Backdoor Attack With Sparse and Invisible Trigger

被引:0
|
作者
Gao, Yinghua [1 ]
Li, Yiming [2 ,3 ]
Gong, Xueluan [4 ]
Li, Zhifeng [5 ]
Xia, Shu-Tao [1 ,6 ]
Wang, Qian [7 ]
机构
[1] Tsinghua Univ, Tsinghua Shenzhen Int Grad Sch, Shenzhen 518055, Peoples R China
[2] Zhejiang Univ, State Key Lab Blockchain & Data Secur, Hangzhou 311200, Peoples R China
[3] Nanyang Technol Univ, Coll Comp & Data Sci, Singapore 639798, Singapore
[4] Wuhan Univ, Sch Comp Sci, Wuhan 430072, Peoples R China
[5] Tencent Data Platform, Shenzhen 518057, Peoples R China
[6] Peng Cheng Lab, Res Ctr Artificial Intelligence, Shenzhen 518000, Peoples R China
[7] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
基金
中国国家自然科学基金;
关键词
Backdoor attack; invisibility; sparsity; trustworthy ML; AI security; NEURAL-NETWORKS; DEEP; DEFENSE;
D O I
10.1109/TIFS.2024.3411936
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Deep neural networks (DNNs) are vulnerable to backdoor attacks, where the adversary manipulates a small portion of training data such that the victim model predicts normally on the benign samples but classifies the triggered samples as the target class. The backdoor attack is an emerging yet threatening training-phase threat, leading to serious risks in DNN-based applications. In this paper, we revisit the trigger patterns of existing backdoor attacks. We reveal that they are either visible or not sparse and therefore are not stealthy enough. More importantly, it is not feasible to simply combine existing methods to design an effective sparse and invisible backdoor attack. To address this problem, we formulate the trigger generation as a bi-level optimization problem with sparsity and invisibility constraints and propose an effective method to solve it. The proposed method is dubbed sparse and invisible backdoor attack (SIBA). We conduct extensive experiments on benchmark datasets under different settings, which verify the effectiveness of our attack and its resistance to existing backdoor defenses. The codes for reproducing main experiments are available at https://github.com/YinghuaGao/SIBA.
引用
收藏
页码:6364 / 6376
页数:13
相关论文
共 50 条
  • [1] Invisible Trigger Based Backdoor Attack and Its Evaluation
    Kumagai, Ryo
    Takemoto, Shu
    Nozaki, Yusuke
    Yoshikawa, Masaya
    [J]. 2022 6TH INTERNATIONAL CONFERENCE ON IMAGING, SIGNAL PROCESSING AND COMMUNICATIONS, ICISPC, 2022, : 1 - 5
  • [2] Invisible backdoor attack with attention and steganography
    Chen, Wenmin
    Xu, Xiaowei
    Wang, Xiaodong
    Zhou, Huasong
    Li, Zewen
    Chen, Yangming
    [J]. Computer Vision and Image Understanding, 2024, 249
  • [3] Poison Ink: Robust and Invisible Backdoor Attack
    Zhang, Jie
    Chen, Dongdong
    Huang, Qidong
    Liao, Jing
    Zhang, Weiming
    Feng, Huamin
    Hua, Gang
    Yu, Nenghai
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2022, 31 : 5691 - 5705
  • [4] Invisible Intruders: Label-Consistent Backdoor Attack Using Re-Parameterized Noise Trigger
    Wang, Bo
    Yu, Fei
    Wei, Fei
    Li, Yi
    Wang, Wei
    [J]. IEEE Transactions on Multimedia, 2024, 26 : 10766 - 10778
  • [5] SATBA: An Invisible Backdoor Attack Based on Spatial Attention
    Zhou, Huasong
    Xu, Xiaowei
    Wang, Xiaodong
    Bullock, Leon Bevan
    [J]. 2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 937 - 945
  • [6] Invisible Backdoor Attack with Sample-Specific Triggers
    Li, Yuezun
    Li, Yiming
    Wu, Baoyuan
    Li, Longkang
    He, Ran
    Lyu, Siwei
    [J]. 2021 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2021), 2021, : 16443 - 16452
  • [7] Sparse Backdoor Attack Against Neural Networks
    Zhong, Nan
    Qian, Zhenxing
    Zhang, Xinpeng
    [J]. COMPUTER JOURNAL, 2023, 67 (05): : 1783 - 1793
  • [8] Hidden Killer: Invisible Textual Backdoor Attacks with Syntactic Trigger
    Qi, Fanchao
    Li, Mukai
    Chen, Yangyi
    Zhang, Zhengyan
    Liu, Zhiyuan
    Wang, Yasheng
    Sun, Maosong
    [J]. 59TH ANNUAL MEETING OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS AND THE 11TH INTERNATIONAL JOINT CONFERENCE ON NATURAL LANGUAGE PROCESSING, VOL 1 (ACL-IJCNLP 2021), 2021, : 443 - 453
  • [9] Invisible Encoded Backdoor attack on DNNs using Conditional GAN
    Arshad, Tram
    Qiao, Yuansong
    Lee, Brian
    Ye, Yuhang
    [J]. 2023 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, ICCE, 2023,
  • [10] Rethinking the Trigger-injecting Position in Graph Backdoor Attack
    Xu, Jing
    Abad, Gorka
    Picek, Stjepan
    [J]. 2023 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, IJCNN, 2023,