{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T15:10:02Z","timestamp":1755789002294,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":68,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T00:00:00Z","timestamp":1743292800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"Meta","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006374","name":"Amazon","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006374","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Google"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,30]]},"DOI":"10.1145\/3669940.3707246","type":"proceedings-article","created":{"date-parts":[[2025,2,6]],"date-time":"2025-02-06T12:28:01Z","timestamp":1738844881000},"page":"746-761","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Nazar: Monitoring and Adapting ML Models on Mobile Devices"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-8575-2540","authenticated-orcid":false,"given":"Wei","family":"Hao","sequence":"first","affiliation":[{"name":"Columbia University, New York, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-5551-577X","authenticated-orcid":false,"given":"Zixi","family":"Wang","sequence":"additional","affiliation":[{"name":"Columbia University, New York, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-0482-3177","authenticated-orcid":false,"given":"Lauren","family":"Hong","sequence":"additional","affiliation":[{"name":"Columbia University, New York, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-2297-5822","authenticated-orcid":false,"given":"Lingxiao","family":"Li","sequence":"additional","affiliation":[{"name":"Columbia University, New York, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-8653-8595","authenticated-orcid":false,"given":"Nader","family":"Karayanni","sequence":"additional","affiliation":[{"name":"Columbia University, New York, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-9989-0822","authenticated-orcid":false,"given":"AnMei","family":"Dasbach-Prisk","sequence":"additional","affiliation":[{"name":"University of California San Diego, San Diego, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-2649-3368","authenticated-orcid":false,"given":"Chengzhi","family":"Mao","sequence":"additional","affiliation":[{"name":"Columbia University, New York, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-2277-6545","authenticated-orcid":false,"given":"Junfeng","family":"Yang","sequence":"additional","affiliation":[{"name":"Columbia University, New York, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-4046-2022","authenticated-orcid":false,"given":"Asaf","family":"Cidon","sequence":"additional","affiliation":[{"name":"Columbia University, New York, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,3,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.14778\/3297753.3297761"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/170035.170072"},{"key":"e_1_3_2_1_3_1","unstructured":"Rakesh Agrawal Heikki Mannila Ramakrishnan Srikant Hannu Toivonen A Inkeri Verkamo et al. 1996. Fast discovery of association rules. Advances in knowledge discovery and data mining 12 1 (1996) 307--328."},{"key":"e_1_3_2_1_4_1","volume-title":"Proc. 20th int. conf. very large data bases, VLDB","volume":"1215","author":"Agrawal Rakesh","year":"1994","unstructured":"Rakesh Agrawal, Ramakrishnan Srikant, et al. 1994. Fast algorithms for mining association rules. In Proc. 20th int. conf. very large data bases, VLDB, Vol. 1215. Santiago, Chile, 487--499."},{"key":"e_1_3_2_1_5_1","volume-title":"Ekya: Continuous Learning of Video Analytics Models on Edge Compute Servers. In 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22)","author":"Bhardwaj Romil","year":"2022","unstructured":"Romil Bhardwaj, Zhengxu Xia, Ganesh Ananthanarayanan, Junchen Jiang, Yuanchao Shu, Nikolaos Karianakis, Kevin Hsieh, Paramvir Bahl, and Ion Stoica. 2022. Ekya: Continuous Learning of Video Analytics Models on Edge Compute Servers. In 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22). USENIX Association, Renton, WA, 119--135. https:\/\/www.usenix.org\/conference\/nsdi22\/presentation\/bhardwaj"},{"key":"e_1_3_2_1_6_1","volume-title":"Davide Del Testa","author":"Bojarski Mariusz","year":"2016","unstructured":"Mariusz Bojarski, Davide Del Testa, Daniel Dworakowski, Bernhard Firner, Beat Flepp, Prasoon Goyal, Lawrence D. Jackel, Mathew Monfort, Urs Muller, Jiakai Zhang, Xin Zhang, Jake Zhao, and Karol Zieba. 2016. End to End Learning for Self-Driving Cars. CoRR abs\/1604.07316 (2016). arXiv:1604.07316 http:\/\/arxiv.org\/abs\/1604.07316"},{"key":"e_1_3_2_1_7_1","volume-title":"FIMI'03: Proceedings of the IEEE ICDM workshop on frequent itemset mining implementations. Citeseer, 90","author":"Borgelt Christian","year":"2003","unstructured":"Christian Borgelt. 2003. Efficient implementations of apriori and eclat. In FIMI'03: Proceedings of the IEEE ICDM workshop on frequent itemset mining implementations. Citeseer, 90."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133905.1133907"},{"key":"e_1_3_2_1_9_1","volume-title":"Federated learning of out-of-vocabulary words. arXiv preprint arXiv:1903.10635","author":"Chen Mingqing","year":"2019","unstructured":"Mingqing Chen, Rajiv Mathews, Tom Ouyang, and Fran\u00e7oise Beaufays. 2019. Federated learning of out-of-vocabulary words. arXiv preprint arXiv:1903.10635 (2019)."},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of Machine Learning and Systems 3","author":"Cidon Eyal","year":"2021","unstructured":"Eyal Cidon, Evgenya Pergament, Zain Asgar, Asaf Cidon, and Sachin Katti. 2021. Characterizing and Taming Model Instability Across Edge Devices. Proceedings of Machine Learning and Systems 3 (2021)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.350"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1983.10478008"},{"key":"e_1_3_2_1_13_1","volume-title":"Catastrophic forgetting in connectionist networks. Trends in cognitive sciences 3, 4","author":"French Robert M","year":"1999","unstructured":"Robert M French. 1999. Catastrophic forgetting in connectionist networks. Trends in cognitive sciences 3, 4 (1999), 128--135."},{"key":"e_1_3_2_1_14_1","first-page":"19586","article-title":"An efficient framework for clustered federated learning","volume":"33","author":"Ghosh Avishek","year":"2020","unstructured":"Avishek Ghosh, Jichan Chung, Dong Yin, and Kannan Ramchandran. 2020. An efficient framework for clustered federated learning. Advances in Neural Information Processing Systems 33 (2020), 19586--19597.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_15_1","volume-title":"andWenjun Hu","author":"Guo Peizhen","year":"2021","unstructured":"Peizhen Guo, Bo Hu, andWenjun Hu. 2021. Mistify: Automating DNN Model Porting for On-Device Inference at the Edge.. In NSDI. 705--719."},{"key":"e_1_3_2_1_16_1","volume-title":"Mining frequent patterns without candidate generation. ACM sigmod record 29, 2","author":"Han Jiawei","year":"2000","unstructured":"Jiawei Han, Jian Pei, and Yiwen Yin. 2000. Mining frequent patterns without candidate generation. ACM sigmod record 29, 2 (2000), 1--12."},{"key":"e_1_3_2_1_17_1","first-page":"414","article-title":"A Tale of Two Models: Constructing Evasive Attacks on Edge Models","volume":"4","author":"Hao Wei","year":"2022","unstructured":"Wei Hao, Aahil Awatramani, Jiayang Hu, Chengzhi Mao, Pin-Chun Chen, Eyal Cidon, Asaf Cidon, and Junfeng Yang. 2022. A Tale of Two Models: Constructing Evasive Attacks on Edge Models. Proceedings of Machine Learning and Systems 4 (2022), 414--429.","journal-title":"Proceedings of Machine Learning and Systems"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the 41st International Conference on Machine Learning (Proceedings of Machine Learning Research","volume":"17615","author":"Hao Wei","year":"2024","unstructured":"Wei Hao, Daniel Mendoza, Rafael Mendes, Deepak Narayanan, Amar Phanishayee, Asaf Cidon, and Junfeng Yang. 2024. MGit: A Model Versioning and Management System. In Proceedings of the 41st International Conference on Machine Learning (Proceedings of Machine Learning Research, Vol. 235), Ruslan Salakhutdinov, Zico Kolter, Katherine Heller, Adrian Weller, Nuria Oliver, Jonathan Scarlett, and Felix Berkenkamp (Eds.). PMLR, 17597--17615. https:\/\/proceedings.mlr.press\/v235\/hao24c.html"},{"key":"e_1_3_2_1_19_1","volume-title":"FedML: A Research Library and Benchmark for Federated Machine Learning. Advances in Neural Information Processing Systems","author":"He Chaoyang","year":"2020","unstructured":"Chaoyang He, Songze Li, Jinhyun So, Mi Zhang, Hongyi Wang, Xiaoyang Wang, Praneeth Vepakomma, Abhishek Singh, Hang Qiu, Li Shen, Peilin Zhao, Yan Kang, Yang Liu, Ramesh Raskar, Qiang Yang, Murali Annavaram, and Salman Avestimehr. 2020. FedML: A Research Library and Benchmark for Federated Machine Learning. Advances in Neural Information Processing Systems (2020)."},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the International Conference on Learning Representations","author":"Hendrycks Dan","year":"2019","unstructured":"Dan Hendrycks and Thomas Dietterich. 2019. Benchmarking Neural Network Robustness to Common Corruptions and Perturbations. Proceedings of the International Conference on Learning Representations (2019)."},{"key":"e_1_3_2_1_21_1","volume-title":"International Conference on Learning Representations.","author":"Hendrycks Dan","year":"2017","unstructured":"Dan Hendrycks and Kevin Gimpel. 2017. A Baseline for Detecting Misclassified and Out-of-Distribution Examples in Neural Networks. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the International Conference on Learning Representations","author":"Hendrycks Dan","year":"2019","unstructured":"Dan Hendrycks, Mantas Mazeika, and Thomas Dietterich. 2019. Deep Anomaly Detection with Outlier Exposure. Proceedings of the International Conference on Learning Representations (2019)."},{"key":"e_1_3_2_1_23_1","volume-title":"Using self-supervised learning can improve model robustness and uncertainty. Advances in neural information processing systems 32","author":"Hendrycks Dan","year":"2019","unstructured":"Dan Hendrycks, Mantas Mazeika, Saurav Kadavath, and Dawn Song. 2019. Using self-supervised learning can improve model robustness and uncertainty. Advances in neural information processing systems 32 (2019)."},{"key":"e_1_3_2_1_24_1","volume-title":"Yang Song, Yin Cui, Chen Sun, Alex Shepard, Hartwig Adam, Pietro Perona, and Serge Belongie.","author":"Horn Grant Van","year":"2018","unstructured":"Grant Van Horn, Oisin Mac Aodha, Yang Song, Yin Cui, Chen Sun, Alex Shepard, Hartwig Adam, Pietro Perona, and Serge Belongie. 2018. The iNaturalist Species Classification and Detection Dataset. In CVPR. https:\/\/arxiv.org\/abs\/1707.06642"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01096"},{"key":"e_1_3_2_1_26_1","unstructured":"iNaturalist. 2023. iNaturalist. https:\/\/www.inaturalist.org\/."},{"key":"e_1_3_2_1_27_1","volume-title":"International conference on machine learning. pmlr, 448--456","author":"Ioffe Sergey","year":"2015","unstructured":"Sergey Ioffe and Christian Szegedy. 2015. Batch normalization: Accelerating deep network training by reducing internal covariate shift. In International conference on machine learning. pmlr, 448--456."},{"volume-title":"Accessed","year":"2020","key":"e_1_3_2_1_28_1","unstructured":"kaggle,2020 2020. Historical Daily Weather Data 2020. https:\/\/www.kaggle.com\/datasets\/vishalvjoseph\/weather-datasetfor-covid19-predictions. Accessed: Apr 12, 2021."},{"key":"e_1_3_2_1_29_1","volume-title":"International Conference on Machine Learning. PMLR, 11814--11827","author":"Lai Fan","year":"2022","unstructured":"Fan Lai, Yinwei Dai, Sanjay Singapuram, Jiachen Liu, Xiangfeng Zhu, Harsha Madhyastha, and Mosharaf Chowdhury. 2022. Fedscale: Benchmarking model and system performance of federated learning at scale. In International Conference on Machine Learning. PMLR, 11814--11827."},{"key":"e_1_3_2_1_30_1","volume-title":"15th USENIX Symposium on Operating Systems Design and Implementation (OSDI 21)","author":"Lai Fan","year":"2021","unstructured":"Fan Lai, Xiangfeng Zhu, Harsha V. Madhyastha, and Mosharaf Chowdhury. 2021. Oort: Efficient Federated Learning via Guided Participant Selection. In 15th USENIX Symposium on Operating Systems Design and Implementation (OSDI 21). USENIX Association, 19--35. https:\/\/www.usenix.org\/conference\/osdi21\/presentation\/lai"},{"key":"e_1_3_2_1_31_1","volume-title":"A simple unified framework for detecting out-of-distribution samples and adversarial attacks. Advances in neural information processing systems 31","author":"Lee Kimin","year":"2018","unstructured":"Kimin Lee, Kibok Lee, Honglak Lee, and Jinwoo Shin. 2018. A simple unified framework for detecting out-of-distribution samples and adversarial attacks. Advances in neural information processing systems 31 (2018)."},{"key":"e_1_3_2_1_32_1","unstructured":"David Lewis. 2013. Counterfactuals. John Wiley & Sons."},{"key":"e_1_3_2_1_33_1","volume-title":"Single Image Deraining: A Comprehensive Benchmark Analysis. IEEE Conference on Computer Vision and Pattern Recognition","author":"Li Siyuan","year":"2019","unstructured":"Siyuan Li, Iago Breno Araujo, Wenqi Ren, Zhangyang Wang, Eric K. Tokuda, Roberto Hirata Junior, Roberto Cesar-Junior, Jiawan Zhang, Xiaojie Guo, and Xiaochun Cao. 2019. Single Image Deraining: A Comprehensive Benchmark Analysis. IEEE Conference on Computer Vision and Pattern Recognition (2019)."},{"key":"e_1_3_2_1_34_1","volume-title":"Learning without forgetting","author":"Li Zhizhong","year":"2017","unstructured":"Zhizhong Li and Derek Hoiem. 2017. Learning without forgetting. IEEE transactions on pattern analysis and machine intelligence 40, 12 (2017), 2935--2947."},{"key":"e_1_3_2_1_35_1","unstructured":"Shiyu Liang Yixuan Li and R. Srikant. 2018. Enhancing The Reliability of Out-of-distribution Image Detection in Neural Networks. In 6th International Conference on Learning Representations ICLR 2018 Vancouver BC Canada April 30 - May 3 2018 Conference Track Proceedings. OpenReview.net. https:\/\/openreview.net\/forum?id=H1VGkIxRZ"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318464.3386126"},{"key":"e_1_3_2_1_37_1","volume-title":"Energybased out-of-distribution detection. Advances in neural information processing systems 33","author":"Liu Weitang","year":"2020","unstructured":"Weitang Liu, XiaoyunWang, John Owens, and Yixuan Li. 2020. Energybased out-of-distribution detection. Advances in neural information processing systems 33 (2020), 21464--21475."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2019.03.010"},{"volume-title":"Psychology of learning and motivation.","author":"McCloskey Michael","key":"e_1_3_2_1_39_1","unstructured":"Michael McCloskey and Neal J Cohen. 1989. Catastrophic interference in connectionist networks: The sequential learning problem. In Psychology of learning and motivation. Vol. 24. Elsevier, 109--165."},{"key":"e_1_3_2_1_40_1","volume-title":"TFX: A TensorFlow-Based Production-Scale Machine Learning Platform. In KDD","author":"Modi Akshay Naresh","year":"2017","unstructured":"Akshay Naresh Modi, Chiu Yuen Koo, Chuan Yu Foo, Clemens Mewald, Denis M. Baylor, Eric Breck, Heng-Tze Cheng, Jarek Wilkiewicz, Levent Koc, Lukasz Lew, Martin A. Zinkevich, Martin Wicke, Mustafa Ispir, Neoklis Polyzotis, Noah Fiedel, Salem Elie Haykal, Steven Whang, Sudip Roy, Sukriti Ramesh, Vihan Jain, Xin Zhang, and Zakaria Haque. 2017. TFX: A TensorFlow-Based Production-Scale Machine Learning Platform. In KDD 2017."},{"key":"e_1_3_2_1_41_1","unstructured":"NannyML 2023. NannyML (release 0.9.1). https:\/\/github.com\/NannyML\/nannyml. NannyML Belgium OHL.."},{"key":"e_1_3_2_1_42_1","volume-title":"Christopher Kanan, and Stefan Wermter.","author":"Parisi German I","year":"2019","unstructured":"German I Parisi, Ronald Kemker, Jose L Part, Christopher Kanan, and Stefan Wermter. 2019. Continual lifelong learning with neural networks: A review. Neural networks 113 (2019), 54--71."},{"key":"e_1_3_2_1_43_1","unstructured":"Matthias Paulik Matt Seigel Henry Mason Dominic Telaar Joris Kluivers Rogier van Dalen ChiWai Lau Luke Carlson Filip Granqvist Chris Vandevelde et al. 2021. Federated evaluation and tuning for ondevice personalization: System design & applications. arXiv preprint arXiv:2102.08503 (2021)."},{"key":"e_1_3_2_1_44_1","volume-title":"ACM SIGMOD workshop on research issues in data mining and knowledge discovery","volume":"4","author":"Pei Jian","year":"2000","unstructured":"Jian Pei, Jiawei Han, Runying Mao, et al. 2000. CLOSET: An efficient algorithm for mining frequent closed itemsets.. In ACM SIGMOD workshop on research issues in data mining and knowledge discovery, Vol. 4. 21--30."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2001.914830"},{"volume-title":"PyTorch Android Examples. https:\/\/github.com\/pytorch\/android-demo-app. Accessed","year":"2023","key":"e_1_3_2_1_46_1","unstructured":"PyTorch. 2023. PyTorch Android Examples. https:\/\/github.com\/pytorch\/android-demo-app. Accessed: May 3, 2023."},{"key":"e_1_3_2_1_47_1","first-page":"337","article-title":"ML-EXray: Visibility into ML deployment on the edge","volume":"4","author":"Qiu Hang","year":"2022","unstructured":"Hang Qiu, Ioanna Vavelidou, Jian Li, Evgenya Pergament, PeteWarden, Sandeep Chinchali, Zain Asgar, and Sachin Katti. 2022. ML-EXray: Visibility into ML deployment on the edge. Proceedings of Machine Learning and Systems 4 (2022), 337--351.","journal-title":"Proceedings of Machine Learning and Systems"},{"key":"e_1_3_2_1_48_1","volume-title":"Failing loudly: An empirical study of methods for detecting dataset shift. Advances in Neural Information Processing Systems 32","author":"Rabanser Stephan","year":"2019","unstructured":"Stephan Rabanser, Stephan G\u00fcnnemann, and Zachary Lipton. 2019. Failing loudly: An empirical study of methods for detecting dataset shift. Advances in Neural Information Processing Systems 32 (2019)."},{"key":"e_1_3_2_1_49_1","volume-title":"Federated learning for emoji prediction in a mobile keyboard. arXiv preprint arXiv:1906.04329","author":"Ramaswamy Swaroop","year":"2019","unstructured":"Swaroop Ramaswamy, Rajiv Mathews, Kanishka Rao, and Fran\u00e7oise Beaufays. 2019. Federated learning for emoji prediction in a mobile keyboard. arXiv preprint arXiv:1906.04329 (2019)."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.587"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772862"},{"key":"e_1_3_2_1_53_1","volume-title":"Moving Fast With Broken Data. arXiv preprint arXiv:2303.06094","author":"Shankar Shreya","year":"2023","unstructured":"Shreya Shankar, Labib Fawaz, Karl Gyllstrom, and Aditya G Parameswaran. 2023. Moving Fast With Broken Data. arXiv preprint arXiv:2303.06094 (2023)."},{"volume-title":"Operationalizing Machine Learning: An Interview Study. In The 27th ACM Conference on Computer-Supported Cooperative Work and Social Computing.","author":"Shankar Shreya","key":"e_1_3_2_1_54_1","unstructured":"Shreya Shankar, Rolando Garcia, Joseph M. Hellerstein, and Aditya G. Parameswaran. 2024. Operationalizing Machine Learning: An Interview Study. In The 27th ACM Conference on Computer-Supported Cooperative Work and Social Computing."},{"key":"e_1_3_2_1_55_1","volume-title":"Rethinking Streaming Machine Learning Evaluation. ICLR","author":"Shankar Shreya","year":"2022","unstructured":"Shreya Shankar, Bernease Herman, and Aditya Parameswaran. 2022. Rethinking Streaming Machine Learning Evaluation. ICLR (2022)."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.14778\/3565838.3565853"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.368"},{"key":"e_1_3_2_1_58_1","volume-title":"Csi: Novelty detection via contrastive learning on distributionally shifted instances. Advances in neural information processing systems 33","author":"Tack Jihoon","year":"2020","unstructured":"Jihoon Tack, Sangwoo Mo, Jongheon Jeong, and Jinwoo Shin. 2020. Csi: Novelty detection via contrastive learning on distributionally shifted instances. Advances in neural information processing systems 33 (2020), 11839--11852."},{"key":"e_1_3_2_1_59_1","unstructured":"TensorFlow. 2023. TensorFlow Lite. https:\/\/www.tensorflow.org\/lite."},{"key":"e_1_3_2_1_60_1","first-page":"2023","article-title":"Weather Underground. https:\/\/www.wunderground.com\/. Accessed","volume":"8","author":"Underground Weather","year":"2023","unstructured":"Weather Underground. 2023. Weather Underground. https:\/\/www.wunderground.com\/. Accessed: Mar 8, 2023.","journal-title":"Mar"},{"key":"e_1_3_2_1_61_1","volume-title":"Alibi Detect: Algorithms for outlier, adversarial and drift detection. https:\/\/github.com\/SeldonIO\/alibi-detect","author":"Looveren Arnaud Van","year":"2019","unstructured":"Arnaud Van Looveren, Janis Klaise, Giovanni Vacanti, Oliver Cobb, Ashley Scillitoe, and Robert Samoilescu. 2019. Alibi Detect: Algorithms for outlier, adversarial and drift detection. https:\/\/github.com\/SeldonIO\/alibi-detect"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3056101"},{"key":"e_1_3_2_1_63_1","volume-title":"International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=uXl3bZLkr3c","author":"Wang Dequan","year":"2021","unstructured":"Dequan Wang, Evan Shelhamer, Shaoteng Liu, Bruno Olshausen, and Trevor Darrell. 2021. Tent: Fully Test-Time Adaptation by Entropy Minimization. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=uXl3bZLkr3c"},{"key":"e_1_3_2_1_64_1","first-page":"21","article-title":"Flint: A platform for federated learning integration","volume":"5","author":"Wang Ewen","year":"2023","unstructured":"Ewen Wang, Boyi Chen, Mosharaf Chowdhury, Ajay Kannan, and Franco Liang. 2023. Flint: A platform for federated learning integration. Proceedings of Machine Learning and Systems 5 (2023), 21--34.","journal-title":"Proceedings of Machine Learning and Systems"},{"key":"e_1_3_2_1_65_1","volume-title":"Learning in the presence of concept drift and hidden contexts. Machine learning 23","author":"Widmer Gerhard","year":"1996","unstructured":"Gerhard Widmer and Miroslav Kubat. 1996. Learning in the presence of concept drift and hidden contexts. Machine learning 23 (1996), 69--101."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2019.00048"},{"key":"e_1_3_2_1_67_1","volume-title":"Feature Transfer Learning for Face Recognition With Under-Represented Data. 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","author":"Yin Xi","year":"2019","unstructured":"Xi Yin, Xiang Yu, Kihyuk Sohn, Xiaoming Liu, and Manmohan Chandraker. 2019. Feature Transfer Learning for Face Recognition With Under-Represented Data. 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2019), 5697--5706. https:\/\/api.semanticscholar.org\/CorpusID:102490877"},{"key":"e_1_3_2_1_68_1","volume-title":"Memo: Test time robustness via adaptation and augmentation. Advances in neural information processing systems 35","author":"Zhang Marvin","year":"2022","unstructured":"Marvin Zhang, Sergey Levine, and Chelsea Finn. 2022. Memo: Test time robustness via adaptation and augmentation. Advances in neural information processing systems 35 (2022), 38629--38642."}],"event":{"name":"ASPLOS '25: 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture"],"location":"Rotterdam Netherlands","acronym":"ASPLOS '25"},"container-title":["Proceedings of the 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3669940.3707246","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3669940.3707246","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T14:51:00Z","timestamp":1755787860000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3669940.3707246"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,30]]},"references-count":68,"alternative-id":["10.1145\/3669940.3707246","10.1145\/3669940"],"URL":"https:\/\/doi.org\/10.1145\/3669940.3707246","relation":{},"subject":[],"published":{"date-parts":[[2025,3,30]]},"assertion":[{"value":"2025-03-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}