Runtime Monitoring DNN-Based Perception (2310.03999v1)
Abstract: Deep neural networks (DNNs) are instrumental in realizing complex perception systems. As many of these applications are safety-critical by design, engineering rigor is required to ensure that the functional insufficiency of the DNN-based perception is not the source of harm. In addition to conventional static verification and testing techniques employed during the design phase, there is a need for runtime verification techniques that can detect critical events, diagnose issues, and even enforce requirements. This tutorial aims to provide readers with a glimpse of techniques proposed in the literature. We start with classical methods proposed in the machine learning community, then highlight a few techniques proposed by the formal methods community. While we surely can observe similarities in the design of monitors, how the decision boundaries are created vary between the two communities. We conclude by highlighting the need to rigorously design monitors, where data availability outside the operational domain plays an important role.
- Percemon: online monitoring for perception systems. In International Conference on Runtime Verification (RV), pages 297–308, 2021.
- R. E. Bryant. Symbolic boolean manipulation with ordered binary-decision diagrams. ACM Computing Surveys (CSUR), 24(3):293–318, 1992.
- Monitoring object detection abnormalities via data-label and post-algorithm abstractions. In IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), pages 6688–6693, 2021.
- C.-H. Cheng. Provably-robust runtime monitoring of neuron activation patterns. In Design, Automation & Test in Europe Conference & Exhibition (DATE), pages 1310–1313, 2021.
- Towards safety verification of direct perception neural networks. In Design, Automation & Test in Europe Conference & Exhibition (DATE), pages 1640–1643, 2020.
- Runtime monitoring neuron activation patterns. In Design, Automation & Test in Europe Conference & Exhibition (DATE), pages 300–303, 2019.
- A. Donzé and O. Maler. Robust satisfaction of temporal logic over real-valued signals. In International Conference on Formal Modeling and Analysis of Timed Systems (FORMATS), pages 92–106, 2010.
- T. M. Gawlitza and H. Seidl. Solving systems of rational equations through strategy iteration. ACM Trans. Program. Lang. Syst.(TOPLAS), 33(3):11:1–11:48, 2011.
- Gaussian-based runtime detection of out-of-distribution inputs for neural networks. In International Conference on Runtime Verification (RV), pages 254–264. Springer, 2021.
- D. Hendrycks and K. Gimpel. A baseline for detecting misclassified and out-of-distribution examples in neural networks. In International Conference on Learning Representations (ICLR), 2017.
- Outside the box: Abstraction-based monitoring of neural networks. arXiv preprint arXiv:1911.09032, 2019.
- R. Koymans. Specifying real-time properties with metric temporal logic. Real-time systems, 2(4):255–299, 1990.
- Y. LeCun. The MNIST database of handwritten digits. http://yann. lecun. com/exdb/most/, 1998.
- A simple unified framework for detecting out-of-distribution samples and adversarial attacks. In Conference on Neural Information Processing Systems (NeurIPS), volume 31, 2018.
- Enhancing the reliability of out-of-distribution image detection in neural networks. In International Conference on Learning Representations (ICLR), 2018.
- Conformal prediction for STL runtime verification. In International Conference on Cyber-Physical Systems (ICCPS), pages 142–153, 2023.
- Gen: Pushing the limits of softmax-based out-of-distribution detection. In IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pages 23946–23955, 2023.
- D. Ničković and T. Yamaguchi. RTAMT: Online robustness monitors from STL. In International Symposium on Automated Technology for Verification and Analysis (ATVA), pages 564–571, 2020.
- Detection of out-of-distribution samples using binary neuron activation patterns. In IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pages 3378–3387, June 2023.
- A. Pnueli. The temporal logic of programs. In Annual Symposium on Foundations of Computer Science (FOCS), pages 46–57, 1977.
- Hardware faults that matter: Understanding and estimating the safety impact of hardware faults on object detection dnns. In International Conference on Computer Safety, Reliability, and Security (SafeComp), pages 298–318, 2022.
- Learning monitorable operational design domains for assured autonomy. In International Symposium on Automated Technology for Verification and Analysis (ATVA), pages 3–22, 2022.
- Dynamic shielding for reinforcement learning in black-box environments. In International Symposium on Automated Technology for Verification and Analysis (ATVA), pages 25–41, 2022.
- Customizable reference runtime monitoring of neural networks using resolution boxes. arXiv preprint arXiv:2104.14435, 2021.
- Fashion-MNIST: a novel image dataset for benchmarking machine learning algorithms. arXiv preprint arXiv:1708.07747, 2017.
- Test case prioritization with neuron valuation based pattern. Sci. Comput. Program. (SCP), 215:102761, 2022.
- Neuron activation frequency based test case prioritization. In International Symposium on Theoretical Aspects of Software Engineering (TASE), pages 81–88, 2020.