• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Ji Shouling, Li Jinfeng, Du Tianyu, Li Bo. Survey on Techniques, Applications and Security of Machine Learning Interpretability[J]. Journal of Computer Research and Development, 2019, 56(10): 2071-2096. DOI: 10.7544/issn1000-1239.2019.20190540
Citation: Ji Shouling, Li Jinfeng, Du Tianyu, Li Bo. Survey on Techniques, Applications and Security of Machine Learning Interpretability[J]. Journal of Computer Research and Development, 2019, 56(10): 2071-2096. DOI: 10.7544/issn1000-1239.2019.20190540

Survey on Techniques, Applications and Security of Machine Learning Interpretability

More Information
  • Published Date: September 30, 2019
  • While machine learning has achieved great success in various domains, the lack of interpretability has limited its widespread applications in real-world tasks, especially security-critical tasks. To overcome this crucial weakness, intensive research on improving the interpretability of machine learning models has emerged, and a plethora of interpretation methods have been proposed to help end users understand its inner working mechanism. However, the research on model interpretation is still in its infancy, and there are a large amount of scientific issues to be resolved. Furthermore, different researchers have different perspectives on solving the interpretation problem and give different definitions for interpretability, and the proposed interpretation methods also have different emphasis. Till now, the research community still lacks a comprehensive understanding of interpretability as well as a scientific guide for the research on model interpretation. In this survey, we review the explanatory problems in machine learning, and make a systematic summary and scientific classification of the existing research works. At the same time, we discuss the potential applications of interpretation related technologies, analyze the relationship between interpretability and the security of interpretable machine learning, and discuss the current research challenges and potential future research directions, aiming at providing necessary help for future researchers to facilitate the research and application of model interpretability.
  • Related Articles

    [1]Zhao Xiaolei, Chen Zhaoyun, Shi Yang, Wen Mei, Zhang Chunyuan. Kernel Code Automatic Generation Framework on FT-Matrix[J]. Journal of Computer Research and Development, 2023, 60(6): 1232-1245. DOI: 10.7544/issn1000-1239.202330058
    [2]Ding Wenlong, Wang Chengning, Tong Wei. Energy-Efficient Floating-Point Memristive In-Memory Processing System Based on Self-Selective Mantissa Compaction[J]. Journal of Computer Research and Development, 2022, 59(3): 533-552. DOI: 10.7544/issn1000-1239.20210580
    [3]Wang Di, Shi Song, Wu Tiebin, Liu Liang, Tan Hongbing, Hao Ziyu, Guo Feng, Li Hongliang. A High Performance Accelerator Design for Ultra-Long Point Floating-Point FFT[J]. Journal of Computer Research and Development, 2021, 58(6): 1192-1203. DOI: 10.7544/issn1000-1239.2021.20210069
    [4]Xia Qing, Li Shuai, Hao Aimin, Zhao Qinping. Deep Learning for Digital Geometry Processing and Analysis: A Review[J]. Journal of Computer Research and Development, 2019, 56(1): 155-182. DOI: 10.7544/issn1000-1239.2019.20180709
    [5]Yu Kai, Yin Ming, Zong Xiaojie, Wang Yingguan, Wang Zhi. Compressive Sensing-Based Wireless Array and Collaborative Signal Processing Method[J]. Journal of Computer Research and Development, 2014, 51(1): 180-188.
    [6]Shen Huanghui, Wang Zhensong, Zheng Weimin. An Efficient Memory Access Strategy for Transposition and Block Operation in Image Processing[J]. Journal of Computer Research and Development, 2013, 50(1): 188-196.
    [7]Liu Duo, Dai Yiqi. Construction of Transformation Matrix with a Given Period Modulo N[J]. Journal of Computer Research and Development, 2012, 49(5): 925-931.
    [8]Wang Dong and Chen Shuming. DSCF: Data Streams Clustered Forwarding for Multi-Core DSPs with Memories Shared[J]. Journal of Computer Research and Development, 2008, 45(8): 1446-1553.
    [9]Sun Zhongwei, Feng Dengguo, Wu Chuankun. DWT Domain Blind Watermark Detection Based on Weak Signal Detection Theory[J]. Journal of Computer Research and Development, 2006, 43(11): 1920-1926.
    [10]Chen Shuming, Li Zhentao, Wan Jianghua, Hu Dinglei, Guo Yang, Wang Dong, Hu Xiao, and Sun Shuwei. Research and Development of High Performance YHFT Digital Signal Processor[J]. Journal of Computer Research and Development, 2006, 43(6): 993-1000.

Catalog

    Article views (4429) PDF downloads (3187) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return