W. Li, X. Chen, and Q. Zhu. Reachnn: Reachability analysis of neural-network controlled systems. ACM Transactions on Embedded Computing Systems (TECS), 18(5s):1--22, 2019.Google ScholarGoogle Scholar
  44. C. Huang, W. Li, and Q. Zhu. Formal verification of weakly-hard systems. In the 22nd ACM International Conference on Hybrid Systems: Computation and Control (HSCC), 2019.Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. C. Huang, S. Xu, Z. Wang, S. Lan, W. Li, and Q. Zhu. Opportunistic intermittent control with safety guarantees for autonomous systems. DAC, 2020.Google ScholarGoogle ScholarCross RefCross Ref
  46. G. Huang, S. Liu, L. Van der Maaten, and K. Q. Weinberger. Condensenet: An efficient densenet using learned group convolutions. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 2752--2761, 2018.Google ScholarGoogle Scholar
  47. Z. Huang, L. Huang, Y. Gong, C. Huang, and X. Wang. Mask scoring r-cnn. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 6409--6418, 2019.Google ScholarGoogle ScholarCross RefCross Ref
  48. R. Ivanov, J. Weimer, R. Alur, G. J. Pappas, and I. Lee. Verisig: verifying safety properties of hybrid systems with neural network controllers. In Proceedings of the 22nd ACM International Conference on Hybrid Systems: Computation and Control, pages 169--178, 2019.Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. S. Lan, R. Panda, Q. Zhu, and A. K. Roy-Chowdhury. Ffnet: Video fast-forwarding via reinforcement learning. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 6771--6780, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  50. S. Lan, Z. Wang, A. K. Roy-Chowdhury, E. Wei, and Q. Zhu. Distributed multi-agent video fast-forwarding. In Proceedings of the 28th ACM International Conference on Multimedia, pages 1075--1084, 2020.Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. H. Law and J. Deng. Cornernet: Detecting objects as paired keypoints. In Proceedings of the European Conference on Computer Vision (ECCV), pages 734--750, 2018.Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Y. LeCun, J. Denker, and S. Solla. Optimal brain damage. Advances in neural information processing systems, 2:598--605, 1989.Google ScholarGoogle Scholar
  53. Y. Lee and J. Park. Centermask: Real-time anchor-free instance segmentation. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pages 13906--13915, 2020.Google ScholarGoogle ScholarCross RefCross Ref
  54. H. Li, A. Kadav, I. Durdanovic, H. Samet, and H. P. Graf. Pruning filters for efficient convnets. arXiv preprint arXiv:1608.08710, 2016.Google ScholarGoogle Scholar
  55. Q. Li, S. Jin, and J. Yan. Mimicking very efficient network for object detection. In Proceedings of the ieee conference on computer vision and pattern recognition, pages 6356--6364, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  56. H. Liang, M. Jagielski, B. Zheng, C.-W. Lin, E. Kang, S. Shiraishi, C. Nita-Rotaru, and Q. Zhu. Network and system level security in connected vehicle applications. In Proceedings of the International Conference on Computer-Aided Design, ICCAD '18, pages 94:1--94:7, New York, NY, USA, 2018. ACM.Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. H. Liang, Z. Wang, R. Jiao, and Q. Zhu. Leveraging weakly-hard constraints for improving system fault tolerance with functional and timing guarantees. In 2020 IEEE/ACM International Conference On Computer Aided Design (ICCAD), pages 1--9, 2020.Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. H. Liang, Z. Wang, D. Roy, S. Dey, S. Chakraborty, and Q. Zhu. Security-driven codesign with weakly-hard constraints for real-time embedded systems. In 2019 IEEE 37th International Conference on Computer Design (ICCD), pages 217--226, Nov 2019.Google ScholarGoogle ScholarCross RefCross Ref
  59. T.-Y. Lin, P. Goyal, R. Girshick, K. He, and P. Dollár. Focal loss for dense object detection. In Proceedings of the IEEE international conference on computer vision, pages 2980--2988, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  60. X. Lin, C. Zhao, and W. Pan. Towards accurate binary convolutional neural network. In Advances in Neural Information Processing Systems, pages 345--353, 2017.Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. W. Liu, D. Anguelov, D. Erhan, C. Szegedy, S. Reed, C.-Y. Fu, and A. C. Berg. Ssd: Single shot multibox detector. In European conference on computer vision, pages 21--37. Springer, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  62. X. Liu, N. Masoud, and Q. Zhu. Impact of sharing driving attitude information: A quantitative study on lane changing. In 2020 IEEE Intelligent Vehicles Symposium (IV), 11 2020.Google ScholarGoogle ScholarCross RefCross Ref
  63. X. Liu, N. Masoud, Q. Zhu, and A. Khojandi. A markov decision process framework to incorporate network-level data in motion planning for connected and automated vehicles. In Transportation Research Board 100th Annual Meeting, 1 2021.Google ScholarGoogle Scholar
  64. X. Liu, G. Zhao, N. Masoud, and Q. Zhu. Trajectory planning for connected and automated vehicles: Cruising and platooning in mixed traffic. In Transportation Research Board 99th Annual Meeting, 1 2020.Google ScholarGoogle Scholar
  65. Z. Liu, B. Wu, W. Luo, X. Yang, W. Liu, and K.-T. Cheng. Bi-real net: Enhancing the performance of 1-bit cnns with improved representational capability and advanced training algorithm. In Proceedings of the European Conference on Computer Vision (ECCV), September 2018.Google ScholarGoogle ScholarCross RefCross Ref
  66. A. Lomuscio and L. Maganti. An approach to reachability analysis for feedforward relu neural networks. arXiv preprint arXiv:1706.07351, 2017.Google ScholarGoogle Scholar
  67. A. Loquercio, M. Segu, and D. Scaramuzza. A general framework for uncertainty estimation in deep learning. IEEE Robotics and Automation Letters, 5(2):3153--3160, 2020.Google ScholarGoogle ScholarCross RefCross Ref
  68. R. Mehta and C. Ozturk. Object detection at 200 frames per second. In Proceedings of the European Conference on Computer Vision (ECCV), pages 0--0, 2018.Google ScholarGoogle Scholar
  69. P. Panda, A. Sengupta, and K. Roy. Conditional deep learning for energy-efficient and enhanced pattern recognition. In 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE), pages 475--480. IEEE, 2016.Google ScholarGoogle Scholar
  70. S. Prajna and A. Jadbabaie. Safety verification of hybrid systems using barrier certificates. In HSCC, pages 477--492. Springer, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  71. A. Raghunathan, J. Steinhardt, and P. S. Liang. Semidefinite relaxations for certifying robustness to adversarial examples. In Advances in Neural Information Processing Systems, pages 10877--10887, 2018.Google ScholarGoogle Scholar
  72. S. Ramakrishna, C. Harstell, M. P. Burruss, G. Karsai, and A. Dubey. Dynamic-weighted simplex strategy for learning enabled cyber physical systems. Journal of Systems Architecture, page 101760, 2020.Google ScholarGoogle Scholar
  73. M. Rastegari, V. Ordonez, J. Redmon, and A. Farhadi. Xnor-net: Imagenet classification using binary convolutional neural networks. In European conference on computer vision, pages 525--542. Springer, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  74. J. Redmon, S. Divvala, R. Girshick, and A. Farhadi. You only look once: Unified, real-time object detection. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 779--788, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  75. S. Ren, K. He, R. Girshick, and J. Sun. Faster r-cnn: Towards real-time object detection with region proposal networks. In Advances in neural information processing systems, pages 91--99, 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  76. M. Sandler, A. Howard, M. Zhu, A. Zhmoginov, and L.-C. Chen. Mobilenetv2: Inverted residuals and linear bottlenecks. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 4510--4520, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  77. D. Seto, B. Krogh, L. Sha, and A. Chutinan. The simplex architecture for safe online control system upgrades. In Proceedings of the 1998 American Control Conference. ACC (IEEE Cat. No. 98CH36207), volume 6, pages 3504--3508. IEEE, 1998.Google ScholarGoogle ScholarCross RefCross Ref
  78. G. Sharon and P. Stone. A protocol for mixed autonomous and human-operated vehicles at intersections. In International Conference on Autonomous Agents and Multiagent Systems, pages 151--167. Springer, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  79. G. Singh, T. Gehr, M. Mirman, M. Püschel, and M. Vechev. Fast and effective robustness certification. In Advances in Neural Information Processing Systems, pages 10802--10813, 2018.Google ScholarGoogle ScholarDigital LibraryDigital Library
  80. S. Singh, M. Chen, S. L. Herbert, C. J. Tomlin, and M. Pavone. Robust tracking with model mismatch for fast and safe planning: An sos optimization approach. In M. Morales, L. Tapia, G. Sánchez-Ante, and S. Hutchinson, editors, Algorithmic Foundations of Robotics XIII, pages 545--564, Cham, 2020. Springer International Publishing.Google ScholarGoogle ScholarCross RefCross Ref
  81. S. Srinivas and R. V. Babu. Data-free parameter pruning for deep neural networks. arXiv preprint arXiv:1507.06149, 2015.Google ScholarGoogle Scholar
  82. C. Szegedy, W. Zaremba, I. Sutskever, J. Bruna, D. Erhan, I. Goodfellow, and R. Fergus. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199, 2013.Google ScholarGoogle Scholar
  83. M. Tan and Q. V. Le. Efficientnet: Rethinking model scaling for convolutional neural networks. arXiv preprint arXiv:1905.11946, 2019.Google ScholarGoogle Scholar
  84. S. Teerapittayanon, B. McDanel, and H.-T. Kung. Branchynet: Fast inference via early exiting from deep neural networks. In 2016 23rd International Conference on Pattern Recognition (ICPR), pages 2464--2469. IEEE, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  85. B. Tian, X. Deng, Z. Xu, Y. Zhang, and X. Zhao. Modeling and numerical analysis on communication delay boundary for cacc string stability. IEEE Access, 7:168870--168884, 2019.Google ScholarGoogle ScholarCross RefCross Ref
  86. Z. Tian, C. Shen, H. Chen, and T. He. Fcos: Fully convolutional one-stage object detection. In Proceedings of the IEEE international conference on computer vision, pages 9627--9636, 2019.Google ScholarGoogle ScholarCross RefCross Ref
  87. V. Tjeng, K. Xiao, and R. Tedrake. Evaluating robustness of neural networks with mixed integer programming. International Conference on Learning Representations, 2019.Google ScholarGoogle Scholar
  88. H.-D. Tran, S. Bak, W. Xiang, and T. T. Johnson. Verification of deep convolutional neural networks using imagestars. International conference on Computer-Aided Verification, 2020.Google ScholarGoogle ScholarCross RefCross Ref
  89. H.-D. Tran, X. Yang, D. M. Lopez, P. Musau, L. V. Nguyen, W. Xiang, S. Bak, and T. T. Johnson. NNV: The neural network verification tool for deep neural networks and learning-enabled cyber-physical systems. In 32nd International Conference on Computer-Aided Verification (CAV), July 2020.Google ScholarGoogle ScholarCross RefCross Ref
  90. W. Wang, W. Hong, F. Wang, and J. Yu. Gan-knowledge distillation for one-stage object detection. IEEE Access, 8:60719--60727, 2020.Google ScholarGoogle ScholarCross RefCross Ref
  91. X. Wang, M. Kan, S. Shan, and X. Chen. Fully learnable group convolution for acceleration of deep neural networks. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), June 2019.Google ScholarGoogle ScholarCross RefCross Ref
  92. Y. Wang, C. Huang, and Q. Zhu. Energy-efficient control adaptation with safety guarantees for learning-enabled cyber-physical systems. In 2020 IEEE/ACM International Conference On Computer Aided Design (ICCAD), pages 1--9. IEEE, 2020.Google ScholarGoogle ScholarDigital LibraryDigital Library
  93. Z. Wang, H. Liang, C. Huang, and Q. Zhu. Cross-layer design of automotive systems. IEEE Design Test, pages 1--1, 2020.Google ScholarGoogle ScholarCross RefCross Ref
  94. Z. Wang, G. Wu, and M. J. Barth. A review on cooperative adaptive cruise control (cacc) systems: Architectures, controls, and applications. In 2018 21st International Conference on Intelligent Transportation Systems (ITSC), pages 2884--2891. IEEE, 2018.Google ScholarGoogle ScholarDigital LibraryDigital Library
  95. B. Wu, F. Iandola, P. H. Jin, and K. Keutzer. Squeezedet: Unified, small, low power fully convolutional neural networks for real-time object detection for autonomous driving. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pages 129--137, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  96. S. Xu, S. Lan, and Z. Qi. Maskplus: Improving mask generation for instance segmentation. In Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision (WACV), March 2020.Google ScholarGoogle ScholarCross RefCross Ref
  97. Z. Yang, C. Huang, X. Chen, W. Lin, and Z. Liu. A linear programming relaxation based approach for generating barrier certificates of hybrid systems. In FM, pages 721--738. Springer, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  98. Y. Yao, L. Rao, X. Liu, and X. Zhou. Delay analysis and study of ieee 802.11p based dsrc safety communication in a highway environment. In 2013 Proceedings IEEE INFOCOM, pages 1591--1599, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  99. W. Yawen, W. Zhepeng, J. Zhenge, S. Yiyu, and H. Jingtong. Intermittent inference with nonuniformly compressed multi-exit neural network for energy harvesting powered devices. arXiv preprint arXiv:2004.11293, 2020.Google ScholarGoogle Scholar
  100. F. Yu and V. Koltun. Multi-scale context aggregation by dilated convolutions. arXiv preprint arXiv:1511.07122, 2015.Google ScholarGoogle Scholar
  101. D. Zhang, J. Yang, D. Ye, and G. Hua. Lq-nets: Learned quantization for highly accurate and compact deep neural networks. In Proceedings of the European Conference on Computer Vision (ECCV), September 2018.Google ScholarGoogle ScholarCross RefCross Ref
  102. X. Zhang, X. Zhou, M. Lin, and J. Sun. Shufflenet: An extremely efficient convolutional neural network for mobile devices. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 6848--6856, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  103. Z. Zhang, S. Fidler, and R. Urtasun. Instance-level segmentation for autonomous driving with deep densely connected mrfs. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 669--677, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  104. B. Zheng, Y. Gao, Q. Zhu, and S. Gupta. Analysis and Optimization of Soft Error Tolerance Strategies for Real-Time Systems. In 2015 International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS), pages 55--64, October 2015.Google ScholarGoogle Scholar
  105. B. Zheng, C. W. Lin, H. Liang, S. Shiraishi, W. Li, and Q. Zhu. Delay-aware design, analysis and verification of intelligent intersection management. In 2017 IEEE International Conference on Smart Computing (SMARTCOMP), pages 1--8, May 2017.Google ScholarGoogle ScholarCross RefCross Ref
  106. B. Zheng, C.-W. Lin, S. Shiraishi, and Q. Zhu. Design and analysis of delay-tolerant intelligent intersection management. ACM Transactions on Cyber-Physical Systems, 4(1):1--27, 2019.Google ScholarGoogle ScholarDigital LibraryDigital Library
  107. B. Zheng, C.-W. Lin, H. Yu, H. Liang, and Q. Zhu. CONVINCE: A Cross-Layer Modeling, Exploration and Validation Framework for Next-generation Connected Vehicles. In Computer-Aided Design (ICCAD), 2016 IEEE/ACM International Conference on, November 2016.Google ScholarGoogle Scholar
  108. B. Zheng, M. O. Sayin, C. W. Lin, S. Shiraishi, and Q. Zhu. Timing and security analysis of vanet-based intelligent transportation systems: (invited paper). In 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pages 984--991, Nov 2017.Google ScholarGoogle ScholarCross RefCross Ref
  109. Q. Zhu, W. Li, H. Kim, Y. Xiang, K. Wardega, Z. Wang, Y. Wang, H. Liang, C. Huang, J. Fan, and H. Choi. Know the unknowns: Addressing disturbances and uncertainties in autonomous systems: Invited paper. In 2020 IEEE/ACM International Conference On Computer Aided Design (ICCAD), pages 1--9, 2020.Google ScholarGoogle Scholar

Index Terms

  1. Safety-Assured Design and Adaptation of Learning-Enabled Autonomous Systems

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      ASPDAC '21: Proceedings of the 26th Asia and South Pacific Design Automation Conference
      January 2021
      930 pages
      ISBN:9781450379991
      DOI:10.1145/3394885

      Copyright © 2021 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 29 January 2021

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      ASPDAC '21 Paper Acceptance Rate111of368submissions,30%Overall Acceptance Rate466of1,454submissions,32%

      Upcoming Conference

      ASPDAC '25

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader