Skip to main content

Showing 1–5 of 5 results for author: Dan, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2005.13300  [pdf, other

    cs.LG cs.SD eess.AS stat.ML

    Scalable Polyhedral Verification of Recurrent Neural Networks

    Authors: Wonryong Ryou, Jiayu Chen, Mislav Balunovic, Gagandeep Singh, Andrei Dan, Martin Vechev

    Abstract: We present a scalable and precise verifier for recurrent neural networks, called Prover based on two novel ideas: (i) a method to compute a set of polyhedral abstractions for the non-convex and nonlinear recurrent update functions by combining sampling, optimization, and Fermat's theorem, and (ii) a gradient descent based algorithm for abstraction refinement guided by the certification problem tha… ▽ More

    Submitted 10 June, 2021; v1 submitted 27 May, 2020; originally announced May 2020.

    Comments: Published in CAV 2021

  2. arXiv:2005.09294  [pdf, other

    cs.LG cs.CR cs.CV stat.ML

    Synthesizing Unrestricted False Positive Adversarial Objects Using Generative Models

    Authors: Martin Kotuliak, Sandro E. Schoenborn, Andrei Dan

    Abstract: Adversarial examples are data points misclassified by neural networks. Originally, adversarial examples were limited to adding small perturbations to a given image. Recent work introduced the generalized concept of unrestricted adversarial examples, without limits on the added perturbations. In this paper, we introduce a new category of attacks that create unrestricted adversarial examples for obj… ▽ More

    Submitted 19 May, 2020; originally announced May 2020.

  3. arXiv:1904.06522  [pdf, other

    cs.DC cs.CR

    Cryptocurrency with Fully Asynchronous Communication based on Banks and Democracy

    Authors: Asa Dan

    Abstract: Cryptocurrencies came to the world in the recent decade and attempted to offer a new order where the financial system is not governed by a centralized entity, and where you have complete control over your account without the need to trust strangers (governments and banks above all). However, cryptocurrency systems face many challenges that prevent them from being used as an everyday coin. In this… ▽ More

    Submitted 25 September, 2019; v1 submitted 13 April, 2019; originally announced April 2019.

  4. arXiv:1806.01143  [pdf, other

    cs.CR

    Securify: Practical Security Analysis of Smart Contracts

    Authors: Petar Tsankov, Andrei Dan, Dana Drachsler Cohen, Arthur Gervais, Florian Buenzli, Martin Vechev

    Abstract: Permissionless blockchains allow the execution of arbitrary programs (called smart contracts), enabling mutually untrusted entities to interact without relying on trusted third parties. Despite their potential, repeated security concerns have shaken the trust in handling billions of USD by smart contracts. To address this problem, we present Securify, a security analyzer for Ethereum smart contr… ▽ More

    Submitted 24 August, 2018; v1 submitted 4 June, 2018; originally announced June 2018.

  5. arXiv:1705.08627  [pdf, other

    cs.DC

    On Using Time Without Clocks via Zigzag Causality

    Authors: Asa Dan, Rajit Manohar, Yoram Moses

    Abstract: Even in the absence of clocks, time bounds on the duration of actions enable the use of time for distributed coordination. This paper initiates an investigation of coordination in such a setting. A new communication structure called a zigzag pattern is introduced, and shown to guarantee bounds on the relative timing of events in this clockless model. Indeed, zigzag patterns are shown to be necessa… ▽ More

    Submitted 24 May, 2017; originally announced May 2017.

    Comments: This is an extended version of a paper to appear in PODC 2017