Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3368089.3409676acmconferencesArticle/Chapter ViewAbstractPublication PagesfseConference Proceedingsconference-collections
research-article

Dynamic slicing for deep neural networks

Published: 08 November 2020 Publication History

Abstract

Program slicing has been widely applied in a variety of software engineering tasks. However, existing program slicing techniques only deal with traditional programs that are constructed with instructions and variables, rather than neural networks that are composed of neurons and synapses. In this paper, we introduce NNSlicer, the first approach for slicing deep neural networks based on data-flow analysis. Our method understands the reaction of each neuron to an input based on the difference between its behavior activated by the input and the average behavior over the whole dataset. Then we quantify the neuron contributions to the slicing criterion by recursively backtracking from the output neurons, and calculate the slice as the neurons and the synapses with larger contributions. We demonstrate the usefulness and effectiveness of NNSlicer with three applications, including adversarial input detection, model pruning, and selective model protection. In all applications, NNSlicer significantly outperforms other baselines that do not rely on data flow analysis.

Supplementary Material

Auxiliary Teaser Video (fse20main-p102-p-teaser.mp4)
main video
Auxiliary Presentation Video (fse20main-p102-p-video.mp4)
main video

References

[1]
Hiralal Agrawal, Richard A DeMillo, and Eugene H Spaford. 1993. Debugging with dynamic slicing and backtracking. Software: Practice and Experience 23, 6 ( 1993 ), 589-616.
[2]
Rima Alaifari, Giovanni S Alberti, and Tandri Gauksson. 2018. ADef: an iterative algorithm to construct adversarial deformations. arXiv preprint arXiv: 1804. 07729 ( 2018 ).
[3]
Stephan Arlt, Andreas Podelski, and Martin Wehrle. 2014. Reducing GUI test suites via program slicing. In Proceedings of the 2014 International Symposium on Software Testing and Analysis. ACM, 270-281.
[4]
Tanzirul Azim, Arash Alavi, Iulian Neamtiu, and Rajiv Gupta. 2019. Dynamic slicing for android. In 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE). IEEE, 1154-1164.
[5]
David Binkley, Nicolas Gold, Mark Harman, Syed Islam, Jens Krinke, and Shin Yoo. 2014. ORBS: Language-independent program slicing. In 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering. ACM, 109-120.
[6]
David W Binkley and Mark Harman. 2004. A survey of empirical results on program slicing. Adv. Comput. 62, 105178 ( 2004 ), 105-178.
[7]
Leo Breiman. 2017. Classification and regression trees. Routledge.
[8]
Wieland Brendel, Jonas Rauber, and Matthias Bethge. 2017. Decision-based adversarial attacks: Reliable attacks against black-box machine learning models. arXiv preprint arXiv:1712.04248 ( 2017 ).
[9]
Shaofeng Cai, Gang Chen, Beng Chin Ooi, and Jinyang Gao. 2019. Model slicing for supporting complex analytics with elastic inference cost and resource constraints. VLDB Endowment 13, 2 ( 2019 ), 86-99.
[10]
Gerardo Canfora, Aniello Cimitile, and Andrea De Lucia. 1998. Conditioned program slicing. Information and Software Technology 40, 11-12 ( 1998 ), 595-607.
[11]
Nicholas Carlini and David Wagner. 2017. Towards evaluating the robustness of neural networks. In 2017 IEEE Symposium on Security and Privacy (SP). IEEE, 39-57.
[12]
Edward Chou, Josh Beal, Daniel Levy, Serena Yeung, Albert Haque, and Li Fei-Fei. 2018. Faster cryptonets: Leveraging sparsity for real-world encrypted inference. arXiv preprint arXiv:1811. 09953 ( 2018 ).
[13]
Dan CireşAn, Ueli Meier, Jonathan Masci, and Jürgen Schmidhuber. 2012. Multicolumn deep neural network for trafic sign classification. Neural networks 32 ( 2012 ), 333-338.
[14]
Edmund M Clarke, Masahiro Fujita, Sreeranga P Rajan, T Reps, Subash Shankar, and Tim Teitelbaum. 1999. Program slicing of hardware description languages. In Advanced Research Working Conference on Correct Hardware Design and Verification Methods. Springer, 298-313.
[15]
Jacson Rodrigues Correia-Silva, Rodrigo F Berriel, Claudine Badue, Alberto F de Souza, and Thiago Oliveira-Santos. 2018. Copycat CNN : Stealing knowledge by persuading confession with random non-labeled data. In 2018 International Joint Conference on Neural Networks (IJCNN). IEEE, 1-8.
[16]
Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. IACR Cryptology ePrint Archive 2016, 086 ( 2016 ), 1-118.
[17]
Victor Costan, Ilia Lebedev, and Srinivas Devadas. 2016. Sanctum: Minimal hardware extensions for strong software isolation. In 25th USENIX Security Symposium (USENIX Security 16). 857-874.
[18]
Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2019. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. ( 2019 ).
[19]
Xiaoning Du, Xiaofei Xie, Yi Li, Lei Ma, Yang Liu, and Jianjun Zhao. 2019. Deepstellar: model-based quantitative analysis of stateful deep learning systems. In 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 477-487.
[20]
Ali Mamdouh Elkahky, Yang Song, and Xiaodong He. 2015. A multi-view deep learning approach for cross domain user modeling in recommendation systems. In 24th International Conference on World Wide Web. 278-288.
[21]
Logan Engstrom, Dimitris Tsipras, Ludwig Schmidt, and Aleksander Madry. 2017. A rotation and a translation sufice: Fooling cnns with simple transformations. arXiv preprint arXiv:1712.02779 1, 2 ( 2017 ), 3.
[22]
Gil Fidel, Ron Bitton, and Asaf Shabtai. 2019. When Explainability Meets Adversarial Learning: Detecting Adversarial Examples using SHAP Signatures. arXiv preprint arXiv: 1909. 03418 ( 2019 ).
[23]
Keith Brian Gallagher and James R Lyle. 1991. Using program slicing in software maintenance. IEEE transactions on software engineering 8 ( 1991 ), 751-761.
[24]
Timon Gehr, Matthew Mirman, Dana Drachsler-Cohen, Petar Tsankov, Swarat Chaudhuri, and Martin Vechev. 2018. AI2: Safety and robustness certification of neural networks with abstract interpretation. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE, 3-18.
[25]
Felix A Gers and E Schmidhuber. 2001. LSTM recurrent networks learn simple context-free and context-sensitive languages. IEEE Transactions on Neural Networks 12, 6 ( 2001 ), 1333-1340.
[26]
Ran Gilad-Bachrach, Nathan Dowlin, Kim Laine, Kristin Lauter, Michael Naehrig, and John Wernsing. 2016. Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy. In International Conference on Machine Learning. 201-210.
[27]
Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 ( 2014 ).
[28]
Divya Gopinath, Hayes Converse, Corina Pasareanu, and Ankur Taly. 2019. Property inference for deep neural networks. In 34th IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, 797-809.
[29]
Divya Gopinath, Kaiyuan Wang, Mengshi Zhang, Corina S Pasareanu, and Sarfraz Khurshid. 2018. Symbolic execution for deep neural networks. arXiv preprint arXiv:1807. 10439 ( 2018 ).
[30]
Xiaodong Gu, Hongyu Zhang, Dongmei Zhang, and Sunghun Kim. 2016. Deep API learning. In 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering. 631-642.
[31]
Song Han, Huizi Mao, and William J Dally. 2016. Deep compression: compressing deep neural networks with pruning, trained quantization and hufman coding. In 4th International Conference on Learning Representations, ICLR.
[32]
Song Han, Jef Pool, John Tran, and William Dally. 2015. Learning both weights and connections for eficient neural network. In Advances in neural information processing systems. 1135-1143.
[33]
Mark Harman, David Binkley, and Sebastian Danicic. 2003. Amorphous program slicing. Journal of Systems and Software 68, 1 ( 2003 ), 45-64.
[34]
Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep residual learning for image recognition. In IEEE conference on computer vision and pattern recognition (CVPR). 770-778.
[35]
Yihui He, Xiangyu Zhang, and Jian Sun. 2017. Channel pruning for accelerating very deep neural networks. In IEEE International Conference on Computer Vision (CVPR). 1389-1397.
[36]
Susan Horwitz, Thomas Reps, and David Binkley. 1990. Interprocedural slicing using dependence graphs. ACM Transactions on Programming Languages and Systems (TOPLAS) 12, 1 ( 1990 ), 26-60.
[37]
Xing Hu, Ling Liang, Lei Deng, Shuangchen Li, Xinfeng Xie, Yu Ji, Yufei Ding, Chang Liu, Timothy Sherwood, and Yuan Xie. 2019. Neural network model extraction attacks in edge devices by hearing architectural hints. arXiv preprint arXiv: 1903. 03916 ( 2019 ).
[38]
Matthew Jagielski, Nicholas Carlini, David Berthelot, Alex Kurakin, and Nicolas Papernot. 2019. High-fidelity extraction of neural network models. arXiv preprint arXiv:1909. 01838 ( 2019 ).
[39]
Mika Juuti, Sebastian Szyller, Samuel Marchal, and N Asokan. 2019. PRADA: protecting against DNN model stealing attacks. In IEEE European Symposium on Security and Privacy (EuroS&P). 512-527.
[40]
Guy Katz, Clark Barrett, David L Dill, Kyle Julian, and Mykel J Kochenderfer. 2017. Reluplex: An eficient SMT solver for verifying deep neural networks. In International Conference on Computer Aided Verification. Springer, 97-117.
[41]
Paul Kocher, Joshua Jafe, and Benjamin Jun. 1999. Diferential power analysis. In Annual International Cryptology Conference. Springer, 388-397.
[42]
Bogdan Korel and Janusz Laski. 1988. Dynamic program slicing. Inform. Process. Lett. 29, 3 ( 1988 ), 155-163.
[43]
Yingwei Li, Song Bai, Yuyin Zhou, Cihang Xie, Zhishuai Zhang, and Alan Yuille. 2020. Learning Transferable Adversarial Examples via Ghost Networks. In AAAI Conference on Artificial Intelligence, Vol. 34.
[44]
Yuanchun Li, Fanglin Chen, Toby Jia-Jun Li, Yao Guo, Gang Huang, Matthew Fredrikson, Yuvraj Agarwal, and Jason I Hong. 2017. Privacystreams: Enabling transparency in personal data processing for mobile apps. ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 1, 3 ( 2017 ), 1-26.
[45]
Yuanchun Li, Ziyue Yang, Yao Guo, and Xiangqun Chen. 2019. Humanoid: a deep learning-based approach to automated black-box Android app testing. In 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, 1070-1073.
[46]
Zhuang Liu, Mingjie Sun, Tinghui Zhou, Gao Huang, and Trevor Darrell. 2018. Rethinking the value of network pruning. arXiv preprint arXiv: 1810. 05270 ( 2018 ).
[47]
Shiqing Ma and Yingqi Liu. 2019. NIC: Detecting adversarial samples with neural network invariant checking. In 26th Network and Distributed System Security Symposium (NDSS).
[48]
Xingjun Ma, Bo Li, Yisen Wang, Sarah M Erfani, Sudanthi Wijewickrema, Grant Schoenebeck, Dawn Song, Michael E Houle, and James Bailey. 2018. Characterizing adversarial subspaces using local intrinsic dimensionality. arXiv preprint arXiv: 1801. 02613 ( 2018 ).
[49]
Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2017. Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 ( 2017 ).
[50]
Seyed-Mohsen Moosavi-Dezfooli, Alhussein Fawzi, and Pascal Frossard. 2016. Deepfool: a simple and accurate method to fool deep neural networks. In IEEE conference on computer vision and pattern recognition. 2574-2582.
[51]
Aamir Mustafa, Salman Khan, Munawar Hayat, Roland Goecke, Jianbing Shen, and Ling Shao. 2019. Adversarial defense by restricting the hidden space of deep neural networks. In IEEE International Conference on Computer Vision (CVPR). 3385-3394.
[52]
Nina Narodytska and Shiva Prasad Kasiviswanathan. 2016. Simple black-box adversarial perturbations for deep networks. arXiv preprint arXiv:1612.06299 ( 2016 ).
[53]
Tribhuvanesh Orekondy, Bernt Schiele, and Mario Fritz. 2019. Knockof nets: Stealing functionality of black-box models. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 4954-4963.
[54]
Tribhuvanesh Orekondy, Bernt Schiele, and Mario Fritz. 2019. Prediction poisoning: Utility-constrained defenses against model stealing attacks. arXiv preprint arXiv: 1906. 10908 ( 2019 ).
[55]
Nicolas Papernot, Patrick McDaniel, Somesh Jha, Matt Fredrikson, Z Berkay Celik, and Ananthram Swami. 2016. The limitations of deep learning in adversarial settings. In IEEE European symposium on security and privacy (EuroS&P). IEEE, 372-387.
[56]
Kexin Pei, Yinzhi Cao, Junfeng Yang, and Suman Jana. 2017. DeepXplore: Automated whitebox testing of deep learning systems. In 26th Symposium on Operating Systems Principles. 1-18.
[57]
Yuxian Qiu, Jingwen Leng, Cong Guo, Quan Chen, Chao Li, Minyi Guo, and Yuhao Zhu. 2019. Adversarial Defense Through Network Profiling Based Path Extraction. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 4777-4786.
[58]
Jonas Rauber, Wieland Brendel, and Matthias Bethge. 2017. Foolbox: A python toolbox to benchmark the robustness of machine learning models. arXiv preprint arXiv:1707.04131 ( 2017 ).
[59]
Robert Nikolai Reith, Thomas Schneider, and Oleksandr Tkachenko. 2019. Efifciently Stealing your Machine Learning Models. In 18th ACM Workshop on Privacy in the Electronic Society. 198-210.
[60]
Andrew Slavin Ross and Finale Doshi-Velez. 2018. Improving the adversarial robustness and interpretability of deep neural networks by regularizing their input gradients. In Thirty-second AAAI conference on artificial intelligence.
[61]
Jing Shao, Chen-Change Loy, Kai Kang, and Xiaogang Wang. 2016. Slicing convolutional neural network for crowd video understanding. In IEEE Conference on Computer Vision and Pattern Recognition. 5620-5628.
[62]
Josep Silva. 2012. A vocabulary of program slicing-based techniques. ACM Computing Surveys (CSUR) 44, 3 ( 2012 ), 1-41.
[63]
Christian Szegedy, Wei Liu, Yangqing Jia, Pierre Sermanet, Scott Reed, Dragomir Anguelov, Dumitru Erhan, Vincent Vanhoucke, and Andrew Rabinovich. 2015. Going deeper with convolutions. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 1-9.
[64]
Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. 2013. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 ( 2013 ).
[65]
Mingxing Tan and Quoc V Le. 2019. Eficientnet: Rethinking model scaling for convolutional neural networks. arXiv preprint arXiv:1905. 11946 ( 2019 ).
[66]
Yuchi Tian, Kexin Pei, Suman Jana, and Baishakhi Ray. 2018. DeepTest: Automated testing of deep-neural-network-driven autonomous cars. In 40th International Conference on Software Engineering (ICSE). 303-314.
[67]
Frank Tip. 1994. A survey of program slicing techniques. Centrum voor Wiskunde en Informatica Amsterdam.
[68]
Florian Tramer and Dan Boneh. 2018. Slalom: Fast, verifiable and private execution of neural networks in trusted hardware. arXiv preprint arXiv: 1806. 03287 ( 2018 ).
[69]
Engin Uzuncaova and Sarfraz Khurshid. 2007. Kato: A program slicing tool for declarative specifications. In 29th International Conference on Software Engineering (ICSE). IEEE, 767-770.
[70]
Jingyi Wang, Guoliang Dong, Jun Sun, Xinyu Wang, and Peixin Zhang. 2019. Adversarial sample detection for deep neural network through model mutation testing. In 41st International Conference on Software Engineering (ICSE). 1245-1256.
[71]
Shiqi Wang, Kexin Pei, Justin Whitehouse, Junfeng Yang, and Suman Jana. 2018. Eficient formal safety analysis of neural networks. In Advances in Neural Information Processing Systems (NeurIPS). 6367-6377.
[72]
Shiqi Wang, Kexin Pei, Justin Whitehouse, Junfeng Yang, and Suman Jana. 2018. Formal security analysis of neural networks using symbolic intervals. In 27th USENIX Security Symposium (USENIX Security 18). 1599-1614.
[73]
Yulong Wang, Hang Su, Bo Zhang, and Xiaolin Hu. 2018. Interpret neural networks by identifying critical data routing paths. In IEEE Conference on Computer Vision and Pattern Recognition. 8906-8914.
[74]
Mark Weiser. 1981. Program slicing. In Proceedings of the 5th International Conference on Software Engineering. IEEE Press, 439-449.
[75]
Xiaofei Xie, Lei Ma, Felix Juefei-Xu, Minhui Xue, Hongxu Chen, Yang Liu, Jianjun Zhao, Bo Li, Jianxiong Yin, and Simon See. 2019. DeepHunter: a coverageguided fuzz testing framework for deep neural networks. In 28th ACM SIGSOFT International Symposium on Software Testing and Analysis. 146-157.
[76]
Roman V Yampolskiy. 2011. AI-complete CAPTCHAs as zero knowledge proofs of access to an artificially intelligent system. ISRN Artificial Intelligence 2012 ( 2011 ).
[77]
Dinghuai Zhang, Tianyuan Zhang, Yiping Lu, Zhanxing Zhu, and Bin Dong. 2019. You only propagate once: Accelerating adversarial training via maximal principle. In Advances in Neural Information Processing Systems. 227-238.
[78]
Jie M Zhang, Mark Harman, Lei Ma, and Yang Liu. 2020. Machine learning testing: Survey, landscapes and horizons. IEEE Transactions on Software Engineering ( 2020 ).
[79]
Qiao Zhang, Cong Wang, Chunsheng Xin, and Hongyi Wu. 2019. CHEETAH: An Ultra-Fast, Approximation-Free, and Privacy-Preserved Neural Network Framework based on Joint Obscure Linear and Nonlinear Computations. arXiv preprint arXiv: 1911. 05184 ( 2019 ).
[80]
Quan-shi Zhang and Song-Chun Zhu. 2018. Visual interpretability for deep learning: a survey. Frontiers of Information Technology & Electronic Engineering 19, 1 ( 2018 ), 27-39.
[81]
Xiangyu Zhang, Rajiv Gupta, and Youtao Zhang. 2003. Precise dynamic slicing algorithms. In 25th International Conference on Software Engineering (ICSE). 319-329.

Cited By

View all
  • (2024)ModelFoundry: A Tool for DNN Modularization and On-Demand Model Reuse Inspired by the Wisdom of Software EngineeringCompanion Proceedings of the 32nd ACM International Conference on the Foundations of Software Engineering10.1145/3663529.3663810(617-621)Online publication date: 10-Jul-2024
  • (2024)Decomposition of Deep Neural Networks into Modules via Mutation AnalysisProceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis10.1145/3650212.3680390(1669-1681)Online publication date: 11-Sep-2024
  • (2024)A Post-training Framework for Improving the Performance of Deep Learning Models via Model TransformationACM Transactions on Software Engineering and Methodology10.1145/363001133:3(1-41)Online publication date: 15-Mar-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
ESEC/FSE 2020: Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering
November 2020
1703 pages
ISBN:9781450370431
DOI:10.1145/3368089
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 November 2020

Permissions

Request permissions for this article.

Check for updates

Badges

Author Tags

  1. Deep neural networks
  2. data-flow analysis
  3. dynamic slicing
  4. program slicing

Qualifiers

  • Research-article

Funding Sources

  • the National Key Research and Development Program
  • the National Natural Science Foundation of China

Conference

ESEC/FSE '20
Sponsor:

Acceptance Rates

Overall Acceptance Rate 112 of 543 submissions, 21%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)122
  • Downloads (Last 6 weeks)6
Reflects downloads up to 21 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)ModelFoundry: A Tool for DNN Modularization and On-Demand Model Reuse Inspired by the Wisdom of Software EngineeringCompanion Proceedings of the 32nd ACM International Conference on the Foundations of Software Engineering10.1145/3663529.3663810(617-621)Online publication date: 10-Jul-2024
  • (2024)Decomposition of Deep Neural Networks into Modules via Mutation AnalysisProceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis10.1145/3650212.3680390(1669-1681)Online publication date: 11-Sep-2024
  • (2024)A Post-training Framework for Improving the Performance of Deep Learning Models via Model TransformationACM Transactions on Software Engineering and Methodology10.1145/363001133:3(1-41)Online publication date: 15-Mar-2024
  • (2024)RUNNER: Responsible UNfair NEuron Repair for Enhancing Deep Neural Network FairnessProceedings of the IEEE/ACM 46th International Conference on Software Engineering10.1145/3597503.3623334(1-13)Online publication date: 20-May-2024
  • (2024)Modularizing while Training: A New Paradigm for Modularizing DNN ModelsProceedings of the IEEE/ACM 46th International Conference on Software Engineering10.1145/3597503.3608135(1-12)Online publication date: 20-May-2024
  • (2024)No Privacy Left Outside: On the (In-)Security of TEE-Shielded DNN Partition for On-Device ML2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00052(3327-3345)Online publication date: 19-May-2024
  • (2023)Faire: Repairing Fairness of Neural Networks via Neuron Condition SynthesisACM Transactions on Software Engineering and Methodology10.1145/361716833:1(1-24)Online publication date: 23-Nov-2023
  • (2023)PatchCensor: Patch Robustness Certification for Transformers via Exhaustive TestingACM Transactions on Software Engineering and Methodology10.1145/359187032:6(1-34)Online publication date: 30-Sep-2023
  • (2023)Semantic Slicing across the Distributed Intelligent 6G Wireless Networks2023 20th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)10.1109/SECON58729.2023.10287519(79-84)Online publication date: 11-Sep-2023
  • (2023)Environment-aware Testing for DNN-based Smart-home WiFi Sensing Systems2023 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)10.1109/SANER56733.2023.00087(763-767)Online publication date: Mar-2023
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media