{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T20:46:30Z","timestamp":1768682790037,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":65,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key R\\&D Program of China","award":["2020AAA0140001"],"award-info":[{"award-number":["2020AAA0140001"]}]},{"name":"NSFC","award":["U1836211"],"award-info":[{"award-number":["U1836211"]}]},{"name":"Beijing Natural Science Foundation","award":["JQ18011"],"award-info":[{"award-number":["JQ18011"]}]},{"name":"National Top-notch Youth Talents Program of China"},{"name":"Youth Innovation Promotion Association CAS"},{"name":"Beijing Academy of Artificial Intelligence (BAAI)"},{"DOI":"10.13039\/501100003816","name":"Huawei Technologies","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003816","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484818","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:33Z","timestamp":1636805133000},"page":"141-158","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["AI-Lancet: Locating Error-inducing Neurons to Optimize Neural Networks"],"prefix":"10.1145","author":[{"given":"Yue","family":"Zhao","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, China, Beijing, China"}]},{"given":"Hong","family":"Zhu","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, China, Beijing, China"}]},{"given":"Kai","family":"Chen","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences &amp; China University of Chinese Academy of Sciences, China &amp; Beijing Academy of Artificial Intelligence, China, Beijing, China"}]},{"given":"Shengzhi","family":"Zhang","sequence":"additional","affiliation":[{"name":"Metropolitan College, Boston University, USA, Boston, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"crossref","unstructured":"Rahaf Aljundi Francesca Babiloni Mohamed Elhoseiny Marcus Rohrbach and Tinne Tuytelaars. 2018. Memory Aware Synapses: Learning what (not) to forget. In ECCV .","DOI":"10.1007\/978-3-030-01219-9_9"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"crossref","unstructured":"Francisco M. Castro Manuel J. Mar\u00edn-Jim\u00e9nez Nicol\u00e1s Guil Cordelia Schmid and Karteek Alahari. 2018. End-to-End Incremental Learning. In Computer Vision -- ECCV 2018 Vittorio Ferrari Martial Hebert Cristian Sminchisescu and Yair Weiss (Eds.). Cham 241--257.","DOI":"10.1007\/978-3-030-01258-8_15"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"crossref","unstructured":"Huili Chen Cheng Fu Jishen Zhao and Farinaz Koushanfar. 2019. DeepInspect: A Black-box Trojan Detection and Mitigation Framework for Deep Neural Networks. In IJCAI .","DOI":"10.24963\/ijcai.2019\/647"},{"key":"e_1_3_2_2_4_1","volume-title":"Metamorphic Testing: A New Approach for Generating Next Test Cases. arxiv","author":"Chen T. Y.","year":"2020","unstructured":"T. Y. Chen, S. C. Cheung, and S. M. Yiu. 2020. Metamorphic Testing: A New Approach for Generating Next Test Cases. arxiv: 2002.12543 [cs.SE]"},{"key":"e_1_3_2_2_5_1","volume-title":"Targeted backdoor attacks on deep learning systems using data poisoning. arXiv preprint arXiv:1712.05526","author":"Chen Xinyun","year":"2017","unstructured":"Xinyun Chen, Chang Liu, Bo Li, Kimberly Lu, and Dawn Song. 2017. Targeted backdoor attacks on deep learning systems using data poisoning. arXiv preprint arXiv:1712.05526 (2017)."},{"key":"e_1_3_2_2_6_1","volume-title":"Neural Nets Can Learn Function Type Signatures From Binaries. In USENIX Security Symposium .","author":"Chua Zheng Leong","year":"2017","unstructured":"Zheng Leong Chua, Shiqi Shen, P. Saxena, and Zhenkai Liang. 2017. Neural Nets Can Learn Function Type Signatures From Binaries. In USENIX Security Symposium ."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01446"},{"key":"e_1_3_2_2_8_1","volume-title":"2019 International Conference on Robotics and Automation (ICRA) . 2090--2096","author":"Cui H.","unstructured":"H. Cui, V. Radosavljevic, F. Chou, T. Lin , T. Nguyen, T. Huang , J. Schneider, and N. Djuric. 2019. Multimodal Trajectory Predictions for Autonomous Driving using Deep Convolutional Networks. In 2019 International Conference on Robotics and Automation (ICRA) . 2090--2096."},{"key":"e_1_3_2_2_9_1","volume-title":"Proceedings of the 2017 Conference on Learning Theory (Proceedings of Machine Learning Research","volume":"677","author":"Cutkosky Ashok","year":"2017","unstructured":"Ashok Cutkosky and Kwabena Boahen. 2017. Online Learning Without Prior Information. In Proceedings of the 2017 Conference on Learning Theory (Proceedings of Machine Learning Research, Vol. 65), Satyen Kale and Ohad Shamir (Eds.). PMLR, 643--677. http:\/\/proceedings.mlr.press\/v65\/cutkosky17a.html"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"crossref","unstructured":"J. Deng W. Dong R. Socher L.-J. Li K. Li and L. Fei-Fei. 2009. ImageNet: A Large-Scale Hierarchical Image Database. In CVPR09 .","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_3_2_2_11_1","unstructured":"J. Dumford and W. Scheirer. 2018. Backdooring convolutional neural networks via targeted weight perturbations. arXiv preprint arXiv:1812.03128 (2018)."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213858"},{"key":"e_1_3_2_2_13_1","volume-title":"Supporting DNN Safety Analysis and Retraining through Heatmap-based Unsupervised Learning. arxiv","author":"Fahmy Hazem","year":"2002","unstructured":"Hazem Fahmy, Mojtaba Bagherzadeh, Fabrizio Pastore, and Lionel Briand. 2020. Supporting DNN Safety Analysis and Retraining through Heatmap-based Unsupervised Learning. arxiv: 2002.00863 [cs.SE]"},{"key":"e_1_3_2_2_14_1","volume-title":"Badnets: Identifying vulnerabilities in the machine learning model supply chain. arXiv preprint arXiv:1708.06733","author":"Gu Tianyu","year":"2017","unstructured":"Tianyu Gu, Brendan Dolan-Gavitt, and Siddharth Garg. 2017. Badnets: Identifying vulnerabilities in the machine learning model supply chain. arXiv preprint arXiv:1708.06733 (2017)."},{"key":"e_1_3_2_2_15_1","volume-title":"Trojannet: Embedding hidden trojan horse models in neural networks. arXiv preprint arXiv:2002.10078","author":"Guo C.","year":"2020","unstructured":"C. Guo, R. Wu, and K. Q. Weinberger. 2020. Trojannet: Embedding hidden trojan horse models in neural networks. arXiv preprint arXiv:2002.10078 (2020)."},{"key":"e_1_3_2_2_16_1","volume-title":"Tabor: A highly accurate approach to inspecting and restoring trojan backdoors in ai systems. arXiv preprint arXiv:1908.01763","author":"Guo Wenbo","year":"2019","unstructured":"Wenbo Guo, Lun Wang, Xinyu Xing, Min Du, and Dawn Song. 2019. Tabor: A highly accurate approach to inspecting and restoring trojan backdoors in ai systems. arXiv preprint arXiv:1908.01763 (2019)."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01219-9_27"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00092"},{"key":"e_1_3_2_2_20_1","volume-title":"Less-forgetful Learning for Domain Expansion in Deep Neural Networks . AAAI","author":"Jung Heechul","year":"2018","unstructured":"Heechul Jung, Jeongwoo Ju, Minju Jung, and Junmo Kim. 2018. Less-forgetful Learning for Domain Expansion in Deep Neural Networks . AAAI (2018)."},{"key":"e_1_3_2_2_21_1","volume-title":"Proceedings of the 3rd MLSys Conference","author":"Kang Daniel","year":"2020","unstructured":"Daniel Kang, Deepti Raghavan, Peter Bailis, and Matei Zaharia. 2020. Model Assertions for Monitoring and Improving ML Models. In Proceedings of the 3rd MLSys Conference. Austin, TX, USA."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cell.2018.02.010"},{"key":"e_1_3_2_2_23_1","volume-title":"Adam: A Method for Stochastic Optimization. Computer Science","author":"Kingma Diederik","year":"2014","unstructured":"Diederik Kingma and Jimmy Ba. 2014. Adam: A Method for Stochastic Optimization. Computer Science (2014)."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1611835114"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00038"},{"key":"e_1_3_2_2_26_1","volume-title":"et almbox","author":"Krizhevsky Alex","year":"2009","unstructured":"Alex Krizhevsky, Geoffrey Hinton, et almbox. 2009. Learning multiple layers of features from tiny images. (2009)."},{"key":"e_1_3_2_2_27_1","volume-title":"et almbox","author":"LeCun Yann","year":"1995","unstructured":"Yann LeCun, LD Jackel, L\u00e9on Bottou, Corinna Cortes, John S Denker, Harris Drucker, Isabelle Guyon, Urs A Muller, Eduard Sackinger, Patrice Simard, et almbox. 1995. Learning algorithms for classification: A comparison on handwritten digit recognition. Neural networks: the statistical mechanics perspective , Vol. 261 (1995), 276."},{"key":"e_1_3_2_2_28_1","volume-title":"Neural attention distillation: Erasing backdoor triggers from deep neural networks. arXiv preprint arXiv:2101.05930","author":"Li Yige","year":"2021","unstructured":"Yige Li, Xixiang Lyu, Nodens Koren, Lingjuan Lyu, Bo Li, and Xingjun Ma. 2021. Neural attention distillation: Erasing backdoor triggers from deep neural networks. arXiv preprint arXiv:2101.05930 (2021)."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2017.2773081"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_13"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363216"},{"key":"e_1_3_2_2_32_1","volume-title":"Trojaning Attack on Neural Networks. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018","author":"Liu Yingqi","year":"2018","unstructured":"Yingqi Liu, Shiqing Ma, Yousra Aafer, Wen-Chuan Lee, Juan Zhai, Weihang Wang, and Xiangyu Zhang. 2018b. Trojaning Attack on Neural Networks. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18--21, 2018 . The Internet Society. http:\/\/wp.internetsociety.org\/ndss\/wp-content\/uploads\/sites\/25\/2018\/02\/ndss2018_03A-5_Liu_paper.pdf"},{"key":"e_1_3_2_2_33_1","volume-title":"Proc. of NDSS","author":"Liu Yingqi","year":"2017","unstructured":"Yingqi Liu, Shiqing Ma, Yousra Aafer, Wen-Chuan Lee, Juan Zhai, Weihang Wang, and Xiangyu Zhang. 2017. Trojaning attack on neural networks. in Proc. of NDSS (2017)."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236082"},{"key":"e_1_3_2_2_35_1","volume-title":"Proceedings of the 36th International Conference on Machine Learning (Proceedings of Machine Learning Research","volume":"4911","author":"Odena Augustus","year":"2019","unstructured":"Augustus Odena, Catherine Olsson, David Andersen, and Ian Goodfellow. 2019. TensorFuzz: Debugging Neural Networks with Coverage-Guided Fuzzing. In Proceedings of the 36th International Conference on Machine Learning (Proceedings of Machine Learning Research, Vol. 97), Kamalika Chaudhuri and Ruslan Salakhutdinov (Eds.). PMLR, Long Beach, California, USA, 4901--4911."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2019.01.012"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132785"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco_a_00990"},{"key":"e_1_3_2_2_39_1","volume-title":"2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 5533--5542","author":"Rebuffi S.","unstructured":"S. Rebuffi, A. Kolesnikov, G. Sperl, and C. H. Lampert. 2017. iCaRL: Incremental Classifier and Representation Learning. In 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 5533--5542."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939778"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"crossref","unstructured":"A. Saha A. Subramanya and H. Pirsiavash. 2020. Hidden trigger backdoor attacks. in AAAI (2020).","DOI":"10.1609\/aaai.v34i07.6871"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.74"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.368"},{"key":"e_1_3_2_2_45_1","volume-title":"Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556","author":"Simonyan Karen","year":"2014","unstructured":"Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-020-00105-y"},{"key":"e_1_3_2_2_47_1","volume-title":"Man vs. computer: Benchmarking machine learning algorithms for traffic sign recognition. Neural networks","author":"Stallkamp Johannes","year":"2012","unstructured":"Johannes Stallkamp, Marc Schlipsing, Jan Salmen, and Christian Igel. 2012. Man vs. computer: Benchmarking machine learning algorithms for traffic sign recognition. Neural networks , Vol. 32 (2012), 323--332."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2018.2865044"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"crossref","unstructured":"R. Tang M. Du N. Liu F. Yang and X. Hu. 2020. An embarrassingly simple approach for trojan attack in deep neural networks. in KDD (2020).","DOI":"10.1145\/3394486.3403064"},{"key":"e_1_3_2_2_51_1","volume-title":"DeepTest: Automated Testing of Deep-Neural-Network-driven Autonomous Cars. CoRR","author":"Tian Yuchi","year":"2017","unstructured":"Yuchi Tian, Kexin Pei, Suman Jana, and Baishakhi Ray. 2017. DeepTest: Automated Testing of Deep-Neural-Network-driven Autonomous Cars. CoRR , Vol. abs\/1708.08559 (2017). arxiv: 1708.08559 http:\/\/arxiv.org\/abs\/1708.08559"},{"key":"e_1_3_2_2_52_1","volume-title":"Encoder Based Lifelong Learning. 2017 IEEE International Conference on Computer Vision (ICCV)","author":"Triki Amal Rannen","year":"2017","unstructured":"Amal Rannen Triki, Rahaf Aljundi, Matthew B. Blaschko, and Tinne Tuytelaars. 2017. Encoder Based Lifelong Learning. 2017 IEEE International Conference on Computer Vision (ICCV) (2017), 1329--1337."},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00031"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098158"},{"key":"e_1_3_2_2_55_1","unstructured":"S. Wang S. Nepal C. Rudolph M. Grobler S. Chen and T. Chen. 2020. Backdoor Attacks against Transfer Learning with Pre-trained Deep Learning Models. IEEE Transactions on Services Computing (2020) 1--1."},{"key":"e_1_3_2_2_56_1","volume-title":"Technical Report CNS-TR-2010-001. California Institute of Technology.","author":"Welinder P.","year":"2010","unstructured":"P. Welinder, S. Branson, T. Mita, C. Wah, F. Schroff, S. Belongie, and P. Perona. 2010. Caltech-UCSD Birds 200. Technical Report CNS-TR-2010-001. California Institute of Technology."},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995566"},{"key":"e_1_3_2_2_58_1","volume-title":"Large Scale Incremental Learning. 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","author":"Wu Yue","year":"2019","unstructured":"Yue Wu, Yan-Jia Chen, Lijuan Wang, Yuancheng Ye, Zicheng Liu, Yandong Guo, and Yun Fu. 2019. Large Scale Incremental Learning. 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2019), 374--382."},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330579"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.6140"},{"key":"e_1_3_2_2_61_1","volume-title":"O'Leary","author":"Yousefzadeh Roozbeh","year":"2020","unstructured":"Roozbeh Yousefzadeh and Dianne P. O'Leary. 2020. Auditing and Debugging Deep Learning Models via Decision Boundaries: Individual-level and Group-level Analysis. arxiv: 2001.00682 [cs.LG]"},{"key":"e_1_3_2_2_62_1","volume-title":"Proceedings of the 34th International Conference on Machine Learning (Proceedings of Machine Learning Research","volume":"3995","author":"Zenke Friedemann","year":"2017","unstructured":"Friedemann Zenke, Ben Poole, and Surya Ganguli. 2017. Continual Learning Through Synaptic Intelligence. In Proceedings of the 34th International Conference on Machine Learning (Proceedings of Machine Learning Research, Vol. 70). PMLR, International Convention Centre, Sydney, Australia, 3987--3995."},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"crossref","unstructured":"S. Zhao X. Ma X.and Zheng J. Bailey J. Chen and Y. G. Jiang. 2020. Clean label backdoor attacks on video recognition models. in CVPR (2020).","DOI":"10.1109\/CVPR42600.2020.01445"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.319"},{"key":"e_1_3_2_2_65_1","volume-title":"PoTrojan: powerful neural-level trojan designs in deep learning models. ArXiv","author":"Zou Minhui","year":"2018","unstructured":"Minhui Zou, Y. Shi, C. Wang, F. Li, Wenzhan Song, and Yu Wang. 2018. PoTrojan: powerful neural-level trojan designs in deep learning models. ArXiv , Vol. abs\/1802.03043 (2018)."}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484818","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484818","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:47:24Z","timestamp":1763498844000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484818"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":65,"alternative-id":["10.1145\/3460120.3484818","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484818","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}