{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:50:33Z","timestamp":1756000233590,"version":"3.41.0"},"publisher-location":"New York, New York, USA","reference-count":37,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2016YFB0200401"],"award-info":[{"award-number":["2016YFB0200401"]}]},{"name":"HUNAN Province Science Foundation China","award":["2017RS3045"],"award-info":[{"award-number":["2017RS3045"]}]},{"name":"National Science Foundation (NSF) China","award":["614024926140248661379146"],"award-info":[{"award-number":["614024926140248661379146"]}]},{"name":"Laboratory Pre-research Fund China","award":["9140C810106150C-81001"],"award-info":[{"award-number":["9140C810106150C-81001"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1145\/3178876.3185995","type":"proceedings-article","created":{"date-parts":[[2018,4,13]],"date-time":"2018-04-13T15:53:48Z","timestamp":1523634828000},"page":"177-186","source":"Crossref","is-referenced-by-count":10,"title":["Sharing Deep Neural Network Models with Interpretation"],"prefix":"10.1145","author":[{"given":"Huijun","family":"Wu","sequence":"first","affiliation":[{"name":"University of New South Wales & Data61, CSIRO, Sydney, Australia"}]},{"given":"Chen","family":"Wang","sequence":"additional","affiliation":[{"name":"Data61, CSIRO, Sydney, Australia"}]},{"given":"Jie","family":"Yin","sequence":"additional","affiliation":[{"name":"University of Sydney, Sydney, Australia"}]},{"given":"Kai","family":"Lu","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Changsha, China"}]},{"given":"Liming","family":"Zhu","sequence":"additional","affiliation":[{"name":"University of New South Wales & Data61, CSIRO, Sydney, Australia"}]}],"member":"320","reference":[{"key":"key-10.1145\/3178876.3185995-1","unstructured":"Agnar Aamodt and Enric Plaza. 1994. Case-based reasoning: Foundational issues, methodological variations, and system approaches. AI communications 7, 1 (1994), 39--59."},{"key":"key-10.1145\/3178876.3185995-2","unstructured":"Amazon. 2017. Machine Learning on AWS. https:\/\/aws.amazon.com\/machine-learning\/. (2017). [Online; accessed 07-July-2017]."},{"key":"key-10.1145\/3178876.3185995-3","doi-asserted-by":"crossref","unstructured":"Alexandr Andoni and Ilya Razenshteyn. 2015. Optimal data-dependent hashing for approximate near neighbors. In Proceedings of the forty- seventh annual ACM symposium on Theory of computing. ACM, 793--801.","DOI":"10.1145\/2746539.2746553"},{"key":"key-10.1145\/3178876.3185995-4","doi-asserted-by":"crossref","unstructured":"Franz Aurenhammer. 1991. Voronoi diagrams survey of a fundamental geometric data structure. ACM Computing Surveys (CSUR) 23, 3 (1991), 345--405.","DOI":"10.1145\/116873.116880"},{"key":"key-10.1145\/3178876.3185995-5","doi-asserted-by":"crossref","unstructured":"Jacob Bien and Robert Tibshirani. 2011. Prototype selection for interpretable classification. The Annals of Applied Statistics (2011), 2403--2424.","DOI":"10.1214\/11-AOAS495"},{"key":"key-10.1145\/3178876.3185995-6","doi-asserted-by":"crossref","unstructured":"Olcay Boz. 2002. Extracting decision trees from trained neural networks. In Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 456--461.","DOI":"10.1145\/775047.775113"},{"key":"key-10.1145\/3178876.3185995-7","unstructured":"Zhengping Che, Sanjay Purushotham, Robinder Khemani, and Yan Liu. 2016. Interpretable deep models for icu outcome prediction. In AMIA Annual Symposium Proceedings, Vol. 2016. American Medical Informatics Association, 371."},{"key":"key-10.1145\/3178876.3185995-8","unstructured":"Mark Craven and Jude W Shavlik. 1996. Extracting tree-structured representations of trained networks. In Advances in neural information processing systems. 24--30."},{"key":"key-10.1145\/3178876.3185995-9","doi-asserted-by":"crossref","unstructured":"Ruth Fong and Andrea Vedaldi. 2017. Interpretable Explanations of Black Boxes by Meaningful Perturbation. arXiv preprint arXiv:1704.03296 (2017).","DOI":"10.1109\/ICCV.2017.371"},{"key":"key-10.1145\/3178876.3185995-10","doi-asserted-by":"crossref","unstructured":"Alex Graves, Abdel-rahman Mohamed, and Geoffrey Hinton. 2013. Speech recognition with deep recurrent neural networks. In Acoustics, speech and signal processing (icassp), 2013 ieee international conference on. IEEE, 6645--6649.","DOI":"10.1109\/ICASSP.2013.6638947"},{"key":"key-10.1145\/3178876.3185995-11","doi-asserted-by":"crossref","unstructured":"Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition. 770--778.","DOI":"10.1109\/CVPR.2016.90"},{"key":"key-10.1145\/3178876.3185995-12","unstructured":"Geoffrey Hinton, Li Deng, Dong Yu, George E Dahl, Abdel-rahman Mohamed, Navdeep Jaitly, Andrew Senior, Vincent Vanhoucke, Patrick Nguyen, Tara N Sainath, et al. 2012. Deep neural networks for acoustic modeling in speech recognition: The shared views of four research groups. IEEE Signal Processing Magazine 29, 6 (2012), 82--97."},{"key":"key-10.1145\/3178876.3185995-13","unstructured":"Shota Horiguchi, Daiki Ikami, and Kiyoharu Aizawa. 2016. Significance of softmax-based features over metric learning-based features. (2016)."},{"key":"key-10.1145\/3178876.3185995-14","unstructured":"Roberto Jordaney, Kumar Sharad, Santanu K. Dash, Zhi Wang, Davide Papini, Ilia Nouretdinov, and Lorenzo Cavallaro. 2017. Transcend: Detecting Concept Drift in Malware Classification Models. In 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, Vancouver, BC, 625--642. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/jordaney"},{"key":"key-10.1145\/3178876.3185995-15","doi-asserted-by":"crossref","unstructured":"Mayank Kabra, Alice Robie, and Kristin Branson. 2015. Understanding classifier errors by examining influential neighbors. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 3917--3925.","DOI":"10.1109\/CVPR.2015.7299017"},{"key":"key-10.1145\/3178876.3185995-16","unstructured":"Been Kim, Rajiv Khanna, and Oluwasanmi O Koyejo. 2016. Examples are not enough, learn to criticize! criticism for interpretability. In Advances in Neural Information Processing Systems. 2280--2288."},{"key":"key-10.1145\/3178876.3185995-17","unstructured":"Pang Wei Koh and Percy Liang. 2017. Understanding black-box predictions via influence functions. arXiv preprint arXiv:1703.04730 (2017)."},{"key":"key-10.1145\/3178876.3185995-18","doi-asserted-by":"crossref","unstructured":"Alex Krizhevsky, Ilya Sutskever, and Geoffrey E. Hinton. 2017. ImageNet Classification with Deep Convolutional Neural Networks. Commun. ACM 60, 6 (May 2017), 84--90. https:\/\/doi.org\/10.1145\/3065386","DOI":"10.1145\/3065386"},{"key":"key-10.1145\/3178876.3185995-19","doi-asserted-by":"crossref","unstructured":"Der-Tsai Lee and Bruce J Schachter. 1980. Two algorithms for constructing a Delaunay triangulation. International Journal of Computer &#38; Information Sciences 9, 3 (1980), 219--242.","DOI":"10.1007\/BF00977785"},{"key":"key-10.1145\/3178876.3185995-20","doi-asserted-by":"crossref","unstructured":"Charles Mathy, Nate Derbinsky, Jos&#233; Bento, Jonathan Rosenthal, and Jonathan S Yedidia. 2015. The Boundary Forest Algorithm for Online Supervised and Unsupervised Learning.. In AAAI. 2864--2870.","DOI":"10.1609\/aaai.v29i1.9622"},{"key":"key-10.1145\/3178876.3185995-21","unstructured":"Microsoft. 2017. Microsoft Azure Machine Learning Studio. https:\/\/studio.azureml.net\/. (2017). [Online; accessed 07-July-2017]."},{"key":"key-10.1145\/3178876.3185995-22","doi-asserted-by":"crossref","unstructured":"Xin Mu, Feida Zhu, Juan Du, Ee-Peng Lim, and Zhi-Hua Zhou. 2017. Streaming Classification with Emerging New Class by Class Matrix Sketching.. In AAAI. 2373--2379.","DOI":"10.1609\/aaai.v31i1.10842"},{"key":"key-10.1145\/3178876.3185995-23","unstructured":"Google Cloud Platform. 2018. Cloud Machine Learning Engine. https:\/\/cloud.google.com\/ml-engine\/. (2018). [Online; accessed 01-Feb-2018]."},{"key":"key-10.1145\/3178876.3185995-24","doi-asserted-by":"crossref","unstructured":"Marco Tulio Ribeiro, Sameer Singh, and Carlos Guestrin. 2016. Why Should I Trust You?: Explaining the Predictions of Any Classifier. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 1135--1144.","DOI":"10.1145\/2939672.2939778"},{"key":"key-10.1145\/3178876.3185995-25","unstructured":"Ryan Rifkin and Aldebaro Klautau. 2004. In defense of one-vs-all classification. Journal of machine learning research 5, Jan (2004), 101--141."},{"key":"key-10.1145\/3178876.3185995-26","doi-asserted-by":"crossref","unstructured":"Olga Russakovsky, Jia Deng, Hao Su, Jonathan Krause, Sanjeev Satheesh, Sean Ma, Zhiheng Huang, Andrej Karpathy, Aditya Khosla, Michael Bernstein, Alexander C. Berg, and Li Fei-Fei. 2015. ImageNet Large Scale Visual Recognition Challenge. International Journal of Computer Vision (IJCV) 115, 3 (2015), 211--252. https:\/\/doi.org\/10.1007\/s11263-015-0816-y","DOI":"10.1007\/s11263-015-0816-y"},{"key":"key-10.1145\/3178876.3185995-27","doi-asserted-by":"crossref","unstructured":"W. J. Scheirer, A. de Rezende Rocha, A. Sapkota, and T. E. Boult. 2013. Toward Open Set Recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence 35, 7 (July 2013), 1757--1772. https:\/\/doi.org\/10.1109\/TPAMI.2012.256","DOI":"10.1109\/TPAMI.2012.256"},{"key":"key-10.1145\/3178876.3185995-28","unstructured":"Gregor PJ Schmitz, Chris Aldrich, and Francois S Gouws. 1999. ANN-DT: an algorithm for extraction of decision trees from artificial neural networks. IEEE Transactions on Neural Networks 10, 6 (1999), 1392--1401."},{"key":"key-10.1145\/3178876.3185995-29","unstructured":"David Silver, Aja Huang, Chris J Maddison, Arthur Guez, Laurent Sifre, George Van Den Driessche, Julian Schrittwieser, Ioannis Antonoglou, Veda Panneershelvam, Marc Lanctot, et al. 2016. Mastering the game of Go with deep neural networks and tree search. Nature 529, 7587 (2016), 484--489."},{"key":"key-10.1145\/3178876.3185995-30","unstructured":"J Springenberg, Alexey Dosovitskiy, Thomas Brox, and M Riedmiller. 2015. Striving for Simplicity: The All Convolutional Net. In ICLR (workshop track)."},{"key":"key-10.1145\/3178876.3185995-31","doi-asserted-by":"crossref","unstructured":"Christian Szegedy, Vincent Vanhoucke, Sergey Ioffe, Jon Shlens, and Zbigniew Wojna. 2016. Rethinking the inception architecture for computer vision. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2818--2826.","DOI":"10.1109\/CVPR.2016.308"},{"key":"key-10.1145\/3178876.3185995-32","unstructured":"Tensorflow. 2017. Deep MNIST for Experts. https:\/\/www.tensorflow.org\/get_started\/mnist\/pros. (2017). [Online; accessed 07-July-2017]."},{"key":"key-10.1145\/3178876.3185995-33","doi-asserted-by":"crossref","unstructured":"Csaba D Toth, Joseph O'Rourke, and Jacob E Goodman. 2004. Handbook of discrete and computational geometry. CRC press.","DOI":"10.1201\/9781420035315"},{"key":"key-10.1145\/3178876.3185995-34","unstructured":"Florian Tram&#232;r, Fan Zhang, Ari Juels, Michael K Reiter, and Thomas Ristenpart. 2016. Stealing machine learning models via prediction apis. In USENIX Security."},{"key":"key-10.1145\/3178876.3185995-35","unstructured":"Jason Yosinski, Jeff Clune, Anh Nguyen, Thomas Fuchs, and Hod Lipson. 2015. Understanding neural networks through deep visualization. arXiv preprint arXiv:1506.06579 (2015)."},{"key":"key-10.1145\/3178876.3185995-36","unstructured":"Matthew D Zeiler and Rob Fergus. 2014. Visualizing and understanding convolutional networks. In European conference on computer vision. Springer, 818--833."},{"key":"key-10.1145\/3178876.3185995-37","unstructured":"Daniel Zoran, Balaji Lakshminarayanan, and Charles Blundell. 2017. Learning Deep Nearest Neighbor Representations Using Differentiable Boundary Trees. arXiv preprint arXiv:1702.08833 (2017)."}],"event":{"number":"2018","sponsor":["SIGWEB, ACM Special Interest Group on Hypertext, Hypermedia, and Web","IW3C2, International World Wide Web Conference Committee"],"acronym":"WWW '18","name":"the 2018 World Wide Web Conference","start":{"date-parts":[[2018,4,23]]},"location":"Lyon, France","end":{"date-parts":[[2018,4,27]]}},"container-title":["Proceedings of the 2018 World Wide Web Conference on World Wide Web - WWW '18"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3178876.3185995","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3185995&ftid=1957462&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:59Z","timestamp":1750213619000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3178876.3185995"}},"subtitle":[],"proceedings-subject":"World Wide Web","short-title":[],"issued":{"date-parts":[[2018]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1145\/3178876.3185995","relation":{},"subject":[],"published":{"date-parts":[[2018]]}}}