Course on Automated Theorem Proving
Contents:
- Theoretical foundations of calculi for automated theorem proving in first-order logic
- Correctness and completeness proofs
- Algorithms and data structures used in first-order logic theorem provers
- Comparison of different approaches to first-order theorem proving
- Foundations of modern SAT and SMT solvers
Literature:
Robinson, Voronkov: Handbook of Automated Reasoning, 2 vols., North-Holland
Prerequisites:
Highly recommended is participation in the lecture “Aussagen- und Prädiketenlogik” (propositional and first-order logic) or a similar module. Basic training in mathematics should be sufficient.
- Dozent*in: Richard Bubel
- Dozent*in: Lukas Grätz
- Dozent*in: Reiner Hähnle
Artificial intelligence and natural language processing are a part of our everyday life. The decisions that we make when building and using NLP-based applications can impact the world and society -- for better or worse. In this course we discuss the ethics of NLP research, from theoretical foundations (what is ethics? what is fairness? what is privacy?) to real-world, state-of-the-art NLP and AI applications that can do both a lot of good, and a lot of harm.
We cover topics such as:
- Foundations and history of ethics and NLP
- Bias: building fair NLP applications in an unfair world
- Privacy: data ownership and responsible data handling in NLP and AI
- Safety: benefits and dangers of state-of-the-art AI systems and LLMs
- Social good: using NLP to help emergency response, fight discrimination and make the technology benefit people who need it most.
- Dozent*in: Ilia Kuznetsov
Collaborative learning, and in particular Federated Learning (FL) is a Machine Learning approach in which multiple clients collaboratively train a Neural Network (NN) model on their private data without the need to share the data. With the increasing large-scale application of FL systems in real-world settings, e.g., for IoT Malware detection or mobile risk management, a number of security, privacy, and functional challenges are posed in the design and implementation of the underlying algorithms and systems.
Besides giving an introduction to the security perspective of Machine Learning, this interactive course will focus on security and privacy attacks and defenses in FL systems. In particular, the course will cover attach such as model/data poisoning and backdoor attacks that allow the adversary to control the outcome of the learning system. The course will cover the introduction of the different components of federated learning systems both on clients and server (aggregation algorithms) and provides hands-on tasks of different difficulty including the state-of-the-art backdoor attacks and defenses.
- Dozent*in: Phillip Rieger
Large language models have transformed the AI industry and became part of our everyday lives, used by individuals, businesses and governments. Yet the same qualities that make LLMs stand out also make them notoriously hard to evaluate. Given an LLM, how do know what it can or cannot do? How do we know if this behavior holds across different application contexts? What evidence should we accept as a proof of LLM capability or lack thereof? What shortcuts should we avoid when thinking and talking about intelligent machines? Against the backdrop of anecdotal evidence, media hype, ungrounded worries and legitimate concerns about the LLM capabilities, this years' seminar takes a deep dive into the topic of LLM evaluation. Grounded in work on measurement theory and state-of-the-art LLM evaluation practice, we will explore the basic LLM evaluation paradigms, fundamental challenges in making robust statements about the behavior of LLMs and other intelligent agents, and the potential ways forward.
- Dozent*in: Ilia Kuznetsov
Advanced type systems offer a compelling way for proving absence of entire classes of errors without even running any program. We will cover among other things the following topics:
- implementing type systems
- programming with dependent types
- the lambda calculus, simple types, polymorphism, and more
- typing rules, type checking, type inference, type soundness, and more
- syntax, semantics, and mechanization of type systems properties
The course will feature homework using the dependently-typed Lean4, a modern functional and dependently typed programming language, that can be used both to write efficient programs, but at the same time serves as an interactive proof assistant, exploiting the proofs-as-programs correspondence (also known as Curry-Howard).
This is a new course. Before scaling up to at-will registration, participation is limited this semester. Applications will be made on the first lecture day, and selected participants will be notified by/on the second lecture day.
- Dozent*in: David Richter
Dieses Seminar ist eine kleine Veranstaltung mit maximal 6 Teilnehmenden. Sie nehmen an zweiwöchentlichen online-Seminarsitzungen teil, erstellen eine multimediale Selbstlernheit und fertigen zusätzlich eine schriftliche Ausarbeitung von ca. 7-10 Seiten an. Das Seminar gehört zu den Modulen "Seminar Angewandte/Praktische Aspekte der Informatik im Unterricht" und "IT in der Grundlehre".
Bei Interesse: Mail an svana.esche@tu-darmstadt.de bis spätestens 16.04.
- Dozent*in: Svana Esche
- Dozent*in: Richard Bubel
- Dozent*in: Daniel Drodt
- Dozent*in: Lukas Grätz
- Dozent*in: Reiner Hähnle
- Dozent*in: Niklas Heidler
- Dozent*in: Marco Scaletta
In this seminar, different security aspects of hardware, systems, artificial intelligence, and embedded devices will be analyzed and discussed. Students will work in groups to process, summarize, and evaluate a number of current scientific publications for a certain topic in the form of an essay. Additionally, each group will present their work at the end of the semester.
Possible topics include:
- Hardware Security
- CPU/Processor Security
- Fuzzing and Automatic Vulnerability Detection
- Security models of current smartphone operating systems (e.g. Android, iOS, Windows Phone, MeeGo, Symbian, RIM)
- Security of mobile devices
- Trusted Hardware
- Internet of Things (IoT)
- Application security (e.g., mobile malware and runtime attacks)
- Privacy aspects in mobile devices
- Security of mobile networks
- Applications of Machine Learning for Security
- Privacy aspects of Deep Neural Networks
- Security Attacks and Defenses against Deep Neural Networks
- Distributed Training of Deep Neural Networks
- Dozent*in: Jonathan Knauer
- Dozent*in: Phillip Rieger
- Dozent*in: Yoel Rodrigues
Participants independently solve alone or in a small group an individually a given problem. The problems are usually programming projects inspired by the research performed at the Systems Group.
Possible areas are:
- from the area Security & Systems
- Secure Data Systems
- Trustworthy Databases
- Secure Analytics and Machine Learning
- from the area Machine Learning for Data Engineering
- Enterprise Data Engineering with LLMs
- Data Discovery in Data Lakes
- Foundation Models for Tabular Data
- Explainable Data Science
- from the area Future Data Systems
- Modern Hardware for Data Systems
- Learned Data Systems
- Systems for Machine Learning
- Cloud Data Systems
In this lab the students will realise a project defined by their advisor. Compared to the “Systems Lab”, the “Systems Extended Lab” requires more work and a written report
- Dozent*in: Carsten Binnig
- Dozent*in: Alessandro Ferri
- Dozent*in: Zsolt István
- Dozent*in: Johannes Wehrstein