2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C) 2018
DOI: 10.1109/qrs-c.2018.00032
|View full text |Cite
|
Sign up to set email alerts
|

MuNN: Mutation Analysis of Neural Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
42
0
3

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 56 publications
(45 citation statements)
references
References 11 publications
0
42
0
3
Order By: Relevance
“…They often exploit them to drive test input generation. Since classical adequacy criteria based on the code's control flow graph are ineffective with NNs, as typically 100% control flow coverage of the code of an NN can be easily reached with few inputs, researchers have defined novel test adequacy criteria specifically targeted to neural networks (Kim et al 2019;Ma et al 2018bMa et al , 2019Sekhon and Fleming 2019;Sun et al 2018a, b;Pei et al 2017;Shen et al 2018;Guo et al 2018;Xie et al 2019).…”
Section: Addressed Problem (Rq 11)mentioning
confidence: 99%
See 2 more Smart Citations
“…They often exploit them to drive test input generation. Since classical adequacy criteria based on the code's control flow graph are ineffective with NNs, as typically 100% control flow coverage of the code of an NN can be easily reached with few inputs, researchers have defined novel test adequacy criteria specifically targeted to neural networks (Kim et al 2019;Ma et al 2018bMa et al , 2019Sekhon and Fleming 2019;Sun et al 2018a, b;Pei et al 2017;Shen et al 2018;Guo et al 2018;Xie et al 2019).…”
Section: Addressed Problem (Rq 11)mentioning
confidence: 99%
“…Five works (7%) manipulate only the input data, i.e., they perform input level testing (Bolte et al 2019;Byun et al 2019;Henriksson et al 2019;Wolschke et al 2018). The majority of the papers (64%) operate at the ML model level (model level testing) (Cheng et al 2018a;Ding et al 2017;Du et al 2019;Dwarakanath et al 2018;Eniser et al 2019;Gopinath et al 2018;Groce et al 2014;Guo et al 2018;Kim et al 2019;Li et al 2018;Ma et al 2018bMa et al , c, d, 2019Murphy et al 2007aMurphy et al , b, 2008Murphy et al , b, 2009Nakajima and Bui 2016, 2019Odena et al 2019;Patel et al 2018;Pei et al 2017;Qin et al 2018;Saha and Kanewala 2019;Sekhon and Fleming 2019;Shen et al 2018;Shi et al 2019;Spieker and Gotlieb 2019;Strickland et al 2018;Sun et al 2018a, b;Tian et al 2018;Udeshi and Chattopadhyay 2019;Udeshi et al 2018;Uesato et al 2019;Xie et al 2018Xie et al , 2019Xie et al , 2011Zhang et al 2018aZhang et al , b, 2019Zhao a...…”
Section: Cost Of Testingmentioning
confidence: 99%
See 1 more Smart Citation
“…Adversarial attack (EP_AE) Reveal the defects in DNN by executing adversarial examples Targeted, non-targeted, L p -norm attack [28,29] Mutation testing (EP_MUT) Evaluate the testing adequacy by mutating training data, training program and trained model MuNN [30], DeepMutation [31] Metamorphic testing (EP_MT) Determine the system correctness by checking whether the metamorphic relation is satisfied DeepTest [14] Test prioritization (EP_TP) Measure the correctness of classification by the purity of test data DeepGini [32] Formal Verification Technique (EP_FV) Satisfiability Solver (EP_SS) Transform the safety verification to satisfiability solver problem Safety verification [33] Non-linear problem (EP_NLP) Transform the safety verification to non-linear problem Piecewise linear network verification [34] Symbolic interval analysis (EP_SIA) Transform the safety verification by analyzing symbolic interval ReluVal [35] Reachability analysis (EP_RA) Transform the safety verification by analyzing the reachability problem DeepGo [36] Abstract interpretation (EP_AI) Transform the safety verification to abstract interpretation AI 2 [37], Symbolic propagation [38] Evaluation Dataset (EP_ED)…”
Section: Metamorphic Testing Based Strategy (Ep_mt)mentioning
confidence: 99%
“…MuNN. MuNN [30] proposes five kinds of mutation operators according to the structure of neural network, including deleting neurons in the input layer and hidden layers, changing the bias, weights, and activation functions. A mutant neural network is said to be killed once its output is distinct from the output of the original network.…”
mentioning
confidence: 99%