PaperHub
6.0
/10
Poster4 位审稿人
最低5最高7标准差0.7
7
6
5
6
3.3
置信度
正确性3.5
贡献度3.0
表达2.3
NeurIPS 2024

SEEV: Synthesis with Efficient Exact Verification for ReLU Neural Barrier Functions

OpenReviewPDF
提交: 2024-05-15更新: 2024-11-06
TL;DR

This paper proposes a ReLU NCBF synthesis framework with efficient exact verification for robotic safety. Key insights: ReLU NCBF can be verified in linear pieces, boundary pieces are safety-critical, and limiting them improves efficiency.

摘要

关键词
Safe ControlBarrier FunctionsControl Barrier FunctionsNeural Networks

评审与讨论

审稿意见
7

The paper proposes for synthesizing (and verifying) Neural Barrier Certificates with ReLU activation functions. The authors focus on continuous-time systems which are controlled via a control input u(t) and define a dynamical system as safe if for every state there exists a control output u(t) such that some unsafe region is never reachable. To synthesize Neural Barrier Certificates, the authors build on characterization of ReLU Barrier Certificates by [15]. In particular, [15] observed that Relu NNs are piece-wise linear and it therefore suffices to check specific linearly constrained regions at the border of the region D\mathcal{D} described by the barrier certificate. The authors then extend prior work in two directions. First, they propose a technique for training ReLU Barrier Certificates in a manner that minimizes the number of different linearly constrained regions at the border of D\mathcal{D}. Secondly, the authors propose an optimized scheme for verification of the resulting constraints w.r.t. the NN.

References cited below:

  • [R1] Bak, Stanley, et al. "Improved geometric path enumeration for verifying relu neural networks." Computer Aided Verification: 32nd International Conference, CAV 2020, Los Angeles, CA, USA, July 21–24, 2020, Proceedings, Part I 32. Springer International Publishing, 2020.
  • [R2] Wang, Shiqi, et al. "Beta-crown: Efficient bound propagation with per-neuron split constraints for neural network robustness verification." Advances in Neural Information Processing Systems 34 (2021): 29909-29921.

优点

(S10) The approach presented by the authors makes the work described in [15] much more applicable: As shown in the experiments, both novel techniques improve the performance of the overall approach and push beyond what was analyzable using [15].

(S20) The paper is mostly well-written and provides a good overview of the work.

缺点

Minor opportunities for improvement:

(O1) In Section 4.1 the paper develops a new algorithm for enumerating linear NN regions along the border of D\mathcal{D}. I wonder how this technique materially differs from the branch exploration approaches used by branch-and-bound NN verification tools [R1,R2]. For example, geometric path enumeration [R1] also enumerates feasible linear regions. While I agree that this approach would probably not be directly applicable due to the additional constraints w.r.t. the border of D\mathcal{D}, a conceptual comparison might help in making the paper better digestible to the NN verification community.

(O2) For an audience less familiar with neural barrier certificates, it would be helpful to provide insights into how such an NN could be used to control a dynamical system in practice. I assume the barrier certificate can somehow be used to choose the correct control signal u at runtime, however, this correspondence is not entirely obvious to me.

Minor notes:

  • Line 148: ∄u\not\exists u makes the text harder to read, I would suggest writing this in english (similarly in other places)

问题

(Q1) I would be really interested to hear something about (O2). In a similar direction: I assume there is some limit on how often I have to choose control actions using the barrier certificate to ensure the dynamical system stays safe?

局限性

The limitations of the work become clear throughout the paper.

作者回复

We thank the reviewer for suggesting R1 and R2. The branch-and-bound methods for neural network verification perform branch and bound on non-linear units, either in the propagation of spatial data structures as mentioned in R1, or bound propagation as done in R2. In these works, being able to verify in the decision space of size potentially up to 2n2^n (where nn is the number of activation units) is done through analyzing and taking advantage of the intrinsic structure of neural networks, thus quickly pruning out large infeasible combinations to achieve verifiability. In our work, once we have identified at least one point that belongs to the border of region D\mathcal{D}, we exploit the fact that the border region is connected and we quickly expand from this point to identify the entire border region, without the need to make decisions using branch and bound. In other words, we took advantage of the intrinsic structure of the control barrier function to quickly eliminate the need to search in regions that do not contain the border, as an analogy to how branch-and-bound methods in NN verification can prune out unnecessary search space in neuron space.

We also make the distinction that R1 and R2 are primarily concerned with verifying input and output relationships of neural networks, whereas the verification conditions in Proposition 1 involve nonlinear dynamical systems, which add another layer of complexity on top of NN verification problems.

Safe action can be derived from a control barrier function as a safety filter as described in [1] and [2]. In particular, one may solve the following optimization:

&\min_{u \in \mathcal{U}} ||u - \pi_{nom}(x)||^2 \\\\ &\text{s.t.} \\;\\; L_f B(x) + L_g B(x)u \leq -\alpha (B(x)) \end{split}

The solution to this optimization problem provides a control uu that minimally deviates from the nominal control πnom(x)\pi_{nom}(x), while satisfying the descent condition defined by the control barrier function B(x)B(x) in the constraint.

There is no limit on how to choose the control action filtered by the control barrier function, as a correct control barrier function forms a forward invariant set to ensure the safety of the system it describes.

[1] Ames, Aaron, et al. Control Barrier Functions: Theory and Applications. 17th European Control Conference, ECC 2019, Naples, Italy, June 25-28, 2019, 3420–3431.

[2] So, Oswin, et al. How to Train Your Neural Control Barrier Function: Learning Safety Filters for Complex Input-Constrained Systems. CoRR, abs/2310.15478.

评论

Dear authors,

thank you for your answers which address my questions and concerns. In particular, the response to (O1) I found quite useful -- I believe for future readers it may be worthwhile to say this even more explicitly in the paper's final version.

Given the response, I stick to my rating.

评论

Dear Reviewer,

Thank you for your feedback and for taking the time to review our paper our responses. We are glad to hear that our responses addressed your questions and concerns, particularly regarding (O1). We appreciate your suggestion to make this point even more explicit in the final version of the paper and will ensure to incorporate this improvement.

Thank you once again for your reviews and for maintaining your rating.

审稿意见
6

This paper presents an efficient NCBF training and verification framework by leveraging activation regions along the safety boundary. Specifically, reducing piecewise-linear segments acts as a regularizer and nonlinear programs are solves for efficient verificaiton. Experiemnts validates the efficiency of the proposed method compared to the exact verificaiton baselines.

优点

The motivation for training and verifying neural CBFs is sound and important, especially for improving the efficiency of exact (complete) verification. Sections 2 and 3 are well-written and easy to follow. I like the idea of regularizer as a training loss to limit the number of boundary hyperplanes, and it is insightful and novel. The experiments are comprehensive, and the effectiveness of the proposed method is validated.

缺点

  • The idea of incorporating verification in the training process by counterexample is not new; it is also called verificaiton-in-the-loop training in the literature [1,2]. The last two terms of training losses in Eq. (8) are also off-the-shelf, which weakens the contribution. The new regularizer in Eq. (9) is not very clear, how to determine k here?
  • Section 4 is poorly organized and looks sophisticated but trivial for each individual part. It is recommended that figures are adopted to illustrate the high-level idea clearly and more details are included in the appendix.
  • For the Hyperplane Verification in Section 4.2, it is hard to find a global solution for nonlinear programming. But if we adopt bounds on the Lipschitz of f and g, the approximation error may cause incompleteness or unsoundness for the exact verification.
  • Similarly, in the Hige Verification, if the sufficient condition is verified for efficiency, the verification will be sound but incomplete, which is OK but not exact. Consequently, the baselines in the experiment should include incomplete verification methods for a fair comparison, or at least the verified rate should be reported compared to the exact verification.

[1] Wang et al. Design-while-verify: correct-by-construction control learning with verification in the loop, 2022

[2] Wang et al. Simultaneous synthesis and verification of neural control barrier functions through branch-and-bound verification-in-the- loop training, 2023

问题

See Weaknesses.

局限性

There is no explicit Limitation section in the main text or appendix.

作者回复

We thank the reviewer for providing [1] and [2], and we will include a discussion about these works in the final submission. The reviewer is correct that verification-in-the-loop training is a known approach. The main contribution of this paper is to enhance the scalability of verification-in-the-loop training of NCBFs. We focus on a key bottleneck of existing verification-in-the-loop training methods, namely, the difficulty of performing verification and generating counterexamples in a computationally efficient manner. We make the following contributions in this direction: (i) algorithms for enumerating the boundary activation sets to be verified that leverage the topological properties of the safe region to reduce runtime; (ii) a hierarchical verification approach that first verifies tractable sufficient conditions and then checks exact conditions if no safety proofs or counterexamples can be found; and (iii) a novel regularizer that minimizes the number of activation sets at the boundary of the safe region, and thus incorporates efficient verification as one of the criteria for training the NCBF.

In Equation 8, the last two terms are widely used in the training of the NCBFs. The first term of Equation 8 encourages fewer linear hyperplanes along the boundary of the obtained NCBF. To do this, we need to penalize the dissimilarity of activation patterns in such regions. To make the computation of this dissimilarity differentiable with respect to the neural network's parameters, we introduced a modified sigmoid function, controlled by kk, to perform the regularization. Figure 2 visualizes the effectiveness of this approach by showing the reduced variety of activation patterns of the trained neural network, and Table 1 quantitatively studies the number of boundary hyperplanes and the improved verification efficiency by employing this approach.

We further performed an ablation study on the hyperparameter kk, which can be found in the supplemental PDF. According to this study, we note that the training performance is robust in the choice of kk, as long as it is not too large to lead to gradient explosion during the backpropagation stage of training the neural network.

We will clarify Section 4 by adding an initial figure, as shown in the supplemental PDF, to describe the components of our approach. We will also add detailed descriptions of the algorithms (Appendix A.4) and the optimization problems (Appendices A.5 and A.6).

The reviewer is correct that it is difficult to directly compute exact solutions for the optimization problems for hyperplane and hinge verification, while conservative sufficient conditions may be more efficient but inexact. Our approach takes advantage of both methods by first attempting to verify safety using sufficient conditions. If the sufficient conditions are not satisfied, then we check safety using the exact conditions. In our evaluation of Spacecraft Rendezvous, we found that around 95% of the hinges can be verified with sufficient conditions, spending 5.9s (66% of hinge verification time), and the remaining 5% of hinges take 3.0s (34% of hinge verification time) when the sufficient conditions fail. Hence, in practice, our approach achieves exact verification with reduced computation time.

评论

Thanks for the clarification. It is suggested to put the ablation study of finding k into the main context to make it more clear. In the revised version, it is also suggested to compare the verification performance and time of inexact verification only with sufficient conditions with the proposed combined exact verification. Overall, considering the incremental verification-in-the-loop training techniques, I decide to raise my rating to be weak accept.

评论

We sincerely thank the reviewer for their valuable suggestions and for raising the rating. We will incorporate the suggested comparison between the sufficient conditions verification and exact verification in the final version. Additionally, we will put the ablation study on the hyperparameter kk in the main text to provide greater clarity. We appreciate your thoughtful feedback and consideration.

审稿意见
5

The authors propose a novel approach to synthesize neural control barrier functions (NCBFs) for continuous-time deterministic dynamical systems. Their goal is to synthesize a NCBF to prove the set invariance of the system wrt a given set. In order to do that, the authors propose a verification algorithm to prove that a neural network is a NCBF for a given system based on enumerating boundary segments. The efficacy of the method is evaluated on various benchmarks.

优点

  • The paper consider an important problem that is of interest for the community

  • The approach developed by the authors seems sound to me and the empirical evaluation highlights the improved efficiency of the methods compared to other existing approaches

缺点

  • The approach considered in this paper follows closely the approach developed in [15]. While this is not necessarily a problem, I feel that the results in this paper are a bit too incremental compared to the ones in [15]. To limit this risk, it would be important that the authors would extend the discussion in the related works compared to [15]. On this context, I acknowledge that in Table 2 SEEV shows improved computation times compared to [15], but it is not clear if that comes with an increased conservatism (because of the over-approximations introduced in SEEV) or if both methods are guaranteed to always return the same verification value.

  • I found some parts of the paper to be non-clear. For instance:

a) The overloading of notation of \mathbb{S} in Section 2.1 makes understanding the rest of the paper hard. In fact, first \mathbb{S} is first presented as a function of x and then is used as a set of neurons. Please, be precise and if you overload notation please say it explicitly

b) Proposition 1, I could not find the definition of what it means for a set of activation sets to be complete.

c) Problem 1 is a bit unclear. In fact, according to Proposition 1 a NCBF guarantees invariance with respect to set \mathcal{C}. But in Problem 1 additionally to that, it is required that a control action keep the system invariant wrt to another set \mathcal{D}\subseteq \mathcal{C}. Why is it this? Please, motivate why you need both of these conditions

  • Related to point c) it is unclear how in this paper the authors synthesize a control policy to satisfy Problem 1

问题

Additionally for for the points identified in the Weaknesses Section, consider also the following:

  • If I got it correctly, in solving the various non-linear optimization problems to prove that a neural network is a NCBF in practice you are relying on over-approximations and heuristics. Is this correct? If so, why you can call your method exact?

局限性

Please, see Weaknesses Section

作者回复

A comparison of the present paper with [15] is as follows. We note that our paper considers both the synthesis and verification of neural CBFs (NCBFs), while [15] only considered the verification problem. Moreover, while our approach verifies the exact conditions developed in [15], we greatly enhance scalability via the following novel technical contributions: (i) Instead of relying on off-the-shelf tools such as Linear Relaxation Based Perturbation Analysis (LiRPA) to enumerate the activation sets at the boundary of the safe region, we develop an enumeration algorithm that leverages the connectivity properties of the safe region to reduce runtime while maintaining the completeness of the enumeration; (ii) We propose a hierarchical verification approach in which novel tractable sufficient conditions are verified first, and the more complex exact conditions of [15] are only checked if the sufficient conditions fail; and (iii) We propose a new regularizer for training the NCBF that attempts to minimize the number of activation sets at the boundary, and hence minimizes the number of nonlinear programs that must be solved by the verifier. As shown in Table 1 of the paper, this regularizer reduced the number of boundary activation sets from 6,371 to 627 for a six-dimensional system (a reduction of over 90%). Our approach can be interpreted as introducing verification time as a criterion during NN training, and it could be of use in other NN applications.

Related to the comparison with [15], we emphasize that our approach is not conservative. It has the same exactness guarantees and is guaranteed to return the same value as [15]. While we utilize conservative over-approximations as a first step in the verification, the exact algorithms are used whenever the conservative over-approximations fail to return a conclusive result, i.e., either a proof of safety or a safety counterexample. We will revise the paper to make this point clear.

Thus, our paper utilizes over-approximations only as the first stage in the hierarchical pipeline to improve efficiency -- our verification checks easier problems and then solves harder problems if necessary. The final verification result is both sound and complete as the hinge enumeration and verification step solves the exact verification problem.

We will revise the paper to remove the overloaded notation S\mathbf{S}. A collection of activation sets S1,,Sr\mathbf{S_1},\ldots,\mathbf{S_r} is complete if, for any S{S1,,Sr}\mathbf{S}^{\prime} \notin \{\mathbf{S_1},\ldots,\mathbf{S_r}\}, we have X(S1)X(Sr)X(S)=\overline{\mathcal{X}}(\mathbf{S_1}) \cap \cdots \cap \overline{\mathcal{X}}(\mathbf{S_r}) \cap \overline{\mathcal{X}}(\mathbf{S}^{\prime}) = \emptyset. We will add this definition to the statement of Proposition 1.

We clarify Problem 1 and Proposition 1 as follows. The set D={x:b(x)0}\mathcal{D} = \{x: b(x) \geq 0\}, where bb is the NCBF to be trained, while the set C\mathcal{C} is the given safety constraint. Proposition 1 ensures that D\mathcal{D} is positive invariant and D\mathcal{D} is contained in C\mathcal{C}. This condition is weaker than the positive invariance of C\mathcal{C}, since there may exist x0CDx_0 \in \mathcal{C} \setminus \mathcal{D} such that x(t)Cx(t) \notin \mathcal{C} for some tt0t \geq t_{0} when x(t0)=x0x(t_0) = x_0. Since C\mathcal{C} is given a priori, it is generally not possible to guarantee the positive invariance of C\mathcal{C}. We will elaborate on this point in the text of the paper after Proposition 1.

The synthesis of a safe control policy for a given NCBF bb is discussed in [15] and is omitted from our paper due to space constraints. When x(t)x(t) is in the interior of an activation region X(S)\overline{\mathcal{X}}(\mathbf{S}), the gradient bx\frac{\partial b}{\partial x} is well-defined and any control input uUu \in \mathcal{U} satisfying bx(f(x(t))+g(x(t))u)α(b(x(t))\frac{\partial b}{\partial x}(f(x(t))+g(x(t))u) \geq -\alpha(b(x(t)) for some strictly increasing function α:RR\alpha: \mathbb{R} \rightarrow \mathbb{R} with α(0)=0\alpha(0) = 0 will ensure safety. If x(t)x(t) lies at the intersection of multiple activation regions X(S1),,X(Sr)\overline{\mathcal{X}}(\mathbf{S_1}),\ldots,\overline{\mathcal{X}}(\mathbf{S_r}), any control uUu \in \mathcal{U} that satisfies W(Si)T(f(x(t))+g(x(t))u)α(b(x))\overline{W}(\mathbf{S_i})^{T}(f(x(t))+g(x(t))u) \geq -\alpha(b(x)) for some i{1,,r}i \in \{1,\ldots,r\} will ensure safety. We have added a description of how to choose the control policy to the appendix.

评论

I would like to thank the authors for their reply, which clarified some of my doubts. I will then increase my score to 5. In fact, while I still feel the paper is borderline because of the similarities with [15], after the clarification of the authors on the guarantees of the method, I am now tending more towards acceptance. I would also encourage the authors to add the discussion on the synthesis of the safe policy in the paper.

评论

Dear Reviewer,

Thank you for your feedback and for taking the time to review our paper and responses. We are glad to hear that our response helped clarify some of your doubts, and we appreciate your decision to increase your score.

While we acknowledge the reference to [15], we would like to briefly reiterate that our work extends beyond the scope of [15] by addressing both the synthesis and verification of neural CBFs (NCBFs), while [15] focuses solely on verification. Additionally, our novel contributions significantly enhance the scalability of the verification process, as summarized in our earlier response. We appreciate your suggestion to include the discussion on the synthesis of the safe policy, and we will ensure to add this to the final version of the paper.

Thank you once again for your reviews and for increasing your score.

审稿意见
6

This paper proposes a new training and verification method to synthesize control barrier functions to formally prove the safety of a neural network-controlled nonlinear system. The approach used by this paper involves a new verification procedure that systematically enumerates all linear pieces of ReLU neural networks at the boundary of the barrier function via a breadth-first manner, as well as training strategies with various regularizations to ensure that the neural network does not have too many nonlinear pieces and also encourage the satisfaction of the safety condition. During training, counterexamples were also added to ensure convergence. The proposed method is then evaluated on several dynamical systems and the proposed approach outperformed the previous baseline and naive approaches.

优点

  1. The new verification approach, which enumerates linear pieces on the boundary in a breadth-first search manner, is (relatively) efficient and technically novel.

  2. The training procedure is carefully designed with several loss terms to aid the synthesizing of neural barrier functions. Some of these loss terms, such as the regularizer to limit the number of boundary hyperplanes, are insightful and may inspire future work.

  3. Numerical evaluations are comprehensive and also noticeably outperform existing baselines.

Based on these contributions, I tend to accept this paper.

缺点

  1. The proposed verification procedure is based on enumeration of the linear pieces in a ReLU neural network, and can be slow when the neural network is large. But since the problem under study is very difficult and the proposed approach can outperform naive baselines like directly using SMT solvers (dReal, Z3), this is not a big concern.

  2. The training loss involves multiple regularization terms, each with its own regularization parameter. Adjusting these parameters to balance each term can be difficult. It would be ideal to show a sensitivity analysis for these hyperparameters.

  3. The writing of this paper can be improved. It is difficult to follow the technical details in this paper as many essential formulations are presented only in the appendix.

问题

According to the appendix, several nonlinear programs are needed for the enumeration procedure, and some of them still require expensive solvers such as dReal to solve. Among these nonlinear programs, which ones are harder and take the majority of computation time? Is it possible to further scale up this approach using SOTA neural network verification tools such as alpha-beta-CROWN? A recent work (https://arxiv.org/pdf/2404.07956) has successfully applied neural network verification tools for synthesizing Lyapunov functions, which is also quite related to this work.

局限性

A limitation paragraph can be helpful. There are still many unsolved challenges in this field, and while this paper outperforms existing approaches, the scalability is still limited to less than 100 neurons and low dimensional environments, and it cannot be applied to non-ReLU neural networks.

作者回复

The reviewer is correct that our result involves multiple parameters, including the regularizer coefficients λB\lambda_B, λf\lambda_f, and λc\lambda_c, as well as the parameter kk used by the regularizer LBL_{B}. We have included ablation studies of these parameters in the supplemental PDF.

We thank the reviewer for the feedback regarding the paper presentation. We will improve the readability of the paper by adding an overview figure to Section 4, as shown in the supplemental PDF, and improving the clarity of the notations in the paper. Furthermore, we will move the definitions of the regularizers Lf\mathcal{L}_f and Lc\mathcal{L}_c to Section 3 of the paper. Although we will leave the optimization problem formulations (14)--(22) in the appendix due to space constraints, we will provide additional explanations (including derivations of Lipschitz-based relaxations) for each formulation.

The reviewer correctly points out that our approach, although falls back to expensive SMT/non-linear programs, greatly outperforms the algorithms directing employing them. Our hierarchical pipeline performs cheap sufficient condition checking to quickly reduce the need for solving expensive non-linear problems.

As for the question regarding the cost of solving nonlinear programs during enumeration, we first apologize for a confusion - there is a typo in the section title of A.5, which is supposed to be written "A.5 Linear Programs for Enumeration". The enumeration relies solely on linear programs. BoundaryLP in Eq. (14) is used to determine if S is on a boundary activation set. USLP in Eq. (15) checks if the neighboring hyperplane may contain the zero-level set, while HingeLP in Eq. (16) assesses whether the intersection of hyperplanes may contain the zero-level set. These linear programs can all be solved quickly. To further answer the reviewer's question about the cost of solving nonlinear programs during verification, we extend the discussion to "A.6 Nonlinear Programs for Verification". The hierarchical verification involves nonlinear programs for sufficient conditions in Eqs. (20) and (21), and exact conditions in Eqs. (19) and (22). Among these, Eq. (22) is the most challenging. However, the difficulty in solving Eq. (22) does not hinder the overall efficiency of the verification process due to the hierarchical design. In the Spacecraft Rendezvous case study, we observed that only 5% of hinge verifications are solved by Eq. (22), taking 3.0 seconds (34% of the hinge verification time).

We thank the reviewer for the suggestion of scaling up the approach using alpha-beta-CROWN and other NN verification tools. We first note that the referred paper [1] focuses on synthesizing a Lyapunov function, which is different from our contribution in efficient synthesis and verification of neural control barrier function. We will make sure to add the reference to it in the final version. We further note that, in the prior work [15] used as the baseline for our evaluation, NN verification tools such as Linear Relaxation Based Perturbation Analysis (LiRPA) were used to enumerate activation sets at the boundary. Our proposed approach significantly reduces the runtime of this enumeration stage compared to this baseline. For example, in the obstacle avoidance case, [15] used 169.5s for enumeration, while our method used 20.6s. Moreover, unlike many of the existing NN verification works (including the recent work suggested by the reviewer), we consider a continuous-time problem setting. In continuous-time, the verification problem reduces to proving that, for any x with bθ(x)=0b_{\theta}(x) = 0, there exists control uu satisfying bθx(f(x)+g(x)u)0.\frac{\partial b_{\theta}}{\partial x}(f(x)+g(x)u) \geq 0. Hence, verifying safety in continuous time requires joint consideration of the reachable set of bθ(x)b_{\theta}(x) as well as the gradient bθx\frac{\partial b_{\theta}}{\partial x}, rendering many of the SOTA NN verification tools not directly applicable. We believe that generalizing such tools to our problem setting is a promising direction for future work and has the potential to further improve the scalability of the verification.

We plan to include a limitation paragraph in the final version of the paper that contains the points raised by the reviewer, including scalability to higher-dimensional systems and more complex NNs as well as generalization to non-ReLU activation functions.

[1] Yang, Lujie, et al. Lyapunov-stable Neural Control for State and Output Feedback: A Novel Formulation for Efficient Synthesis and Verification. CoRR, abs/2404.07956.

评论

Thank you for the response. In the final version, it would be great if you could add a clear time deposition of each nonlinear program to the paper so people can understand which part is more challenging in this proposed method. Given its complex nature, it helps people understand the scalability of this algorithm. The addition of discussions and comparisons to NN verifier-based approaches such as [1] and [15] would also be very beneficial. Although many things can be improved, I think this paper is above the bar of NeurIPS and overall I support the acceptance of this paper.

评论

Thank you for your feedback and for supporting the acceptance of our paper. We will incorporate the suggested changes in our final version by providing a detailed breakdown of the runtime for the Space Rendezvous scenario, as well as a time comparison to [15] in the Obstacle Avoidance case study. We appreciate your valuable suggestions and support.

作者回复

We would like to thank the reviewers for providing detailed comments that have helped improve the quality of our manuscript. We have provided rebuttals to the comments of each reviewer. We have also attached a PDF file containing additional simulations requested by the reviewers. In this general rebuttal, we emphasize the main contributions of our paper:

  1. We propose a hierarchical exact verification approach in which novel tractable sufficient conditions are verified first, and the more complex exact conditions are only checked if the sufficient conditions fail.
  2. We propose a new regularizer for training the NCBF that attempts to minimize the number of activation sets at the boundary, and hence minimizes the number of nonlinear programs that must be solved by the verifier.

We would like to further highlight that our approach is not conservative. It provides exact guarantees of the safety properties of NCBF. While we utilize conservative over-approximations as a first step in the verification, the exact algorithms are used whenever the conservative over-approximations fail to return a conclusive result, i.e., either a proof of safety or a safety counterexample.

We look forward to answering further questions during the author-reviewer discussion period.

最终决定

There is broad consensus among the expert referees that the paper should be accepted for publication. The authors are advised to take into account the detailed reviews as well as the clarifications provided in the rebuttal when revising the manuscript.