An Empirical Study of Artifacts and Security Risks in the Pre-trained Model Supply Chain

Author:

Jiang Wenxin1,Synovic Nicholas2,Sethi Rohan2,Indarapu Aryan3,Hyatt Matt2,Schorlemmer Taylor R.1,Thiruvathukal George K.2,Davis James C.1

Affiliation:

1. Purdue University, West Lafayette, IN, USA

2. Loyola University Chicago, Chicago, IL, USA

3. University of Illinois-Urbana Champaign, Champaign, IL, USA

Funder

Cisco

Google

NSF (National Science Foundation)

Publisher

ACM

Reference88 articles.

1. Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey

2. Vishnu Banna , Akhil Chinnakotla , Zhengxin Yan , Anirudh Vegesana , Naveen Vivek , Kruthi Krishnappa , Wenxin Jiang , Yung-Hsiang Lu , George K. Thiruvathukal , and James C . Davis . 2021 . An Experience Report on Machine Learning Reproducibility: Guidance for Practitioners and TensorFlow Model Garden Contributors . http://arxiv.org/abs/2107.00821 Vishnu Banna, Akhil Chinnakotla, Zhengxin Yan, Anirudh Vegesana, Naveen Vivek, Kruthi Krishnappa, Wenxin Jiang, Yung-Hsiang Lu, George K. Thiruvathukal, and James C. Davis. 2021. An Experience Report on Machine Learning Reproducibility: Guidance for Practitioners and TensorFlow Model Garden Contributors. http://arxiv.org/abs/2107.00821

3. Adrien Bibal and Benoît Frénay . 2016 . Interpretability of Machine Learning Models and Representations: an Introduction . In European Symposium on Artificial Neural Networks. Adrien Bibal and Benoît Frénay. 2016. Interpretability of Machine Learning Models and Representations: an Introduction. In European Symposium on Artificial Neural Networks.

4. On testing machine learning programs

5. Anirban Chakraborty Manaar Alam Vishal Dey Anupam Chattopadhyay and Debdeep Mukhopadhyay. 2018. Adversarial Attacks and Defences: A Survey. https://arxiv.org/abs/1810.00069 Anirban Chakraborty Manaar Alam Vishal Dey Anupam Chattopadhyay and Debdeep Mukhopadhyay. 2018. Adversarial Attacks and Defences: A Survey. https://arxiv.org/abs/1810.00069

Cited by 11 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Challenges and practices of deep learning model reengineering: A case study on computer vision;Empirical Software Engineering;2024-08-20

2. Supply Chain Security, Technological Advancements, and Future Trends;Advances in Information Security, Privacy, and Ethics;2024-06-30

3. BELT: Old-School Backdoor Attacks can Evade the State-of-the-Art Defense with Backdoor Exclusivity Lifting;2024 IEEE Symposium on Security and Privacy (SP);2024-05-19

4. Signing in Four Public Software Package Registries: Quantity, Quality, and Influencing Factors;2024 IEEE Symposium on Security and Privacy (SP);2024-05-19

5. PeaTMOSS: A Dataset and Initial Analysis of Pre-Trained Models in Open-Source Software;Proceedings of the 21st International Conference on Mining Software Repositories;2024-04-15

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3