ModelDiff: testing-based DNN similarity comparison for model reuse detection
暂无分享,去创建一个
Yunxin Liu | Bingyan Liu | Ziyue Yang | Yuanchun Li | Ziqi Zhang | Yuanchun Li | Ziyue Yang | Yunxin Liu | Ziqi Zhang | Bingyan Liu
[1] Simon S. Woo,et al. Neural Network Laundering: Removing Black-Box Backdoor Watermarks from Deep Neural Networks , 2020, Comput. Secur..
[2] Junfeng Yang,et al. DeepXplore: Automated Whitebox Testing of Deep Learning Systems , 2017, SOSP.
[3] Li Fei-Fei,et al. ImageNet: A large-scale hierarchical image database , 2009, CVPR.
[4] Andrew Gordon Wilson,et al. Simple Black-box Adversarial Attacks , 2019, ICML.
[5] Hal Berghel,et al. Measurements of program similarity in identical task environments , 1984, SIGP.
[6] Nick Antonopoulos,et al. An Empirical Evaluation of Adversarial Robustness under Transfer Learning , 2019, ArXiv.
[7] Brendan Dolan-Gavitt,et al. BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain , 2017, ArXiv.
[8] Geoffrey E. Hinton,et al. Similarity of Neural Network Representations Revisited , 2019, ICML.
[9] Lei Ma,et al. DeepGauge: Multi-Granularity Testing Criteria for Deep Learning Systems , 2018, 2018 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE).
[10] Wen-Chuan Lee,et al. Trojaning Attack on Neural Networks , 2018, NDSS.
[11] Jinyuan Jia,et al. IPGuard: Protecting the Intellectual Property of Deep Neural Networks via Fingerprinting the Classification Boundary , 2019, ArXiv.
[12] Benjamin C. M. Fung,et al. Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[13] Shahbaz Rezaei,et al. A Target-Agnostic Attack on Deep Models: Exploiting Security Vulnerabilities of Transfer Learning , 2019, ICLR.
[14] Aleksander Madry,et al. Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.
[15] Vicente Ordonez,et al. Testing DNN Image Classifiers for Confusion & Bias Errors , 2020, 2020 IEEE/ACM 42nd International Conference on Software Engineering: Companion Proceedings (ICSE-Companion).
[16] Lei Ma,et al. DeepHunter: a coverage-guided fuzz testing framework for deep neural networks , 2019, ISSTA.
[17] Le Song,et al. Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection , 2018 .
[18] Yuanyuan Zhou,et al. CP-Miner: finding copy-paste and related bugs in large-scale software code , 2006, IEEE Transactions on Software Engineering.
[19] Ben Y. Zhao,et al. Latent Backdoor Attacks on Deep Neural Networks , 2019, CCS.
[20] Suman Jana,et al. DeepTest: Automated Testing of Deep-Neural-Network-Driven Autonomous Cars , 2017, 2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE).
[21] Mark Sandler,et al. MobileNetV2: Inverted Residuals and Linear Bottlenecks , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[22] Samy Bengio,et al. Insights on representational similarity in neural networks with canonical correlation , 2018, NeurIPS.
[23] Hanan Samet,et al. Pruning Filters for Efficient ConvNets , 2016, ICLR.
[24] Lixin Fan,et al. Rethinking Deep Neural Network Ownership Verification: Embedding Passports to Defeat Ambiguity Attacks , 2019, NeurIPS.
[25] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[26] Michael Naehrig,et al. CryptoNets: applying neural networks to encrypted data with high throughput and accuracy , 2016, ICML 2016.
[27] Samet Demir,et al. DeepSmartFuzzer: Reward Guided Test Generation For Deep Learning , 2019, AISafety@IJCAI.
[28] Geoffrey E. Hinton,et al. Distilling the Knowledge in a Neural Network , 2015, ArXiv.
[29] Jens Krinke,et al. Identifying similar code with program dependence graphs , 2001, Proceedings Eighth Working Conference on Reverse Engineering.
[30] Qiang Yang,et al. A Survey on Transfer Learning , 2010, IEEE Transactions on Knowledge and Data Engineering.
[31] Shin'ichi Satoh,et al. Embedding Watermarks into Deep Neural Networks , 2017, ICMR.
[32] Kunle Olukotun,et al. DAWNBench : An End-to-End Deep Learning Benchmark and Competition , 2017 .
[33] Maninder Singh,et al. Software clone detection: A systematic review , 2013, Inf. Softw. Technol..
[34] Jascha Sohl-Dickstein,et al. SVCCA: Singular Vector Canonical Correlation Analysis for Deep Learning Dynamics and Interpretability , 2017, NIPS.
[35] Irfan Ul Haq,et al. A Survey of Binary Code Similarity , 2019, ACM Comput. Surv..
[36] Daniel Shawcross Wilkerson,et al. Winnowing: local algorithms for document fingerprinting , 2003, SIGMOD '03.
[37] Qian Huang,et al. Enhancing Adversarial Example Transferability With an Intermediate Level Attack , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[38] Yuanchun Li,et al. DroidBot: A Lightweight UI-Guided Test Input Generator for Android , 2017, 2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C).
[39] Jun Zhu,et al. Evading Defenses to Transferable Adversarial Examples by Translation-Invariant Attacks , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[40] K. J. Ottenstein. An algorithmic approach to the detection and prevention of plagiarism , 1976, SGCS.
[41] Fei-Fei Li,et al. Novel Dataset for Fine-Grained Image Categorization : Stanford Dogs , 2012 .
[42] Farinaz Koushanfar,et al. DeepSigns: An End-to-End Watermarking Framework for Ownership Protection of Deep Neural Networks , 2019, ASPLOS.
[43] Eul Gyu Im,et al. Software plagiarism detection: a graph-based approach , 2013, CIKM.
[44] Yuanchun Li,et al. What's Inside My App?: Understanding Feature Redundancy in Mobile Apps , 2018, 2018 IEEE/ACM 26th International Conference on Program Comprehension (ICPC).
[45] Mark Harman,et al. An Analysis and Survey of the Development of Mutation Testing , 2011, IEEE Transactions on Software Engineering.
[46] Dan Boneh,et al. Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware , 2018, ICLR.
[47] Fan Zhang,et al. Stealing Machine Learning Models via Prediction APIs , 2016, USENIX Security Symposium.
[48] Miodrag Potkonjak,et al. Watermarking Deep Neural Networks for Embedded Systems , 2018, 2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[49] Jiang Ming,et al. BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking , 2017, USENIX Security Symposium.
[50] Chanchal Kumar Roy,et al. NICAD: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization , 2008, 2008 16th IEEE International Conference on Program Comprehension.
[51] Christian Rossow,et al. Cross-Architecture Bug Search in Binary Executables , 2015, 2015 IEEE Symposium on Security and Privacy.
[52] Florian Kerschbaum,et al. Deep Neural Network Fingerprinting by Conferrable Adversarial Examples , 2019, ICLR.
[53] Benny Pinkas,et al. Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring , 2018, USENIX Security Symposium.
[54] Jin Song Dong,et al. White-box Fairness Testing through Adversarial Sampling , 2020, 2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE).
[55] Collin McMillan,et al. Detecting similar software applications , 2012, 2012 34th International Conference on Software Engineering (ICSE).
[56] David Brumley,et al. Blanket Execution: Dynamic Similarity Testing for Program Binaries and Components , 2014, USENIX Security Symposium.
[57] Yunxin Liu,et al. DeepPayload: Black-box Backdoor Attack on Deep Learning Models through Neural Payload Injection , 2021, 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE).
[58] Yao Guo,et al. Dynamic slicing for deep neural networks , 2020, ESEC/SIGSOFT FSE.
[59] Song Han,et al. Learning both Weights and Connections for Efficient Neural Network , 2015, NIPS.
[60] Florian Kerschbaum,et al. On the Robustness of Backdoor-based Watermarking in Deep Neural Networks , 2019, IH&MMSec.
[61] Farinaz Koushanfar,et al. DeepAttest: An End-to-End Attestation Framework for Deep Neural Networks , 2019, 2019 ACM/IEEE 46th Annual International Symposium on Computer Architecture (ISCA).
[62] David Clark,et al. A comparison of code similarity analysers , 2018, Empirical Software Engineering.
[63] Wen-Chuan Lee,et al. MODE: automated neural network model debugging via state differential analysis and input selection , 2018, ESEC/SIGSOFT FSE.
[64] Diptikalyan Saha,et al. Black box fairness testing of machine learning models , 2019, ESEC/SIGSOFT FSE.
[65] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[66] Ben Y. Zhao,et al. With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning , 2018, USENIX Security Symposium.
[67] Andrew Zisserman,et al. Automated Flower Classification over a Large Number of Classes , 2008, 2008 Sixth Indian Conference on Computer Vision, Graphics & Image Processing.
[68] Chao Zhang,et al. $\alpha$ Diff: Cross-Version Binary Code Similarity Detection with DNN , 2018, 2018 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE).
[69] Fabio Roli,et al. Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks , 2018, USENIX Security Symposium.
[70] Tribhuvanesh Orekondy,et al. Knockoff Nets: Stealing Functionality of Black-Box Models , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[71] Ian Goodfellow,et al. TensorFuzz: Debugging Neural Networks with Coverage-Guided Fuzzing , 2018, ICML.
[72] Song Han,et al. Deep Compression: Compressing Deep Neural Network with Pruning, Trained Quantization and Huffman Coding , 2015, ICLR.
[73] Farinaz Koushanfar,et al. DeepMarks: A Secure Fingerprinting Framework for Digital Rights Management of Deep Learning Models , 2019, ICMR.
[74] Mark Harman,et al. Machine Learning Testing: Survey, Landscapes and Horizons , 2019, IEEE Transactions on Software Engineering.
[75] Zhendong Su,et al. Automatic mining of functionally equivalent code fragments via random testing , 2009, ISSTA.
[76] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.