Neural Network Robustness Analysis Framework
Project description
VERification Of Neural Architectures (VERONA)
VERONA simplifies your experiment pipeline for performing local robustness verification on your networks and datasets. VERONA is class-based, which means that extending the existing configurations is accessible and easy. With one script it is possible to run an entire experiment with various networks, images and perturbation magnitudes (epsilons).
Example use cases of the VERONA package include creating robustness distributions Bosman, Berger, Hoos and van Rijn, 2025, empirically measuring robustness of networks using adversarial attacks and verifying networks with formal verification tools using the external auto-verify package.
Authors
This package was created and is maintained by members the ADA Research Group, which focuses on the development of AI techniques that complement human intelligence and automated algorithm design. The current core team includes:
- Annelot Bosman (LIACS, Leiden University)
- Aaron Berger (TU Delft)
- Hendrik Baacke (AIM, RWTH Aachen University)
- Holger H. Hoos (AIM, RWTH Aachen University)
- Jan van Rijn (LIACS, Leiden University)
Installation and Environment Setup
We recommend to have a look at the Documentation.
Create Virtual Environment and install ada-verona
The python package for VERONA is called ada-verona, as our research group is called ADA.
To run ada-verona, we recommend to set up a conda environment. We also recommend using miniforge as the package manager and using uv for dependency management.
Create a new conda environment named verona_env:
conda create -n verona_env python=3.10
conda activate verona_env
Installing the package
Inside the conda environment, install the ada-verona package:
uv pip install ada-verona
GPU-version Installation
Note that the default installation is CPU-only, and that we recommend to install the GPU version for full functionality, as, e.g. AB-CROWN, heavily relies on GPU parallelization for practical performance. The package resolver will automatically resolve the correct version of the package for your system, depending on whether you have a GPU available, but you can also explicitly install the GPU version with the following command:
uv pip install ada-verona[gpu]
Local installation
If you want to install ada-verona locally using git:
git clone https://github.com/ADA-research/VERONA.git
cd VERONA
uv pip install -e .
uv pip install -e .[dev] # to include development dependencies
Optional: AutoAttack Installation
To use the AutoAttack adversarial attack wrapper (AutoAttackWrapper), you need to install AutoAttack from its GitHub repository:
uv pip install git+https://github.com/fra31/auto-attack
This package provides ensemble-based adversarial attacks for robustness evaluation, as described in the paper by Croce and Hein (2020).
Optional: AutoVerify Installation
To use the auto-verify verifiers, you need to additionally install auto-verify:
Note: On macOS (and sometimes on Linux), you may need to install swig first with conda install -c conda-forge swig.
uv pip install auto-verify>=0.1.4
This package provides a framework for integrating verifiers. Please refer to the auto-verify documentation for details about auto-verify.
Guides
To help you get up and running with ada-verona, we provide a tutorial notebook and a collection of example scripts in the folder examples :
-
Main Guide:
- The primary resource for learning how to use VERONA is the Jupyter notebook found in the
notebooksfolder. This tutorial notebook offers an overview of the package components, step-by-step instructions, and practical demonstrations of typical workflows. We highly recommend starting here to understand the core concepts and capabilities of the package.
- The primary resource for learning how to use VERONA is the Jupyter notebook found in the
-
Quick-Start Example Scripts:
- The
scriptsfolder contains a variety of example scripts designed to help you get started quickly with ada-verona. These scripts cover common use cases and can be run directly (from within thescriptsfolder) to see how to perform tasks such as:- Running VERONA with a custom dataset and ab-crown (
create_robustness_distribution_from_test_dataset.py). - Loading a PyTorch dataset and running VERONA with one-to-any or one-to-one verification (
create_robustness_dist_on_pytorch_dataset.py). - Distributing jobs across multiple nodes using SLURM for large-scale experiments (
multiple_jobsfolder), including distributing tasks over CPU and GPU for different verifiers in the same experiment. - Using auto-verify integration (
create_robustness_dist_with_auto_verify.py).
- Running VERONA with a custom dataset and ab-crown (
- The
The notebook is your main entry point for learning and understanding the package, while the scripts serve as practical templates and quick-start resources for your own experiments.
Datasets
The package was tested on the MNIST, GTRSB and the CIFAR-10 datasets. Example scripts for executing the package on MNIST or a custom dataset can be found in the scripts folder.
Related Papers and Citation
This package was created to simplify reproducing and extending the results of different lines of work of the ADA research group. For more information about the ADA research group, please refer to the official website.
Robustness distributions
Please cite this paper when you have used VERONA in your experiments:
@article{BosEtAl25,
author = {Annelot W Bosman, Aaron Berger, Holger H Hoos, Jan N van Rijn},
title = {Robustness Distributions in Neural Network Verification},
booktitle = {Journal of Artificial Intelligence Research}.
year = {2025}
}
Acknowledgements
This package makes use of the following tools and libraries:
-
AutoAttack (GitHub)
- F. Croce and M. Hein, "Mind the box: l_1 -APGD for sparse adversarial attacks on image classifiers," in International Conference on Machine Learning, PMLR, 2021, pp. 2201–2211. [Online]. Available: https://proceedings.mlr.press/v139/croce21a.html
- F. Croce and M. Hein, "Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks," in International conference on machine learning, PMLR, 2020, pp. 2206–2216. [Online]. Available: https://proceedings.mlr.press/v119/croce20b.html
-
auto-verify (GitHub)
- For integrating verifiers nnenum, AB-Crown, VeriNet, and Oval-Bab. Please refer to the auto-verify documentation for details about auto-verify.
We thank the authors and maintainers of these projects, as well as the authors and maintainers of the verifiers for their contributions to the robustness research community.
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file ada_verona-1.0.2.tar.gz.
File metadata
- Download URL: ada_verona-1.0.2.tar.gz
- Upload date:
- Size: 117.9 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: uv/0.9.9 {"installer":{"name":"uv","version":"0.9.9"},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Ubuntu","version":"24.04","id":"noble","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":true}
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
865259bd9804cb9b06945f7493c31e1e3bdfac324d494630650fe51848b92937
|
|
| MD5 |
7ca5696954f1402b98b5ad603b43a57c
|
|
| BLAKE2b-256 |
12c09f8ba94f83277f886fd94750e4250c9e5eccc989053481fd5e4e8cda4a7c
|
File details
Details for the file ada_verona-1.0.2-py3-none-any.whl.
File metadata
- Download URL: ada_verona-1.0.2-py3-none-any.whl
- Upload date:
- Size: 60.2 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: uv/0.9.9 {"installer":{"name":"uv","version":"0.9.9"},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Ubuntu","version":"24.04","id":"noble","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":true}
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
efafe87917de85ca2244495763c5820c79c7dacb86b2d0efb580cc2fc3a37a3a
|
|
| MD5 |
faf7ce02f6f03e486950f16038b9ee5e
|
|
| BLAKE2b-256 |
9535dc3fcd14b27c3141a2cf619a5bcca2cd748c11d4caa2b49f9377e9ce1a2d
|