Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Softw 2021
DOI: 10.1145/3468264.3468545
|View full text |Cite
|
Sign up to set email alerts
|

Probing model signal-awareness via prediction-preserving input minimization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(5 citation statements)
references
References 45 publications
0
5
0
Order By: Relevance
“…Baselines. We adopt three recent vulnerability explanation approaches as baselines: 1) IVDetect [40] leverages GNNExplainer [75] to produce the key program dependence sub-graph (i.e., a list of crucial statements closely related to the detected vulnerability) that affect the decision of the model as explanations; 2) P2IM [61] borrows Delta Debugging [76] to reduce a program sample to a minimal snippet which a model needs to arrive at and stick to its original vulnerable prediction to uncover the model's detection logic; and 3) mVulPreter [82] combines the attention weight with the vulnerability probability outputted by the multi-granularity detector to compute the importance score for each code slice.…”
Section: Rq2: Explanation Performancementioning
confidence: 99%
See 2 more Smart Citations
“…Baselines. We adopt three recent vulnerability explanation approaches as baselines: 1) IVDetect [40] leverages GNNExplainer [75] to produce the key program dependence sub-graph (i.e., a list of crucial statements closely related to the detected vulnerability) that affect the decision of the model as explanations; 2) P2IM [61] borrows Delta Debugging [76] to reduce a program sample to a minimal snippet which a model needs to arrive at and stick to its original vulnerable prediction to uncover the model's detection logic; and 3) mVulPreter [82] combines the attention weight with the vulnerability probability outputted by the multi-granularity detector to compute the importance score for each code slice.…”
Section: Rq2: Explanation Performancementioning
confidence: 99%
“…For two baselines (IVDetect and mVulPreter) which require a human-selected š‘˜ value to decide the size of the [40,82] to narrow down the scope of candidate statements to 5, while the size of explanations produced by our approach and P2IM are automatically decided by themselves via optimization. Following [17,61], we evaluate these explanation approaches on another vulnerability dataset D2A [78] because it is labeled with clearly annotated vulnerability-contexts which are more reliable than other diff -based ground truths [15]. We randomly select 10,000 vulnerable samples which can be correctly detected from the D2A dataset to calculate the VTP metrics.…”
Section: Rq2: Explanation Performancementioning
confidence: 99%
See 1 more Smart Citation
“…Program simplification has gain increasing attention recently. The state-of-the-art methods such as SIVAND [34] and P2IM [42] a based on the delta debugging prototype [49]. The delta debugging mechanism requires an input code snippet and an auxiliary deep learning model such as the code2vec [3].…”
Section: Program Simplificationmentioning
confidence: 99%
“…In the realm of understanding for source code models, recent work uses delta-debugging techniques to reduce a program to a set of statements that is minimal and still preserves the initial model prediction [31,42]. The intuition here is that essentially the remaining statements are the important signal being picked up by the model.…”
Section: Related Workmentioning
confidence: 99%