skip to main content
10.1145/3438872.3439072acmotherconferencesArticle/Chapter ViewAbstractPublication PagesricaiConference Proceedingsconference-collections
research-article

Reliability Evaluation Methods of Deep Learning Algorithm in Computer Vision

Authors Info & Claims
Published:25 December 2020Publication History

ABSTRACT

With the rapid development of deep learning technology, the application based on deep learning shows explosive growth, especially in the field of computer vision. However, some characteristics of the deep learning algorithm make it face many unexpected threats in actual use. It has become an urgent problem to ensure the reliability of the algorithm. In this paper, we propose a deep learning algorithm reliability evaluation system and corresponding evaluation indicators from the three aspects of data, model, and operating framework, then describe reliability evaluation methods for each specific indicator.

References

  1. F. Schroff, D. Kalenichenko, J. Philbin. 2018. FaceNet: A unified embedding for face recognition and clustering. In Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR 2015), 815--823.Google ScholarGoogle Scholar
  2. W. Zhu, Y. S. Vang, Y. Huang, and X. Xie. 2018. Deepem: Deep 3d convnets with em for weakly supervised pulmonary nodule detection. In International Conference on Medical Image Computing and Computer-Assisted Intervention, 812--820.Google ScholarGoogle Scholar
  3. P. Li, X. Chen, and S. Shen, 2019. Stereo r-cnn based 3d object detection for autonomous driving. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2019), 7644--7652.Google ScholarGoogle Scholar
  4. M. L. Iuzzolino, M. E. Walker, and D. Szafir, 2018. Virtual-to-Real-World Transfer Learning for Robots on Wilderness Trails. In 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2018), 576--582.Google ScholarGoogle Scholar
  5. Y. He, G. Meng, K. Chen, X. Hu, and J. He. 2019. Towards privacy and security of deep learning systems: a survey. arXiv preprint arXiv:1911.12562.Google ScholarGoogle Scholar
  6. Y. LeCun, Y. Bengio, and G. Hinton. 2015. Deep learning. nature, 521(7553), 436--444.Google ScholarGoogle Scholar
  7. P. Santhanam, E. Farchi, and V. Pankratius. 2019. Engineering Reliable Deep Learning Systems. arXiv preprint arXiv:1910.12582.Google ScholarGoogle Scholar
  8. F. F. Li, R. Krishna, and D. F. Xu, http://cs231n.stanford.edu/slides/2020/lecture_13.pdfGoogle ScholarGoogle Scholar
  9. I. J. Goodfellow, J. Shlens, and C. Szegedy. 2015. Explaining and harnessing adversarial examples. international conference on learning representations (ICLR 2015). arXiv preprint arXiv:1412.6572, 1.Google ScholarGoogle Scholar
  10. S. M. Moosavi-Dezfooli, A. Fawzi, and P. Frossard. 2016. Deepfool: a simple and accurate method to fool deep neural networks. In Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR 2016), 2574--2582.Google ScholarGoogle Scholar
  11. N. Carlini and D. Wagner. 2017. Towards evaluating the robustness of neural networks. In 2017 ieee symposium on security and privacy (sp), 39--57.Google ScholarGoogle Scholar
  12. A. Madry, A. Makelov, L. Schmidt, D. Tsipras, and A. Vladu. 2018. Towards Deep Learning Models Resistant to Adversarial Attacks. international conference on learning representations (ICLR 2018).Google ScholarGoogle Scholar
  13. P. Molchanov, S. Tyree, T. Karras, T. Aila, and J. Kautz. 2017. Pruning Convolutional Neural Networks for Resource Efficient Inference. international conference on learning representations (ICLR 2017).Google ScholarGoogle Scholar
  14. M. Lecuyer, V. Atlidakis, R Geambasu, D. Hsu, and S. Jana. 2019. Certified robustness to adversarial examples with differential privacy. In 2019 IEEE Symposium on Security and Privacy (SP), 656--672.Google ScholarGoogle Scholar

Index Terms

  1. Reliability Evaluation Methods of Deep Learning Algorithm in Computer Vision

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          RICAI '20: Proceedings of the 2020 2nd International Conference on Robotics, Intelligent Control and Artificial Intelligence
          October 2020
          470 pages
          ISBN:9781450388306
          DOI:10.1145/3438872

          Copyright © 2020 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 25 December 2020

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

          Acceptance Rates

          Overall Acceptance Rate140of294submissions,48%
        • Article Metrics

          • Downloads (Last 12 months)37
          • Downloads (Last 6 weeks)5

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader