Safe inputs approximation for black-box systems
Given a family of independent and identically distributed samples extracted from the input region and their corresponding outputs, in this paper we propose a method to under-approximate the set of safe inputs that lead the blackbox system to respect a given safety specification. Our method falls wit...
Saved in:
Main Authors: | XUE, Bai, LIU, Yang, MA, Lei, ZHANG, Xiyue, SUN, Meng, XIE, Xiaofei |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2019
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/7074 https://ink.library.smu.edu.sg/context/sis_research/article/8077/viewcontent/464600a180.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Amora: Black-box adversarial morphing attack
by: WANG, Run, et al.
Published: (2020) -
A linear programming application to the cutting stock problem of ABC Corrugated Box Manufacturing Company
by: Cheng, Grace U., et al.
Published: (1986) -
Systematically enhancing black-box web vulnerability scanners
by: VENKATRAMAN SAI SATHYANARAYAN
Published: (2012) -
Revisiting norm optimization for multi-objective black-box problems : a finite-time analysis
by: Al-Dujaili, Abdullah, et al.
Published: (2020) -
Black-box optimization by Fourier analysis and swarm intelligence
by: Lim, E.W.C., et al.
Published: (2014)