Negative Selection Approach to support Formal Verification and Validation of BlackBox Models' Input Constraints

  • Abdul-Rauf Nuhu
  • , Kishor Datta Gupta
  • , Wendwosen Bellete Bedada
  • , Mahmoud Nabil
  • , Lydia Asrat Zeleke
  • , Abdollah Homaifar
  • , Edward Tunstel

Research output: Contribution to journalConference articlepeer-review

4 Scopus citations

Abstract

Generating unsafe sub-requirements from a partitioned input space to support verification-guided test cases for formal verification of black-box models is a challenging problem for researchers. The size of the search space makes exhaustive search computationally impractical. This paper investigates a meta-heuristic approach to search for unsafe candidate sub-requirements in partitioned input space. We present a Negative Selection Algorithm (NSA) for identifying the candidates' unsafe regions within given safety properties. The Meta-heuristic capability of the NSA algorithm made it possible to estimate vast unsafe regions while validating a subset of these regions. We utilize a parallel execution of partitioned input space to produce safe areas. The NSA based on the prior knowledge of the safe regions is used to identify candidate unsafe region areas and the Marabou framework is then used to validate the NSA results. Our preliminary experimentation and evaluation show that the procedure finds candidate unsafe sub-requirements when validated with the Marabou framework with high precision.
Original languageEnglish
Pages (from-to)413-420
Number of pages8
JournalProceedings of the 2022 IEEE Symposium Series on Computational Intelligence, SSCI 2022
DOIs
StatePublished - Jan 1 2022
Event2022 IEEE Symposium Series on Computational Intelligence, SSCI 2022 - Singapore, Singapore
Duration: Dec 4 2022Dec 7 2022

Keywords

  • Data-driven (DD) model formal verification
  • DD-based safety critical models
  • neural network based controllers
  • safety requirements
  • sub-requirements

Fingerprint

Dive into the research topics of 'Negative Selection Approach to support Formal Verification and Validation of BlackBox Models' Input Constraints'. Together they form a unique fingerprint.

Cite this