2021 IEEE/ACM 43rd International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP) 2021
DOI: 10.1109/icse-seip52600.2021.00019
|View full text |Cite
|
Sign up to set email alerts
|

Robustness of on-Device Models: Adversarial Attack to Deep Learning Models on Android Apps

Abstract: Deep learning has shown its power in many applications, including object detection in images, natural-language understanding, and speech recognition. To make it more accessible to end users, many deep learning models are now embedded in mobile apps. Compared to offloading deep learning from smartphones to the cloud, performing machine learning on-device can help improve latency, connectivity, and power consumption. However, most deep learning models within Android apps can easily be obtained via mature reverse… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
52
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2
2

Relationship

2
6

Authors

Journals

citations
Cited by 22 publications
(52 citation statements)
references
References 29 publications
0
52
0
Order By: Relevance
“…28 More of these SVs are required to help develop sufficiently effective SV assessment and prioritization models. One potential way to build such a dataset is to first match the (pre-trained) ML/DL models proposed in the literature or released on model repositories (e.g., Tensorflow Hub 29 ) with the ones used in real-world systems either on version control systems or in mobile apps [81]. The matched models would then be tested against known adversarial attacks to identify corresponding SVs.…”
Section: Data-driven Sv Assessment and Prioritization Of Data-driven ...mentioning
confidence: 99%
“…28 More of these SVs are required to help develop sufficiently effective SV assessment and prioritization models. One potential way to build such a dataset is to first match the (pre-trained) ML/DL models proposed in the literature or released on model repositories (e.g., Tensorflow Hub 29 ) with the ones used in real-world systems either on version control systems or in mobile apps [81]. The matched models would then be tested against known adversarial attacks to identify corresponding SVs.…”
Section: Data-driven Sv Assessment and Prioritization Of Data-driven ...mentioning
confidence: 99%
“…The activation functions in hidden layers and the output layer are ReLU and Softmax, respectively. The hidden layer structures of LFCN and HFCN are [64, 32,16,8,4] and [256,256,64,64,32,32,16,8], respectively.…”
Section: Classifiersmentioning
confidence: 99%
“…Deep neural networks (DNNs) [38] have been increasingly adopted in many fields, including computer vision [5], natural language processing [19], software engineering [13,18,32,39,45,48], etc. However, one of the crucial factors hindering DNNs from further serving applications with social impact is the unintended individual discrimination [44,47,55].…”
Section: Introductionmentioning
confidence: 99%
“…Compared to performing deep learning on cloud, on-device deep learning offers several unique benefits as follows. First, it avoids sending private users' data to the cloud, leading to the bandwidth saving, inference accelerating, and privacy preserving [1]. Second, apps can run in any situation with no need for internet connectivity [2].…”
Section: Introductionmentioning
confidence: 99%