Skip to main content

Showing 1–31 of 31 results for author: Suenaga, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.04108  [pdf, ps, other

    cs.AR

    In-Situ Hardware Error Detection Using Specification-Derived Petri Net Models and Behavior-Derived State Sequences

    Authors: Tomonari Tanaka, Takumi Uezono, Kohei Suenaga, Masanori Hashimoto

    Abstract: In hardware accelerators used in data centers and safety-critical applications, soft errors and resultant silent data corruption significantly compromise reliability, particularly when upsets occur in control-flow operations, leading to severe failures. To address this, we introduce two methods for monitoring control flows: using specification-derived Petri nets and using behavior-derived state tr… ▽ More

    Submitted 8 May, 2025; v1 submitted 6 May, 2025; originally announced May 2025.

    Comments: Corrected the submission by removing an unused figure file (fig1.png) that appeared in the separate figures list

  2. arXiv:2503.03703  [pdf, other

    cs.CL

    SoftMatcha: A Soft and Fast Pattern Matcher for Billion-Scale Corpus Searches

    Authors: Hiroyuki Deguchi, Go Kamoda, Yusuke Matsushita, Chihiro Taguchi, Kohei Suenaga, Masaki Waga, Sho Yokoi

    Abstract: Researchers and practitioners in natural language processing and computational linguistics frequently observe and analyze the real language usage in large-scale corpora. For that purpose, they often employ off-the-shelf pattern-matching tools, such as grep, and keyword-in-context concordancers, which is widely used in corpus linguistics for gathering examples. Nonetheless, these existing technique… ▽ More

    Submitted 5 March, 2025; originally announced March 2025.

    Comments: Accepted at ICLR2025

  3. Certifying Lyapunov Stability of Black-Box Nonlinear Systems via Counterexample Guided Synthesis (Extended Version)

    Authors: Chiao Hsieh, Masaki Waga, Kohei Suenaga

    Abstract: Finding Lyapunov functions to certify the stability of control systems has been an important topic for verifying safety-critical systems. Most existing methods on finding Lyapunov functions require access to the dynamics of the system. Accurately describing the complete dynamics of a control system however remains highly challenging in practice. Latest trend of using learning-enabled control syste… ▽ More

    Submitted 15 May, 2025; v1 submitted 1 March, 2025; originally announced March 2025.

    Comments: 30 pages, 3 figures. This is the extended version of the same paper published in the 28th International Conference on Hybrid Systems: Computation and Control (HSCC 2025). Add acknowledgements in v2

  4. arXiv:2410.21073  [pdf, ps, other

    cs.LG cs.AI

    Skip2-LoRA: A Lightweight On-device DNN Fine-tuning Method for Low-cost Edge Devices

    Authors: Hiroki Matsutani, Masaaki Kondo, Kazuki Sunaga, Radu Marculescu

    Abstract: This paper proposes Skip2-LoRA as a lightweight fine-tuning method for deep neural networks to address the gap between pre-trained and deployed models. In our approach, trainable LoRA (low-rank adaptation) adapters are inserted between the last layer and every other layer to enhance the network expressive power while keeping the backward computation cost low. This architecture is well-suited to ca… ▽ More

    Submitted 28 October, 2024; originally announced October 2024.

    Comments: ASP-DAC 2025 (accepted)

  5. arXiv:2405.17492  [pdf, ps, other

    cs.SE cs.AI cs.LO

    StatWhy: Formal Verification Tool for Statistical Hypothesis Testing Programs

    Authors: Yusuke Kawamoto, Kentaro Kobayashi, Kohei Suenaga

    Abstract: Statistical methods have been widely misused and misinterpreted in various scientific fields, raising significant concerns about the integrity of scientific research. To mitigate this problem, we propose a tool-assisted method for formally specifying and automatically verifying the correctness of statistical programs. In this method, programmers are required to annotate the source code of the stat… ▽ More

    Submitted 1 June, 2025; v1 submitted 25 May, 2024; originally announced May 2024.

    Comments: Accepted to CAV 2025 (the 37th International Conference on Computer Aided Verification)

  6. Oblivious Monitoring for Discrete-Time STL via Fully Homomorphic Encryption

    Authors: Masaki Waga, Kotaro Matsuoka, Takashi Suwa, Naoki Matsumoto, Ryotaro Banno, Song Bian, Kohei Suenaga

    Abstract: When monitoring a cyber-physical system (CPS) from a remote server, keeping the monitored data secret is crucial, particularly when they contain sensitive information, e.g., biological or location data. Recently, Banno et al. (CAV'22) proposed a protocol for online LTL monitoring that keeps data concealed from the server using Fully Homomorphic Encryption (FHE). We build on this protocol to allow… ▽ More

    Submitted 18 October, 2024; v1 submitted 26 May, 2024; originally announced May 2024.

    Comments: Accepted to RV'24

  7. arXiv:2312.15138  [pdf, other

    cs.LG

    An FPGA-Based Accelerator for Graph Embedding using Sequential Training Algorithm

    Authors: Kazuki Sunaga, Keisuke Sugiura, Hiroki Matsutani

    Abstract: A graph embedding is an emerging approach that can represent a graph structure with a fixed-length low-dimensional vector. node2vec is a well-known algorithm to obtain such a graph embedding by sampling neighboring nodes on a given graph with a random walk technique. However, the original node2vec algorithm typically relies on a batch training of graph structures; thus, it is not suited for applic… ▽ More

    Submitted 29 April, 2024; v1 submitted 22 December, 2023; originally announced December 2023.

    Comments: RAW'24

  8. arXiv:2308.07930  [pdf, other

    cs.SE cs.FL cs.LG eess.SY

    Probabilistic Black-Box Checking via Active MDP Learning

    Authors: Junya Shijubo, Masaki Waga, Kohei Suenaga

    Abstract: We introduce a novel methodology for testing stochastic black-box systems, frequently encountered in embedded systems. Our approach enhances the established black-box checking (BBC) technique to address stochastic behavior. Traditional BBC primarily involves iteratively identifying an input that breaches the system's specifications by executing the following three phases: the learning phase to con… ▽ More

    Submitted 15 July, 2023; originally announced August 2023.

    Comments: Accepted to EMSOFT 2023

  9. arXiv:2301.03915  [pdf, other

    cs.DC

    Learning nonlinear hybrid automata from input--output time-series data

    Authors: Amit Gurung, Masaki Waga, Kohei Suenaga

    Abstract: Learning an automaton that approximates the behavior of a black-box system is a long-studied problem. Besides its theoretical significance, its application to search-based testing and model understanding is recently recognized. We present an algorithm to learn a nonlinear hybrid automaton (HA) that approximates a black-box hybrid system (HS) from a set of input--output traces generated by the HS.… ▽ More

    Submitted 27 July, 2023; v1 submitted 10 January, 2023; originally announced January 2023.

    Comments: 23 pages, 22 figures; including appendix

  10. arXiv:2210.17130  [pdf, other

    cs.CV cs.AI

    BOREx: Bayesian-Optimization--Based Refinement of Saliency Map for Image- and Video-Classification Models

    Authors: Atsushi Kikuchi, Kotaro Uchida, Masaki Waga, Kohei Suenaga

    Abstract: Explaining a classification result produced by an image- and video-classification model is one of the important but challenging issues in computer vision. Many methods have been proposed for producing heat-map--based explanations for this purpose, including ones based on the white-box approach that uses the internal information of a model (e.g., LRP, Grad-CAM, and Grad-CAM++) and ones based on the… ▽ More

    Submitted 31 October, 2022; originally announced October 2022.

    Comments: 32 pages. To appear in ACCV 2022

  11. Formalizing Statistical Causality via Modal Logic

    Authors: Yusuke Kawamoto, Tetsuya Sato, Kohei Suenaga

    Abstract: We propose a formal language for describing and explaining statistical causality. Concretely, we define Statistical Causality Language (StaCL) for expressing causal effects and specifying the requirements for causal inference. StaCL incorporates modal operators for interventions to express causal properties between probability distributions in different possible worlds in a Kripke model. We formal… ▽ More

    Submitted 17 September, 2023; v1 submitted 30 October, 2022; originally announced October 2022.

    Comments: Full version for the paper accepted at JELIA 2023 (the 18th European Conference on Logics in Artificial Intelligence)

    Journal ref: Proc. of the 18th European Conference on Logics in Artificial Intelligence (JELIA 2023), Lecture Notes in Computer Science, Vol.14281, pp.681-696, 2023

  12. Sound and Relatively Complete Belief Hoare Logic for Statistical Hypothesis Testing Programs

    Authors: Yusuke Kawamoto, Tetsuya Sato, Kohei Suenaga

    Abstract: We propose a new approach to formally describing the requirement for statistical inference and checking whether a program uses the statistical method appropriately. Specifically, we define belief Hoare logic (BHL) for formalizing and reasoning about the statistical beliefs acquired via hypothesis testing. This program logic is sound and relatively complete with respect to a Kripke model for hypoth… ▽ More

    Submitted 8 November, 2023; v1 submitted 15 August, 2022; originally announced August 2022.

    Comments: Accepted to the journal Artificial Intelligence (AI); an extended version of the KR'21 conference paper https://proceedings.kr.org/2021/39/

    Journal ref: Artificial Intelligence, Vol.326, 104045, Elsevier, 2024

  13. Goal-Aware RSS for Complex Scenarios via Program Logic

    Authors: Ichiro Hasuo, Clovis Eberhart, James Haydon, Jérémy Dubut, Rose Bohrer, Tsutomu Kobayashi, Sasinee Pruekprasert, Xiao-Yi Zhang, Erik André Pallas, Akihisa Yamada, Kohei Suenaga, Fuyuki Ishikawa, Kenji Kamijo, Yoshiyuki Shinya, Takamasa Suetomi

    Abstract: We introduce a goal-aware extension of responsibility-sensitive safety (RSS), a recent methodology for rule-based safety guarantee for automated driving systems (ADS). Making RSS rules guarantee goal achievement -- in addition to collision avoidance as in the original RSS -- requires complex planning over long sequences of manoeuvres. To deal with the complexity, we introduce a compositional reaso… ▽ More

    Submitted 5 July, 2022; originally announced July 2022.

    Comments: 33 pages, 18 figures, 1 table. Accepted for publication in IEEE Transactions on Intelligent Vehicles

    ACM Class: I.2.9; F.4.1

  14. arXiv:2206.03582  [pdf, other

    cs.CR cs.FL cs.LO

    Oblivious Online Monitoring for Safety LTL Specification via Fully Homomorphic Encryption

    Authors: Ryotaro Banno, Kotaro Matsuoka, Naoki Matsumoto, Song Bian, Masaki Waga, Kohei Suenaga

    Abstract: In many Internet of Things (IoT) applications, data sensed by an IoT device are continuously sent to the server and monitored against a specification. Since the data often contain sensitive information, and the monitored specification is usually proprietary, both must be kept private from the other end. We propose a protocol to conduct oblivious online monitoring -- online monitoring conducted wit… ▽ More

    Submitted 3 June, 2022; originally announced June 2022.

    Comments: This is the extended version of a paper to appear at CAV 2022

  15. arXiv:2203.14261  [pdf, ps, other

    cs.LO cs.PL

    The Lattice-Theoretic Essence of Property Directed Reachability Analysis

    Authors: Mayuko Kori, Natsuki Urabe, Shin-ya Katsumata, Kohei Suenaga, Ichiro Hasuo

    Abstract: We present LT-PDR, a lattice-theoretic generalization of Bradley's property directed reachability analysis (PDR) algorithm. LT-PDR identifies the essence of PDR to be an ingenious combination of verification and refutation attempts based on the Knaster-Tarski and Kleene theorems. We introduce four concrete instances of LT-PDR, derive their implementation from a generic Haskell implementation of LT… ▽ More

    Submitted 13 August, 2022; v1 submitted 27 March, 2022; originally announced March 2022.

    Comments: 37 pages

    MSC Class: 68N30

  16. Addressing Gap between Training Data and Deployed Environment by On-Device Learning

    Authors: Kazuki Sunaga, Masaaki Kondo, Hiroki Matsutani

    Abstract: The accuracy of tinyML applications is often affected by various environmental factors, such as noises, location/calibration of sensors, and time-related changes. This article introduces a neural network based on-device learning (ODL) approach to address this issue by retraining in deployed environments. Our approach relies on semi-supervised sequential training of multiple neural networks tailore… ▽ More

    Submitted 24 December, 2023; v1 submitted 2 March, 2022; originally announced March 2022.

    Journal ref: IEEE Micro (2023)

  17. arXiv:2109.04656  [pdf, ps, other

    cs.LO

    Efficient Black-Box Checking via Model Checking with Strengthened Specifications

    Authors: Junya Shijubo, Masaki Waga, Kohei Suenaga

    Abstract: Black-box checking (BBC)} is a testing method for cyber-physical systems (CPSs) as well as software systems. BBC consists of active automata learning and model checking; a Mealy machine is learned from the system under test (SUT), and the learned Mealy machine is verified against a specification using model checking. When the Mealy machine violates the specification, the model checker returns an i… ▽ More

    Submitted 10 September, 2021; originally announced September 2021.

    Comments: Accepted to RV'21

  18. arXiv:2108.12971  [pdf, other

    cs.PL cs.CL cs.LO cs.SE

    HELMHOLTZ: A Verifier for Tezos Smart Contracts Based on Refinement Types

    Authors: Yuki Nishida, Hiromasa Saito, Ran Chen, Akira Kawata, Jun Furuse, Kohei Suenaga, Atsushi Igarashi

    Abstract: A smart contract is a program executed on a blockchain, based on which many cryptocurrencies are implemented, and is being used for automating transactions. Due to the large amount of money that smart contracts deal with, there is a surging demand for a method that can statically and formally verify them. This article describes our type-based static verification tool HELMHOLTZ for Michelson, whi… ▽ More

    Submitted 10 September, 2021; v1 submitted 29 August, 2021; originally announced August 2021.

  19. arXiv:2107.09766  [pdf, other

    cs.AI cs.LG cs.PL

    Learning Heuristics for Template-based CEGIS of Loop Invariants with Reinforcement Learning

    Authors: Minchao Wu, Takeshi Tsukada, Hiroshi Unno, Taro Sekiyama, Kohei Suenaga

    Abstract: Loop-invariant synthesis is the basis of program verification. Due to the undecidability of the problem in general, a tool for invariant synthesis necessarily uses heuristics. Despite the common belief that the design of heuristics is vital for the performance of a synthesizer, heuristics are often engineered by their developers based on experience and intuition, sometimes in an \emph{ad-hoc} mann… ▽ More

    Submitted 15 June, 2022; v1 submitted 16 July, 2021; originally announced July 2021.

  20. arXiv:2106.04826  [pdf, other

    cs.PL cs.CR cs.SE

    Verification of a Merkle Patricia Tree Library Using F*

    Authors: Sota Sato, Ryotaro Banno, Jun Furuse, Kohei Suenaga, Atsushi Igarashi

    Abstract: A Merkle tree is a data structure for representing a key-value store as a tree. Each node of a Merkle tree is equipped with a hash value computed from those of their descendants. A Merkle tree is often used for representing a state of a blockchain system since it can be used for efficiently auditing the state in a trustless manner. Due to the safety-critical nature of blockchains, ensuring the cor… ▽ More

    Submitted 9 June, 2021; originally announced June 2021.

    ACM Class: D.2.4; E.1

  21. arXiv:2101.01502  [pdf, other

    cs.LG cs.PL

    Control-Data Separation and Logical Condition Propagation for Efficient Inference on Probabilistic Programs

    Authors: Ichiro Hasuo, Yuichiro Oyabu, Clovis Eberhart, Kohei Suenaga, Kenta Cho, Shin-ya Katsumata

    Abstract: We present a novel sampling framework for probabilistic programs. The framework combines two recent ideas -- \emph{control-data separation} and \emph{logical condition propagation} -- in a nontrivial manner so that the two ideas boost the benefits of each other. We implemented our algorithm on top of Anglican. The experimental results demonstrate our algorithm's efficiency, especially for programs… ▽ More

    Submitted 29 September, 2023; v1 submitted 5 January, 2021; originally announced January 2021.

  22. arXiv:2010.02468  [pdf, ps, other

    cs.CV cs.LG

    Visualizing Color-wise Saliency of Black-Box Image Classification Models

    Authors: Yuhki Hatakeyama, Hiroki Sakuma, Yoshinori Konishi, Kohei Suenaga

    Abstract: Image classification based on machine learning is being commonly used. However, a classification result given by an advanced method, including deep learning, is often hard to interpret. This problem of interpretability is one of the major obstacles in deploying a trained model in safety-critical systems. Several techniques have been proposed to address this problem; one of which is RISE, which exp… ▽ More

    Submitted 6 October, 2020; originally announced October 2020.

    Comments: To appear in ACCV 2020

  23. arXiv:2002.07770  [pdf, other

    cs.PL

    ConSORT: Context- and Flow-Sensitive Ownership Refinement Types for Imperative Programs

    Authors: John Toman, Ren Siqi, Kohei Suenaga, Atsushi Igarashi, Naoki Kobayashi

    Abstract: We present ConSORT, a type system for safety verification in the presence of mutability and aliasing. Mutability requires strong updates to model changing invariants during program execution, but aliasing between pointers makes it difficult to determine which invariants must be updated in response to mutation. Our type system addresses this difficulty with a novel combination of refinement types a… ▽ More

    Submitted 18 February, 2020; originally announced February 2020.

  24. arXiv:1910.03784  [pdf, ps, other

    cs.PL cs.SE

    Generalized Property-Directed Reachability for Hybrid Systems

    Authors: Kohei Suenaga, Takuya Ishizawa

    Abstract: Generalized property-directed reachability (GPDR) belongs to the family of the model-checking techniques called IC3/PDR. It has been successfully applied to software verification; for example, it is the core of Spacer, a state-of-the-art Horn-clause solver bundled with Z3. However, it has yet to be applied to hybrid systems, which involve a continuous evolution of values over time. As the first st… ▽ More

    Submitted 26 November, 2019; v1 submitted 9 October, 2019; originally announced October 2019.

    Comments: To appear in VMCAI 2020

  25. MONAA: A Tool for Timed Pattern Matching with Automata-Based Acceleration

    Authors: Masaki Waga, Ichiro Hasuo, Kohei Suenaga

    Abstract: We present monaa, a monitoring tool over a real-time property specified by either a timed automaton or a timed regular expression. It implements a timed pattern matching algorithm that combines 1) features suited for online monitoring, and 2) acceleration by automata-based skipping. Our experiments demonstrate monaa's performance advantage, especially in online usage.

    Submitted 22 October, 2018; originally announced October 2018.

    Comments: Published in: 2018 IEEE Workshop on Monitoring and Testing of Cyber-Physical Systems (MT-CPS)

  26. arXiv:1805.11799  [pdf, other

    cs.AI cs.LG cs.LO cs.PL

    Automated proof synthesis for propositional logic with deep neural networks

    Authors: Taro Sekiyama, Kohei Suenaga

    Abstract: This work explores the application of deep learning, a machine learning technique that uses deep neural networks (DNN) in its core, to an automated theorem proving (ATP) problem. To this end, we construct a statistical model which quantifies the likelihood that a proof is indeed a correct one of a given proposition. Based on this model, we give a proof-synthesis procedure that searches for a proof… ▽ More

    Submitted 30 May, 2018; originally announced May 2018.

    Comments: 25 pages

  27. arXiv:1709.00314  [pdf, other

    cs.LO

    Sharper and Simpler Nonlinear Interpolants for Program Verification

    Authors: Takamasa Okudono, Yuki Nishida, Kensuke Kojima, Kohei Suenaga, Kengo Kido, Ichiro Hasuo

    Abstract: Interpolation of jointly infeasible predicates plays important roles in various program verification techniques such as invariant synthesis and CEGAR. Intrigued by the recent result by Dai et al.\ that combines real algebraic geometry and SDP optimization in synthesis of polynomial interpolants, the current paper contributes its enhancement that yields sharper and simpler interpolants. The enhance… ▽ More

    Submitted 1 September, 2017; originally announced September 2017.

  28. Efficient Online Timed Pattern Matching by Automata-Based Skipping

    Authors: Masaki Waga, Ichiro Hasuo, Kohei Suenaga

    Abstract: The timed pattern matching problem is an actively studied topic because of its relevance in monitoring of real-time systems. There one is given a log $w$ and a specification $\mathcal{A}$ (given by a timed word and a timed automaton in this paper), and one wishes to return the set of intervals for which the log $w$, when restricted to the interval, satisfies the specification $\mathcal{A}$. In our… ▽ More

    Submitted 28 June, 2017; originally announced June 2017.

    Journal ref: Formal Modeling and Analysis of Timed Systems. FORMATS 2017. Lecture Notes in Computer Science, vol 10419. Springer, Cham

  29. arXiv:1706.06462  [pdf, other

    cs.PL cs.AI cs.LO

    Towards Proof Synthesis Guided by Neural Machine Translation for Intuitionistic Propositional Logic

    Authors: Taro Sekiyama, Akifumi Imanishi, Kohei Suenaga

    Abstract: Inspired by the recent evolution of deep neural networks (DNNs) in machine learning, we explore their application to PL-related topics. This paper is the first step towards this goal; we propose a proof-synthesis method for the negation-free propositional logic in which we use a DNN to obtain a guide of proof search. The idea is to view the proof-synthesis problem as a translation from a propositi… ▽ More

    Submitted 20 June, 2017; originally announced June 2017.

  30. arXiv:1604.07201  [pdf, ps, other

    cs.PL cs.LO cs.SC cs.SE

    Generalized Homogeneous Polynomials for Efficient Template-Based Nonlinear Invariant Synthesis

    Authors: Kensuke Kojima, Minoru Kinoshita, Kohei Suenaga

    Abstract: The template-based method is one of the most successful approaches to algebraic invariant synthesis. In this method, an algorithm designates a template polynomial p over program variables, generates constraints for p=0 to be an invariant, and solves the generated constraints. However, this approach often suffers from an increasing template size if the degree of a template polynomial is too high.… ▽ More

    Submitted 13 September, 2016; v1 submitted 25 April, 2016; originally announced April 2016.

    Comments: Presented in the 23rd Static Analysis Symposium (SAS 2016)

    ACM Class: F.3.1; F.3.2

  31. Resource Usage Analysis for the Pi-Calculus

    Authors: Naoki Kobayashi, Kohei Suenaga, Lucian Wischik

    Abstract: We propose a type-based resource usage analysis for the π-calculus extended with resource creation/access primitives. The goal of the resource usage analysis is to statically check that a program accesses resources such as files and memory in a valid manner. Our type system is an extension of previous behavioral type systems for the π-calculus, and can guarantee the safety property tha… ▽ More

    Submitted 13 September, 2006; v1 submitted 7 August, 2006; originally announced August 2006.

    ACM Class: F.3.1; D.3.1

    Journal ref: Logical Methods in Computer Science, Volume 2, Issue 3 (September 13, 2006) lmcs:2246