Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Softw 2020
DOI: 10.1145/3368089.3409676
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic slicing for deep neural networks

Abstract: Program slicing has been widely applied in a variety of software engineering tasks. However, existing program slicing techniques only deal with traditional programs that are constructed with instructions and variables, rather than neural networks that are composed of neurons and synapses. In this paper, we propose NNSlicer, the first approach for slicing deep neural networks based on data flow analysis. Our method understands the reaction of each neuron to an input based on the difference between its behavior … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7
1
1

Relationship

5
4

Authors

Journals

citations
Cited by 31 publications
(8 citation statements)
references
References 81 publications
0
8
0
Order By: Relevance
“…Model pruning is a promising solution to accelerate CNNs by removing unimportant weights (Han et al 2015;Wen et al 2016;Lebedev and Lempitsky 2016;Liu, Guo, and Chen 2019;Zhang et al 2020;Liu et al 2020). Here we focus on filter pruning due to its applicability to any CNN architectures without requiring special software/hardware accelerators.…”
Section: Model Pruningmentioning
confidence: 99%
“…Model pruning is a promising solution to accelerate CNNs by removing unimportant weights (Han et al 2015;Wen et al 2016;Lebedev and Lempitsky 2016;Liu, Guo, and Chen 2019;Zhang et al 2020;Liu et al 2020). Here we focus on filter pruning due to its applicability to any CNN architectures without requiring special software/hardware accelerators.…”
Section: Model Pruningmentioning
confidence: 99%
“…To protect the IP right of a model, one way is to avoid model exposure by encrypting it [21], putting it or part of it into enclaves [70,79], etc. Another way is to design mechanisms to enable model IP violation detection.…”
Section: Model Intellectual Property Protectionmentioning
confidence: 99%
“…Our pruning method is designed to pursue robustness preservation, given that the model may be exposed to unexpected or even adversarial inputs [22,23,24,25,26] after being deployed in a real-world application scenario.…”
Section: Introductionmentioning
confidence: 99%