• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Ji Shouling, Li Jinfeng, Du Tianyu, Li Bo. Survey on Techniques, Applications and Security of Machine Learning Interpretability[J]. Journal of Computer Research and Development, 2019, 56(10): 2071-2096. DOI: 10.7544/issn1000-1239.2019.20190540
Citation: Ji Shouling, Li Jinfeng, Du Tianyu, Li Bo. Survey on Techniques, Applications and Security of Machine Learning Interpretability[J]. Journal of Computer Research and Development, 2019, 56(10): 2071-2096. DOI: 10.7544/issn1000-1239.2019.20190540

Survey on Techniques, Applications and Security of Machine Learning Interpretability

More Information
  • Published Date: September 30, 2019
  • While machine learning has achieved great success in various domains, the lack of interpretability has limited its widespread applications in real-world tasks, especially security-critical tasks. To overcome this crucial weakness, intensive research on improving the interpretability of machine learning models has emerged, and a plethora of interpretation methods have been proposed to help end users understand its inner working mechanism. However, the research on model interpretation is still in its infancy, and there are a large amount of scientific issues to be resolved. Furthermore, different researchers have different perspectives on solving the interpretation problem and give different definitions for interpretability, and the proposed interpretation methods also have different emphasis. Till now, the research community still lacks a comprehensive understanding of interpretability as well as a scientific guide for the research on model interpretation. In this survey, we review the explanatory problems in machine learning, and make a systematic summary and scientific classification of the existing research works. At the same time, we discuss the potential applications of interpretation related technologies, analyze the relationship between interpretability and the security of interpretable machine learning, and discuss the current research challenges and potential future research directions, aiming at providing necessary help for future researchers to facilitate the research and application of model interpretability.
  • Related Articles

    [1]Jia Jinping, Xiao Shihan, Qian Kun, Yang Yanqin, Zhang Zhao. Survey of Risk Perception Technology for Web 3.0 Digital Economic[J]. Journal of Computer Research and Development, 2024, 61(12): 3005-3026. DOI: 10.7544/issn1000-1239.202330298
    [2]Hao Jiakun, Xiang Peng, He Yifei, Gao Jianbo, Guan Zhi, Xie Anming, Chen Zhong. Cross-Domain Data Trading System Based on Decentralized Identity[J]. Journal of Computer Research and Development, 2024, 61(10): 2570-2586. DOI: 10.7544/issn1000-1239.202440456
    [3]Song Shuwei, Ni Xiaoze, Chen Ting. Gas Optimization for Smart Contracts: A Survey[J]. Journal of Computer Research and Development, 2023, 60(2): 311-325. DOI: 10.7544/issn1000-1239.202220887
    [4]Xiang Jie, Yang Zhemin, Zhou Shunfan, Yang Min. A Runtime Information Based Defense Technique for Ethereum Smart Contract[J]. Journal of Computer Research and Development, 2021, 58(4): 834-848. DOI: 10.7544/issn1000-1239.2021.20200135
    [5]Huang Qianyi, Li Zhiyang, Xie Wentao, Zhang Qian. Edge Computing in Smart Homes[J]. Journal of Computer Research and Development, 2020, 57(9): 1800-1809. DOI: 10.7544/issn1000-1239.2020.20200253
    [6]Du Ruizhong, Liu Yan, Tian Junfeng. An Access Control Method Using Smart Contract for Internet of Things[J]. Journal of Computer Research and Development, 2019, 56(10): 2287-2298. DOI: 10.7544/issn1000-1239.2019.20190416
    [7]He Haiwu, Yan An, Chen Zehua. Survey of Smart Contract Technology and Application Based on Blockchain[J]. Journal of Computer Research and Development, 2018, 55(11): 2452-2466. DOI: 10.7544/issn1000-1239.2018.20170658
    [8]Liu Yining, Zhou Yuanjian, Lan Rushi, Tang Chunming. Blockchain-Based Verification Scheme for Deletion Operation in Cloud[J]. Journal of Computer Research and Development, 2018, 55(10): 2199-2207. DOI: 10.7544/issn1000-1239.2018.20180436
    [9]Wang Jice, Li Yilian, Jia Yan, Zhou Wei, Wang Yucheng, Wang He, Zhang Yuqing. Survey of Smart Home Security[J]. Journal of Computer Research and Development, 2018, 55(10): 2111-2124. DOI: 10.7544/issn1000-1239.2018.20180585
    [10]ChenSiyun, LiuTing, ShenChao, SuMan, GaoFeng, XuZhanbo, ShiJiayue, JiaZhanpei. Smart Home Energy Optimization Based on Cognition of Wearable Devices Sensor Data[J]. Journal of Computer Research and Development, 2016, 53(3): 704-715. DOI: 10.7544/issn1000-1239.2016.20150762

Catalog

    Article views (4432) PDF downloads (3188) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return