Discover the SciOpen Platform and Achieve Your Research Goals with Ease.
Search articles, authors, keywords, DOl and etc.
In recent years, Deep Learning (DL) technique has been widely used in Internet of Things (IoT) and Industrial Internet of Things (IIoT) for edge computing, and achieved good performances. But more and more studies have shown the vulnerability of neural networks. So, it is important to test the robustness and vulnerability of neural networks. More specifically, inspired by layer-wise relevance propagation and neural network verification, we propose a novel measurement of sensitive neurons and important neurons, and propose a novel neuron coverage criterion for robustness testing. Based on the novel criterion, we design a novel testing sample generation method, named DeepSI, which involves definitions of sensitive neurons and important neurons. Furthermore, we construct sensitive-decision paths of the neural network through selecting sensitive neurons and important neurons. Finally, we verify our idea by setting up several experiments, then results show our proposed method achieves superior performances.
Q. Hua, L. Chen, P. Li, S. Zhao, and Y. Li, A pixel-channel hybrid attention model for image processing, Tsinghua Science and Technology, vol. 27, no. 5, pp. 804–816, 2022.
S. Wu, S. Shen, X. Xu, Y. Chen, X. Zhou, D. Liu, X. Xue, and L. Qi, Popularity-aware and diverse web APIs recommendation based on correlation graph, IEEE Trans. Comput. Soc. Syst., vol. 10, no. 2, pp. 771–782, 2023.
X. Zhou, Y. Li, and W. Liang, CNN-RNN based intelligent recommendation for online medical pre-diagnosis support, IEEE/ACM Trans. Comput. Biol. Bioinform., vol. 18, no. 3, pp. 912–921, 2021.
J. Sun, X. Jiang, J. Liu, F. Zhang, and C. Li, An anti-recompression video watermarking algorithm in bitstream domain, Tsinghua Science and Technology, vol. 26, no. 2, pp. 154–162, 2020.
F. Wang, G. Li, Y. Wang, W. Rafique, M. R. Khosravi, G. Liu, Y. Liu, and L. Qi, Privacy-aware traffic flow prediction based on multi-party sensor data with zero trust in smart city, ACM Trans. Internet Technol., vol. 23, no. 3, pp. 1–19, 2023.
F. Wang, H. Zhu, G. Srivastava, S. Li, M. R. Khosravi, and L. Qi, Robust collaborative filtering recommendation with user-item-trust records, IEEE Trans. Comput. Soc. Syst., vol. 9, no. 4, pp. 986–996, 2022.
L. C. Chen, G. Papandreou, I. Kokkinos, K. Murphy, and A. L. Yuille, DeepLab: Semantic image segmentation with deep convolutional nets, atrous convolution, and fully connected CRFs, IEEE Trans. Pattern Anal. Mach. Intell., vol. 40, no. 4, pp. 834–848, 2018.
L. Zhang, K. Zhang, and H. Pan, SUNet++: A deep network with channel attention for small-scale object segmentation on 3D medical images, Tsinghua Science and Technology, vol. 28, no. 4, pp. 628–638, 2023.
Y. Xu, C. Zhang, G. Wang, Z. Qin, and Q. Zeng, A blockchain-enabled deduplicatable data auditing mechanism for network storage services, IEEE Trans. Emerg. Top. Comput., vol. 9, no. 3, pp. 1421–1432, 2021.
Y. Xu, J. Ren, Y. Zhang, C. Zhang, B. Shen, and Y. Zhang, Blockchain empowered arbitrable data auditing scheme for network storage as a service, IEEE Trans. Serv. Comput., vol. 13, no. 2, pp. 289–300, 2020.
F. Wang, L. Wang, G. Li, Y. Wang, C. Lv, and L. Qi, Edge-cloud-enabled matrix factorization for diversified APIs recommendation in mashup creation, World Wide Web, vol. 25, no. 5, pp. 1809–1829, 2022.
L. Kong, L. Wang, W. Gong, C. Yan, Y. Duan, and L. Qi, LSH-aware multitype health data prediction with privacy preservation in edge environment, World Wide Web, vol. 25, no. 5, pp. 1793–1808, 2022.
X. Zhou, W. Liang, W. Li, K. Yan, S. Shimizu, and K. I. K. Wang, Hierarchical adversarial attacks against graph-neural-network-based IoT network intrusion detection system, IEEE Internet Things J., vol. 9, no. 12, pp. 9310–9319, 2022.
L. Qi, Y. Yang, X. Zhou, W. Rafique, and J. Ma, Fast anomaly identification based on multiaspect data streams for intelligent intrusion detection toward secure industry 4.0, IEEE Trans. Ind. Inform., vol. 18, no. 9, pp. 6503–6511, 2022.
L. Nie, Z. Ning, X. Wang, X. Hu, J. Cheng, and Y. Li, Data-driven intrusion detection for intelligent Internet of vehicles: A deep convolutional neural network-based method, IEEE Trans. Netw. Sci. Eng., vol. 7, no. 4, pp. 2219–2230, 2020.
Y. Xu, Z. Liu, C. Zhang, J. Ren, Y. Zhang, and X. Shen, Blockchain-based trustworthy energy dispatching approach for high renewable energy penetrated power systems, IEEE Internet Things J., vol. 9, no. 12, pp. 10036–10047, 2022.
C. Zhang, Y. Xu, Y. Hu, J. Wu, J. Ren, and Y. Zhang, A blockchain-based multi-cloud storage data auditing scheme to locate faults, IEEE Trans. Cloud Comput., vol. 10, no. 4, pp. 2252–2263, 2022.
X. Zhou, X. Yang, J. Ma, and K. I. K. Wang, Energy-efficient smart routing based on link correlation mining for wireless edge computing in IoT, IEEE Internet Things J., vol. 9, no. 16, pp. 14988–14997, 2022.
X. Zhou, X. Xu, W. Liang, Z. Zeng, and Z. Yan, Deep-learning-enhanced multitarget detection for end–edge–cloud surveillance in smart IoT, IEEE Internet Things J., vol. 8, no. 16, pp. 12588–12596, 2021.
X. Zhou, W. Liang, K. I. K. Wang, and L. T. Yang, Deep correlation mining based on hierarchical hybrid networks for heterogeneous big data recommendations, IEEE Trans. Comput. Soc. Syst., vol. 8, no. 1, pp. 171–178, 2021.
L. Qi, W. Lin, X. Zhang, W. Dou, X. Xu, and J. Chen, A correlation graph based approach for personalized and compatible web APIs recommendation in mobile APP development, IEEE Trans. Knowl. Data Eng., vol. 35, no. 6, pp. 5444–5457, 2023.
S. Bach, A. Binder, G. Montavon, F. Klauschen, K. R. Müller, and W. Samek, On pixel-wise explanations for non-linear classifier decisions by layer-wise relevance propagation, PLoS One, vol. 10, no. 7, p. e0130140, 2015.
N. B. Ruparelia, Software development lifecycle models, SIGSOFT Softw. Eng. Notes, vol. 35, no. 3, pp. 8–13, 2010.
G. Singh, T. Gehr, M. Püschel, and M. Vechev, An abstract domain for certifying neural networks, Proc. ACM Program. Lang., vol. 3, no. POPL, p. 41, 2019.
X. Xie, T. Li, J. Wang, L. Ma, Q. Guo, F. Juefei-Xu, and Y. Liu, NPC: Neuron path coverage via characterizing decision logic of deep neural networks, ACM Trans. Softw. Eng. Methodol., vol. 31, no. 3, p. 47, 2022.
490
Views
42
Downloads
1
Crossref
0
Web of Science
1
Scopus
0
CSCD
Altmetrics
The articles published in this open access journal are distributed under the terms of theCreative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).