[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3368089.3409733acmconferencesArticle/Chapter ViewAbstractPublication PagesfseConference Proceedingsconference-collections
research-article

DENAS: automated rule generation by knowledge extraction from neural networks

Published: 08 November 2020 Publication History

Abstract

Deep neural networks (DNNs) have been widely applied in the software development process to automatically learn patterns from massive data. However, many applications still make decisions based on rules that are manually crafted and verified by domain experts due to safety or security concerns. In this paper, we aim to close the gap between DNNs and rule-based systems by automating the rule generation process via extracting knowledge from well-trained DNNs. Existing techniques with similar purposes either rely on specific DNNs input instances or use inherently unstable random sampling of the input space. Therefore, these approaches either limit the exploration area to a local decision-space of the DNNs or fail to converge to a consistent set of rules. The resulting rules thus lack representativeness and stability.
In this paper, we address the two aforementioned shortcomings by discovering a global property of the DNNs and use it to remodel the DNNs decision-boundary. We name this property as the activation probability, and show that this property is stable. With this insight, we propose an approach named DENAS including a novel rule-generation algorithm. Our proposed algorithm approximates the non-linear decision boundary of DNNs by iteratively superimposing a linearized optimization function.
We evaluate the representativeness, stability, and accuracy of DENAS against five state-of-the-art techniques (LEMNA, Gradient, IG, DeepTaylor, and DTExtract) on three software engineering and security applications: Binary analysis, PDF malware detection, and Android malware detection. Our results show that DENAS can generate more representative rules consistently in a more stable manner over other approaches. We further offer case studies that demonstrate the applications of DENAS such as debugging faults in the DNNs and generating signatures that can detect zero-day malware.

Supplementary Material

Auxiliary Teaser Video (fse20main-p454-p-teaser.mp4)
This is a presentation video of my talk at ESEC/FSE 2020 on our paper accepted in the research track. In this paper, we propose DENAS, a tool can generate rules through extracting knowledge from a well-trained deep neural networks.
Auxiliary Presentation Video (fse20main-p454-p-video.mp4)
This is a presentation video of my talk at ESEC/FSE 2020 on our paper accepted in the research track. In this paper, we propose DENAS, a tool can generate rules through extracting knowledge from a well-trained deep neural networks.

References

[1]
O cial Report of the Special Committee to Review the Federal Aviation Administrations Aircraft Certi cation Process Executive Summary.https://www. transportation.gov/sites/dot.gov/ les/2020-01/executive-summary.pdf, 2020.
[2]
A, M., L, S., S, P., H G., S, W., M, K., D, S., iNNvKestigate Neural Networks! J. Mach. Learn. Res. 20 ( 2019 ), 93 : 1-93 : 8.
[3]
A, K., B, T. F., K An, dJr., ozoo: CollLectinTg millions of android apps for the research community. In Proceedings of the 13th International Conference on Mining Software Repositories, MSR 2016, Austin, TX, USA, May 14-22, 2016 (New York, NY, USA, 2016 ), ACM, pp. 468-471.
[4]
A, H., C, K. M., H Piecewise linGear appro,xBim.Rat. ion applied to nonlinear function of a neural network. IEE Proceedings-Circuits, Devices and Systems 144, 6 ( 1997 ), 313-317.
[5]
A, D., S, M., H, M.D, GREBIN : e ective and explainable detection of android malware in your pocket. In21st Annual Network and Distributed System Security Symposium, NDSS 2014, San Diego, California, USA, February 23-26, 2014 ( 2014 ), The Internet Society.
[6]
B, T., B, J., W, M., T, R., BYTEWEBIGHT: learning to recognize functions in binary code. In Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014 ( 2014 ), USENIX Association, pp. 845-860.
[7]
B, O., K, C., InteBrpreting blackbo,xHm. odels via model extraction. arXiv preprint arXiv:1705.08504 ( 2017 ).
[8]
C, A., S, A., H, P., Grad-cam+ +: Generalized gradient-based visual explanations for deep convolutional networks. In 2018 IEEE Winter Conference on Applications of Computer Vision, WACV 2018, Lake Tahoe, NV, USA, March 12-15, 2018 ( 2018 ), IEEE Computer Society, pp. 839-847.
[9]
C, FK., eras. https:/./github.com/fchollet/keras, 2015.
[10]
C, Y. S., T Probability th,Heo.ry: independence, interchangeability, martingales. Springer Science & Business Media, 2012.
[11]
C, KA. cLo.urse in probability theory. Academic press, 2001.
[12]
DENAS. DENAS Project Page. https://github.com/SeekingDream/denas_fse2020, 2020.
[13]
D, M., L, N., THech,nXiq. ues for interpretable machine learning. Communications of the ACM 63, 1 ( 2020 ), 68-77.
[14]
D, OJ.pGti. mum uniform piecewise linear approximation of planar curves. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1 ( 1986 ), 67-75.
[15]
D Prob,aRbi. lity: theory and examples, vol. 49. Cambridge university press, 2019.
[16]
D 'A, C., L, A., PiecMewise linear approxi m,Sa.tion of functions of two variables in milp models. Operations Research Letters 38, 1 CA, USA, May 18-21, 2014 ( 2014 ), IEEE Computer Society, pp. 197-211.
[17]
S, M., DPieceFwise-li,nOea.r approximation of nonlinear dynamical systems. IEEE Transactions on Circuits and Systems I: Regular Papers 51, 4 ( 2004 ), 830-842.
[18]
S, M., T Ax,iAo m., atic attribYution,fQor. deep networks. In Proceedings of the 34th International Conference on Machine Learning, ICML 2017, Sydney, NSW, Australia, 6-11 August 2017 ( 2017 ), vol. 70 of Proceedings of Machine Learning Research, PMLR, pp. 3319-3328.
[19]
T, G., M, S., L, Y., ZAttacks mee,tXi n.terpretability: Attributesteered detection of adversarial samples. In Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, NeurIPS 2018, 3-8 December 2018, Montréal, Canada ( 2018 ), pp. 7728-7739.
[20]
V High-di m,Re.nsional probability: An introduction with applications in data science, vol. 47. Cambridge University Press, 2018.
[21]
V C, E., BinDomial distributio,nK.handbook for scientists and engineers. Springer Science & Business Media, 2001.
[22]
W, B., Y, Y., S, S., L, H., V, B., Z Neural Cleanse : Identifying and Mitigating Backdoor Attacks in Neural Networks. In 2019 IEEE Symposium on Security and Privacy, SP 2019, San Francisco, CA, USA, May 19-23, 2019 ( 2019 ), IEEE, pp. 707-723.
[23]
W, A., A, D., W Don't pa,inCt.,it black: R White-box explanations for deep learning in computer security. arXiv preprint arXiv: 1906. 02108 ( 2019 ).
[24]
W, D., M, C., W, T., L, H., DroidmWat:,AKn.droid malware detection through manifest and API calls tracing. In Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012, Kaohsiung, Taiwan, August 9-10, 2012 ( 2012 ), IEEE Computer Society, pp. 62-69.
[25]
W, M., H, M. C., P, S., Z, M., R F. Beyond sparsity: Tree regularization of deep models for interpretability. In Proceedings of the Thirty-Second AAAI Conference on Arti cial Intelligence, (AAAI18), the 30th innovative Applications of Arti cial Intelligence (IAAI-18), and the 8th AAAI Symposium on Educational Advances in Arti cial Intelligence (EAAI-18), New Orleans, Louisiana, USA, February 2-7, 2018 ( 2018 ), AAAI Press, pp. 1670-1678.
[26]
X, M., W, P., V Decisio,nP. K., tree regression for soft classi cation of remote sensing data. Remote Sensing of Environment 97, 3 ( 2005 ), 322-336.
[27]
Y, T., I, J. P., FuzzyKprogra,mHm.inJg. with nonlinear membership functions: piecewise linear approximation. Fuzzy sets and systems 41, 1 ( 1991 ), 39-53.
[28]
Y, J., C, J., N, A. M., F Understa, Tn.dJi.n, g neural networks through deep visualization. CoRR abs/1506.06579 ( 2015 ).
[29]
Z, M. D., FVisualizing and, Ru. nderstanding convolutional networks. In Computer Vision-ECCV 2014-13th European Conference, Zurich, Switzerland, September 6-12, 2014, Proceedings, Part I ( 2014 ), vol. 8689 of Lecture Notes in Computer Science, Springer, pp. 818-833.
[30]
Z, Z., C, M. C. Y., W, C., H, C., C, C. KIo.t, security : Ongoing challenges and research opportunities. In 7th IEEE International, H., ConferenZce on Ser v,iBce.-YO. riented Computing and Applications, SOCA 2014, Matsue, Japan, November 17-19, 2014 ( 2014 ), IEEE Computer Society, pp. 230-234.
[31]
Z, Y., F, C., X, X., S, T., M, L., H, J., M, Z., L C W,Yu.ji: Automatic online combat game testing using evolutionary deep r,eKin.forcement learning. In 34th IEEE/ACM International Conference on Automated Software Engineering, ASE 2019, San Diego, CA, USA, November 11-15, 2019 ( 2019 ), IEEE, pp. 772-784.
[32]
Z, B., K, A., L, À., O Learni, nAg., deep features for discriminative localization. In 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016, Las Vegas, NV, USA, June 27-30, 2016 ( 2016 ), IEEE Computer Society, pp. 2921-2929.
[33]
, V., Z D V, L. M., C, T. S., A, T., VisualizinWgdeep neural network decisions: Prediction di erence analysis. In5th International Conference on Learning Representations, ICLR 2017, Toulon, France, April 24-26, 2017, Conference Track Proceedings ( 2017 ), OpenReview.net.

Cited By

View all
  • (2024)Automated Testing Linguistic Capabilities of NLP ModelsACM Transactions on Software Engineering and Methodology10.1145/367245533:7(1-33)Online publication date: 14-Jun-2024
  • (2024)LLMEffiChecker: Understanding and Testing Efficiency Degradation of Large Language ModelsACM Transactions on Software Engineering and Methodology10.1145/366481233:7(1-38)Online publication date: 26-Aug-2024
  • (2024)Toward Intelligent Tracking Down of Malicious Applications Pre-installed on Smartphones Sold in African Emerging MarketsICT for Intelligent Systems10.1007/978-981-97-6684-0_49(605-615)Online publication date: 27-Dec-2024
  • Show More Cited By

Index Terms

  1. DENAS: automated rule generation by knowledge extraction from neural networks

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      ESEC/FSE 2020: Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering
      November 2020
      1703 pages
      ISBN:9781450370431
      DOI:10.1145/3368089
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 08 November 2020

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Deep Neural Networks
      2. Explainable AI
      3. Machine Learning

      Qualifiers

      • Research-article

      Funding Sources

      • UT Dallas startup funding#37030034

      Conference

      ESEC/FSE '20
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 112 of 543 submissions, 21%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)34
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 04 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Automated Testing Linguistic Capabilities of NLP ModelsACM Transactions on Software Engineering and Methodology10.1145/367245533:7(1-33)Online publication date: 14-Jun-2024
      • (2024)LLMEffiChecker: Understanding and Testing Efficiency Degradation of Large Language ModelsACM Transactions on Software Engineering and Methodology10.1145/366481233:7(1-38)Online publication date: 26-Aug-2024
      • (2024)Toward Intelligent Tracking Down of Malicious Applications Pre-installed on Smartphones Sold in African Emerging MarketsICT for Intelligent Systems10.1007/978-981-97-6684-0_49(605-615)Online publication date: 27-Dec-2024
      • (2023)An Evaluation of Real-time Malware Detection in IoT Devices: Comparison of Machine Learning Algorithms with RapidMiner2023 IEEE International Conference on Electro Information Technology (eIT)10.1109/eIT57321.2023.10187265(077-082)Online publication date: 18-May-2023
      • (2023)Leveraging Feature Bias for Scalable Misprediction Explanation of Machine Learning Models2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE)10.1109/ICSE48619.2023.00135(1559-1570)Online publication date: May-2023
      • (2023)Sibling-Attack: Rethinking Transferable Adversarial Attacks against Face Recognition2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)10.1109/CVPR52729.2023.02359(24626-24637)Online publication date: Jun-2023
      • (2023)The Dark Side of Dynamic Routing Neural Networks: Towards Efficiency Backdoor Injection2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)10.1109/CVPR52729.2023.02355(24585-24594)Online publication date: Jun-2023
      • (2023)Intelligent state assessment of complex autonomous objects based on wavelet analysisEngineering Applications of Artificial Intelligence10.1016/j.engappai.2023.106869126(106869)Online publication date: Nov-2023
      • (2023)Survey on Explainable AI: From Approaches, Limitations and Applications AspectsHuman-Centric Intelligent Systems10.1007/s44230-023-00038-y3:3(161-188)Online publication date: 10-Aug-2023
      • (2022)Deep Learning for Android Malware Defenses: A Systematic Literature ReviewACM Computing Surveys10.1145/354496855:8(1-36)Online publication date: 23-Dec-2022
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media