{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T19:10:02Z","timestamp":1772910602597,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":86,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,8]],"date-time":"2022-11-08T00:00:00Z","timestamp":1667865600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Cisco"},{"DOI":"10.13039\/100006785","name":"Google","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006785","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["2107230, 2229703, 2107020, 2104319"],"award-info":[{"award-number":["2107230, 2229703, 2107020, 2104319"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,11]]},"DOI":"10.1145\/3560835.3564547","type":"proceedings-article","created":{"date-parts":[[2022,11,9]],"date-time":"2022-11-09T02:38:26Z","timestamp":1667961506000},"page":"105-114","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["An Empirical Study of Artifacts and Security Risks in the Pre-trained Model Supply Chain"],"prefix":"10.1145","author":[{"given":"Wenxin","family":"Jiang","sequence":"first","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Nicholas","family":"Synovic","sequence":"additional","affiliation":[{"name":"Loyola University Chicago, Chicago, IL, USA"}]},{"given":"Rohan","family":"Sethi","sequence":"additional","affiliation":[{"name":"Loyola University Chicago, Chicago, IL, USA"}]},{"given":"Aryan","family":"Indarapu","sequence":"additional","affiliation":[{"name":"University of Illinois-Urbana Champaign, Champaign, IL, USA"}]},{"given":"Matt","family":"Hyatt","sequence":"additional","affiliation":[{"name":"Loyola University Chicago, Chicago, IL, USA"}]},{"given":"Taylor R.","family":"Schorlemmer","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"George K.","family":"Thiruvathukal","sequence":"additional","affiliation":[{"name":"Loyola University Chicago, Chicago, IL, USA"}]},{"given":"James C.","family":"Davis","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,11,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2807385"},{"key":"e_1_3_2_1_2_1","volume-title":"Davis","author":"Banna Vishnu","year":"2021","unstructured":"Vishnu Banna, Akhil Chinnakotla, Zhengxin Yan, Anirudh Vegesana, Naveen Vivek, Kruthi Krishnappa, Wenxin Jiang, Yung-Hsiang Lu, George K. Thiruvathukal, and James C. Davis. 2021. An Experience Report on Machine Learning Reproducibility: Guidance for Practitioners and TensorFlow Model Garden Contributors. http:\/\/arxiv.org\/abs\/2107.00821"},{"key":"e_1_3_2_1_3_1","volume-title":"European Symposium on Artificial Neural Networks.","author":"Bibal Adrien","year":"2016","unstructured":"Adrien Bibal and Beno\u00eet Fr\u00e9nay. 2016. Interpretability of Machine Learning Models and Representations: an Introduction. In European Symposium on Artificial Neural Networks."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110542"},{"key":"e_1_3_2_1_7_1","unstructured":"Anirban Chakraborty Manaar Alam Vishal Dey Anupam Chattopadhyay and Debdeep Mukhopadhyay. 2018. Adversarial Attacks and Defences: A Survey. https:\/\/arxiv.org\/abs\/1810.00069"},{"key":"e_1_3_2_1_8_1","unstructured":"Cisco. 2022. ClamAV. https:\/\/www.clamav.net\/"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.2765202"},{"key":"e_1_3_2_1_10_1","unstructured":"Yiming Cui Wanxiang Che Ting Liu Bing Qin Shijin Wang and Guoping Hu. 2020. Revisiting Pre-Trained Models for Chinese Natural Language Processing. http:\/\/arxiv.org\/abs\/2004.13922"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236027"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888919000055"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196398.3196401"},{"key":"e_1_3_2_1_14_1","volume-title":"BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. Technical Report arXiv:1810.04805. arXiv","author":"Devlin Jacob","year":"2019","unstructured":"Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2019. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. Technical Report arXiv:1810.04805. arXiv. http:\/\/arxiv.org\/abs\/1810.04805"},{"key":"e_1_3_2_1_15_1","unstructured":"Finale Doshi-Velez and Been Kim. 2017. Towards A Rigorous Science of Interpretable Machine Learning. https:\/\/arxiv.org\/abs\/1702.08608"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the World Congress on Engineering and Computer Science","volume":"1","author":"Du Shixian","year":"2013","unstructured":"Shixian Du, Tianbo Lu, Lingling Zhao, Bing Xu, Xiaobo Guo, and Hongyu Yang. 2013. Towards An Analysis of Software Supply Chain Risk Management. In Proceedings of the World Congress on Engineering and Computer Science, Vol. 1."},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops. 122--129","author":"Dube Parijat","year":"2019","unstructured":"Parijat Dube, Bishwaranjan Bhattacharjee, Siyu Huo, Patrick Watson, and Brian Belgodere. 2019. Automatic Labeling of Data for Transfer Learning. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops. 122--129."},{"key":"e_1_3_2_1_19_1","unstructured":"Hugging Face. 2021. Hugging Face -- The AI community building the future. https:\/\/huggingface.co\/"},{"key":"e_1_3_2_1_20_1","unstructured":"Hugging Face. 2022a. Announcing Evaluation on the Hub. https:\/\/huggingface.co\/blog\/eval-on-the-hub"},{"key":"e_1_3_2_1_21_1","unstructured":"Hugging Face. 2022b. Hugging Face Hub documentation. https:\/\/huggingface.co\/docs\/hub\/index"},{"key":"e_1_3_2_1_22_1","unstructured":"Jon Fingas. 2022. AI trained on 4chan's most hateful board is just as toxic as you'd expect. https:\/\/www.engadget.com\/ai-bot-4chan-hate-machine-162550734.html"},{"key":"e_1_3_2_1_23_1","unstructured":"Shannon Flynn. 2020. Artificial Intelligence Bias Affects Everyone - Even You. https:\/\/rehack.com\/iot\/artificial-intelligence-bias\/"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iatssr.2019.11.008"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380397"},{"key":"e_1_3_2_1_26_1","volume-title":"Backdoor Attacks, and Defenses","author":"Goldblum Micah","year":"2022","unstructured":"Micah Goldblum, Dimitris Tsipras, Chulin Xie, Xinyun Chen, Avi Schwarzschild, Dawn Song, Aleksander Madry, Bo Li, and Tom Goldstein. 2022. Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses. IEEE Transactions on Pattern Analysis and Machine Intelligence (2022)."},{"key":"e_1_3_2_1_27_1","volume-title":"Engineering and Security Practices for Machine Learning-based IoT Devices. In International Workshop on Software Engineering Research & Practices for the Internet of Things (SERP4IoT).","author":"Gopalakrishna Nikhil Krishna","year":"2022","unstructured":"Nikhil Krishna Gopalakrishna, Dharun Anandayuvaraj, Annan Detti, Forrest Lee Bland, Sazzadur Rahaman, and James C Davis. 2022. \u201cIf security is required\u201d: Engineering and Security Practices for Machine Learning-based IoT Devices. In International Workshop on Software Engineering Research & Practices for the Internet of Things (SERP4IoT)."},{"key":"e_1_3_2_1_28_1","unstructured":"Josh Gordon. 2018. Introducing TensorFlow Hub: A Library for Reusable Machine Learning Modules in TensorFlow. https:\/\/blog.tensorflow.org\/2018\/03\/introducing-tensorflow-hub-library.html."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Jianping Gou Baosheng Yu Stephen J Maybank and Dacheng Tao. 2021. Knowledge distillation: A survey. 1789--1819 pages.","DOI":"10.1007\/s11263-021-01453-z"},{"key":"e_1_3_2_1_30_1","unstructured":"Priya Goyal Piotr Doll\u00e1r Ross Girshick Pieter Noordhuis Lukasz Wesolowski Aapo Kyrola Andrew Tulloch Yangqing Jia and Kaiming He. 2018. Accurate Large Minibatch SGD: Training ImageNet in 1 Hour. https:\/\/arxiv.org\/abs\/1706.02677"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","unstructured":"Tianyu Gu Brendan Dolan-Gavitt and Siddharth Garg. 2019. BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain. https:\/\/doi.org\/10.48550\/arXiv.1708.06733","DOI":"10.48550\/arXiv.1708.06733"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00080"},{"key":"e_1_3_2_1_33_1","volume-title":"Robustness and explainability of Artificial Intelligence: from technical to policy solutions","author":"Hamon Ronan","year":"2020","unstructured":"Ronan Hamon, Henrik Junklewitz, and Ignacio Sanchez. 2020. Robustness and explainability of Artificial Intelligence: from technical to policy solutions. Publications Office of the European Union (2020)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aiopen.2021.08.002"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_36_1","unstructured":"Cathal Horan. 2020. Can GPT-3 or BERT Ever Understand Language??-The Limits of Deep Learning Language Models. https:\/\/neptune.ai\/blog\/gpt-3-bert-limits-of-deep-learning-language-models"},{"key":"e_1_3_2_1_37_1","unstructured":"Ahmed Hosny Michael Schwier Christoph Berger Evin P. \u00d6rnek Mehmet Turan Phi V. Tran Leon Weninger Fabian Isensee Klaus H. Maier-Hein Richard McKinley Michael T. Lu Udo Hoffmann Bjoern Menze Spyridon Bakas Andriy Fedorov and Hugo JWL Aerts. 2019. ModelHub. AI: Dissemination Platform for Deep Learning Models. http:\/\/arxiv.org\/abs\/1911.13218"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046684.2046692"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--642--39336--5_19"},{"key":"e_1_3_2_1_40_1","volume-title":"Materials Today: Proceedings","author":"Jeyanthi Suresh A.","year":"2020","unstructured":"A. Jeyanthi Suresh and J. Visumathi. 2020. Inception ResNet deep transfer learning model for human action recognition using LSTM. Materials Today: Proceedings (2020)."},{"key":"e_1_3_2_1_41_1","unstructured":"Yu Koh Jing. 2021. Model Zoo - Deep learning code and pretrained models. https:\/\/modelzoo.co\/"},{"key":"e_1_3_2_1_42_1","unstructured":"Andrew Khalel and Motaz El-Saban. 2018. Automatic Pixelwise Object Labeling for Aerial Imagery Using Stacked U-Nets. http:\/\/arxiv.org\/abs\/1803.04953"},{"key":"e_1_3_2_1_43_1","unstructured":"Yannic Kilcher. 2022. Totally Harmless Model. https:\/\/huggingface.co\/ykilcher\/totally-harmless-model"},{"key":"e_1_3_2_1_44_1","first-page":"84","article-title":"ImageNet Classification with Deep Convolutional Neural Networks","volume":"6","author":"Krizhevsky Alex","year":"2012","unstructured":"Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hinton. 2012. ImageNet Classification with Deep Convolutional Neural Networks. In Advances in Neural Information Processing Systems (NeurIPS), Vol. 6. 84--90.","journal-title":"Advances in Neural Information Processing Systems (NeurIPS)"},{"key":"e_1_3_2_1_46_1","unstructured":"Computational Imaging and Bioinformatics Lab. 2022. Modelhub. http:\/\/modelhub.ai\/"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Piergiorgio Ladisa Henrik Plate Matias Martinez and Olivier Barais. 2022. Taxonomy of Attacks on Open-Source Software Supply Chains. http:\/\/arxiv.org\/abs\/2204.04008","DOI":"10.1145\/3560835.3564546"},{"key":"e_1_3_2_1_48_1","volume-title":"Trojaning Attack on Neural Networks. In Network and Distributed Systems Security (NDSS) Symposium.","author":"Liu Yingqi","year":"2018","unstructured":"Yingqi Liu, Shiqing Ma, Yousra Aafer, Wen-Chuan Lee, Juan Zhai, Weihang Wang, and Xiangyu Zhang. 2018. Trojaning Attack on Neural Networks. In Network and Distributed Systems Security (NDSS) Symposium."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560678"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.12.026"},{"key":"e_1_3_2_1_51_1","unstructured":"Pedro Marcelino. 2022. Transfer learning from pre-trained models. https:\/\/towardsdatascience.com\/transfer-learning-from-pre-trained-models-f2393f124751"},{"key":"e_1_3_2_1_52_1","unstructured":"MathWorks. 2022. MATLAB Deep Learning Model Hub. https:\/\/www.mathworks.com\/solutions\/deep-learning.html"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3560881"},{"key":"e_1_3_2_1_54_1","unstructured":"NPM. 2022. npm. https:\/\/www.npmjs.com\/"},{"key":"e_1_3_2_1_55_1","volume-title":"NVIDIA NGC: AI Development Catalog. https:\/\/catalog.ngc.nvidia.com\/","author":"NVIDIA.","year":"2022","unstructured":"NVIDIA. 2022. NVIDIA NGC: AI Development Catalog. https:\/\/catalog.ngc.nvidia.com\/"},{"key":"e_1_3_2_1_56_1","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment, , Cl\u00e9mentine Maurice","author":"Ohm Marc","unstructured":"Marc Ohm, Henrik Plate, Arnold Sykosch, and Michael Meier. 2020. Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks. In Detection of Intrusions and Malware, and Vulnerability Assessment, , Cl\u00e9mentine Maurice, Leyla Bilge, Gianluca Stringhini, and Nuno Neves (Eds.). Springer, 23--43."},{"key":"e_1_3_2_1_57_1","unstructured":"ONNX. 2022. ONNX Model Zoo. ONNX. https:\/\/github.com\/onnx\/models"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.191"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","unstructured":"David Patterson Joseph Gonzalez Quoc Le Chen Liang Lluis-Miquel Munguia Daniel Rothchild David So Maud Texier and Jeff Dean. 2021. Carbon Emissions and Large Neural Network Training. https:\/\/doi.org\/10.48550\/arXiv.2104.10350","DOI":"10.48550\/arXiv.2104.10350"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416545"},{"key":"e_1_3_2_1_61_1","unstructured":"PyPI. 2022. Python Package Index. https:\/\/pypi.org"},{"key":"e_1_3_2_1_62_1","unstructured":"Pytorch. 2022. PyTorch Hub. https:\/\/pytorch.org\/hub\/"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11431-020-1647-3"},{"key":"e_1_3_2_1_64_1","volume-title":"International Conference on Communication and Signal Processing (ICCSP). 0945--0949","author":"Reddy A. Sai Bharadwaj","unstructured":"A. Sai Bharadwaj Reddy and D. Sujitha Juliet. 2019. Transfer Learning with ResNet-50 for Malaria Cell-Image Classification. In International Conference on Communication and Signal Processing (ICCSP). 0945--0949."},{"key":"e_1_3_2_1_65_1","volume-title":"Malicious Software Classification Using Transfer Learning of ResNet-50 Deep Neural Network. In International Conference on Machine Learning and Applications (ICMLA). 1011--1014","author":"Rezende Edmar","year":"2017","unstructured":"Edmar Rezende, Guilherme Ruppert, Tiago Carvalho, Fabio Ramos, and Paulo de Geus. 2017. Malicious Software Classification Using Transfer Learning of ResNet-50 Deep Neural Network. In International Conference on Machine Learning and Applications (ICMLA). 1011--1014."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6871"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01485"},{"key":"e_1_3_2_1_68_1","volume-title":"On Challenges in Machine Learning Model Management. Bulletin of the IEEE Computer Society Technical Committee on Data Engineering","author":"Schelter Sebastian","year":"2018","unstructured":"Sebastian Schelter, Felix Biessmann, Tim Januschowski, David Salinas, Stephan Seufert, and Gyuri Szarvas. 2018. On Challenges in Machine Learning Model Management. Bulletin of the IEEE Computer Society Technical Committee on Data Engineering (2018)."},{"key":"e_1_3_2_1_69_1","volume-title":"Weaponizing data science for social engineering: Automated E2E spear phishing on Twitter. Black Hat USA","author":"Seymour John","year":"2016","unstructured":"John Seymour and Philip Tully. 2016. Weaponizing data science for social engineering: Automated E2E spear phishing on Twitter. Black Hat USA (2016)."},{"key":"e_1_3_2_1_70_1","volume-title":"Khoshgoftaar","author":"Shorten Connor","year":"2019","unstructured":"Connor Shorten and Taghi M. Khoshgoftaar. 2019. A survey on Image Data Augmentation for Deep Learning. Journal of Big Data (2019)."},{"key":"e_1_3_2_1_71_1","volume-title":"Prediction of Steering Angle for Autonomous Vehicles Using Pre-Trained Neural Network. European Journal of Engineering and Technology Research","author":"Sokipriala Jonah","year":"2021","unstructured":"Jonah Sokipriala. 2021. Prediction of Steering Angle for Autonomous Vehicles Using Pre-Trained Neural Network. European Journal of Engineering and Technology Research (2021)."},{"key":"e_1_3_2_1_72_1","article-title":"A Survey on Deep Transfer Learning","author":"Tan Chuanqi","year":"2018","unstructured":"Chuanqi Tan, Fuchun Sun, Tao Kong, Wenchang Zhang, Chao Yang, and Chunfang Liu. 2018. A Survey on Deep Transfer Learning. IEEE Transactions on knowledge and data engineering , Vol. IEEE Transactions on knowledge and data engineering (2018). http:\/\/arxiv.org\/abs\/1808.01974","journal-title":"IEEE Transactions on knowledge and data engineering"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510199"},{"key":"e_1_3_2_1_74_1","volume-title":"Reproducibility in Machine Learning Workshop at ICML.","author":"Tatman Rachael","year":"2018","unstructured":"Rachael Tatman, Jake Vanderplas, and Sohier Dane. 2018. A Practical Taxonomy of Reproducibility for Machine Learning Research. In Reproducibility in Machine Learning Workshop at ICML."},{"key":"e_1_3_2_1_75_1","unstructured":"TensorFlow. 2022. TensorFlow Hub. https:\/\/www.tensorflow.org\/hub"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"crossref","unstructured":"George K Thiruvathukal Yung-Hsiang Lu Jaeyoun Kim Yiran Chen and Bo Chen. 2022. Low-power Computer Vision: Improve the Efficiency of Artificial Intelligence.","DOI":"10.1201\/9781003162810"},{"key":"e_1_3_2_1_77_1","volume-title":"Learning to learn","author":"Thrun Sebastian","unstructured":"Sebastian Thrun and Lorien Pratt. 1998. Learning to learn: Introduction and overview. In Learning to learn. Springer."},{"key":"e_1_3_2_1_78_1","unstructured":"Nikolai Philipp Tschacher. 2016. Typosquatting in programming language package managers. Ph. D. Dissertation. Universit\"at Hamburg Fachbereich Informatik."},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.3000900"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"crossref","unstructured":"Zhi Wang Chaoge Liu and Xiang Cui. 2021. Evilmodel: hiding malware inside of neural network models. 7 pages.","DOI":"10.1109\/ISCC53001.2021.9631425"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102807"},{"key":"e_1_3_2_1_82_1","unstructured":"Jeannette M. Wing. 2021. Trustworthy AI. Commun. ACM (2021)."},{"key":"e_1_3_2_1_83_1","volume-title":"Transformers: State-of-the-Art Natural Language Processing. In Conference on Empirical Methods in Natural Language Processing: System Demonstrations.","author":"Wolf Thomas","year":"2020","unstructured":"Thomas Wolf, Lysandre Debut, Victor Sanh, Julien Chaumond, Clement Delangue, Anthony Moi, Pierric Cistac, Tim Rault, Remi Louf, Morgan Funtowicz, Joe Davison, Sam Shleifer, Patrick von Platen, Clara Ma, Yacine Jernite, Julien Plu, Canwen Xu, Teven Le Scao, Sylvain Gugger, Mariama Drame, Quentin Lhoest, and Alexander Rush. 2020. Transformers: State-of-the-Art Natural Language Processing. In Conference on Empirical Methods in Natural Language Processing: System Demonstrations."},{"key":"e_1_3_2_1_84_1","volume-title":"CoC: Secure Supply Chain Management System Based on Public Ledger. In International Conference on Computer Communication and Networks (ICCCN).","author":"Xu Lei","year":"2017","unstructured":"Lei Xu, Lin Chen, Zhimin Gao, Yang Lu, and Weidong Shi. 2017. CoC: Secure Supply Chain Management System Based on Public Ledger. In International Conference on Computer Communication and Networks (ICCCN)."},{"key":"e_1_3_2_1_85_1","volume-title":"Comprehensive and efficient data labeling via adaptive model scheduling. (2020)","author":"Yuan Mu","year":"1858","unstructured":"Mu Yuan, Lan Zhang, Xiang-Yang Li, and Hui Xiong. 2020. Comprehensive and efficient data labeling via adaptive model scheduling. (2020), 1858--1861."},{"key":"e_1_3_2_1_86_1","volume-title":"ICSE","author":"Zahan Nusrat","year":"2022","unstructured":"Nusrat Zahan, Tom Zimmermann, Patrice Godefroid, Brendan Murphy, Chandra Maddila, and Laurie Williams. 2022. What are Weak Links in the npm Supply Chain?. In ICSE 2022. https:\/\/www.microsoft.com\/en-us\/research\/publication\/what-are-weak-links-in-the-npm-supply-chain\/"},{"key":"e_1_3_2_1_87_1","volume-title":"Todor Mihaylov, Myle Ott, Sam Shleifer, Kurt Shuster, Daniel Simig, Punit Singh Koura, Anjali Sridhar, Tianlu Wang, and Luke Zettlemoyer.","author":"Zhang Susan","year":"2022","unstructured":"Susan Zhang, Stephen Roller, Naman Goyal, Mikel Artetxe, Moya Chen, Shuohui Chen, Christopher Dewan, Mona Diab, Xian Li, Xi Victoria Lin, Todor Mihaylov, Myle Ott, Sam Shleifer, Kurt Shuster, Daniel Simig, Punit Singh Koura, Anjali Sridhar, Tianlu Wang, and Luke Zettlemoyer. 2022. OPT: Open Pre-trained Transformer Language Models. arXiv (2022). http:\/\/arxiv.org\/abs\/2205.01068"},{"key":"e_1_3_2_1_88_1","volume-title":"A Comprehensive Survey on Transfer Learning. arxiv","author":"Zhuang Fuzhen","year":"1911","unstructured":"Fuzhen Zhuang, Zhiyuan Qi, Keyu Duan, Dongbo Xi, Yongchun Zhu, Hengshu Zhu, Hui Xiong, and Qing He. 2020. A Comprehensive Survey on Transfer Learning. arxiv: 1911.02685 https:\/\/arxiv.org\/abs\/1911.02685"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.5555\/3361338.3361407"}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","location":"Los Angeles CA USA","acronym":"CCS '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3560835.3564547","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3560835.3564547","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3560835.3564547","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:09Z","timestamp":1750182549000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3560835.3564547"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,8]]},"references-count":86,"alternative-id":["10.1145\/3560835.3564547","10.1145\/3560835"],"URL":"https:\/\/doi.org\/10.1145\/3560835.3564547","relation":{},"subject":[],"published":{"date-parts":[[2022,11,8]]},"assertion":[{"value":"2022-11-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}