Projan: A probabilistic trojan attack on deep neural networks

被引:0
|
作者
Saremi, Mehrin [1 ]
Khalooei, Mohammad [2 ]
Rastgoo, Razieh [3 ]
Sabokrou, Mohammad [4 ,5 ]
机构
[1] Semnan University, Farzanegan Campus, Semnan,35131-19111, Iran
[2] Amirkabir University of Technology, Department of Computer Engineering, Tehran, Iran
[3] Faculty of Electrical and Computer Engineering, Semnan University, Semnan,35131-19111, Iran
[4] Institute for Research in Fundamental Sciences, Tehran, Iran
[5] Okinawa Institute of Science and Technology, Okinawa, Japan
关键词
D O I
10.1016/j.knosys.2024.112565
中图分类号
学科分类号
摘要
Deep neural networks have gained popularity due to their outstanding performance across various domains. However, because of their lack of explainability, they are vulnerable to some kinds of threats including the trojan or backdoor attack, in which an adversary can train the model to respond to a crafted peculiar input pattern (also called trigger) according to their will. Several trojan attack and defense methods have been proposed in the literature. Many of the defense methods are based on the assumption that the possibly existing trigger must be able to affect the model's behavior, making it output a certain class label for all inputs. In this work, we propose an alternative attack method that violates this assumption. Instead of a single trigger that works on all inputs, a few triggers are generated that will affect only some of the inputs. At attack time, the adversary will need to try more than one trigger to succeed, which might be possible in some real-world situations. Our experiments on MNIST and CIFAR-10 datasets show that such an attack can be implemented successfully, reaching an attack success rate similar to baseline methods called BadNet and N-to-One. We also tested wide range of defense methods and verified that in general, this kind of backdoor is more difficult for defense algorithms to detect. The code is available at https://github.com/programehr/Projan. © 2024 Elsevier B.V.
引用
收藏
相关论文
共 50 条
  • [31] Multi-Targeted Poisoning Attack in Deep Neural Networks
    Kwon H.
    Cho S.
    IEICE Transactions on Information and Systems, 2022, E105D (11): : 1916 - 1920
  • [32] DeepSearch: A Simple and Effective Blackbox Attack for Deep Neural Networks
    Zhang, Fuyuan
    Chowdhury, Sankalan Pal
    Christakis, Maria
    PROCEEDINGS OF THE 28TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE '20), 2020, : 800 - 812
  • [33] Replay Spoofing Attack Detection Using Deep Neural Networks
    Bakar, Bekir
    Hanilci, Cemal
    2018 26TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2018,
  • [34] Random Neural Networks and Deep Learning for Attack Detection at the Edge
    Brun, Olivier
    Yin, Yonghua
    2019 IEEE INTERNATIONAL CONFERENCE ON FOG COMPUTING (ICFC 2019), 2019, : 11 - 14
  • [35] AdvAttackVis: An Adversarial Attack Visualization System for Deep Neural Networks
    Ding Wei-jie
    Shen Xuchen
    Yuan Ying
    Mao Ting-yun
    Sun Guo-dao
    Chen Li-li
    Chen Bing-ting
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (05) : 383 - 391
  • [36] InferPy: Probabilistic modeling with deep neural networks made easy
    Cozar, Javier
    Cabanas, Rafael
    Salmeron, Antonio
    Masegosa, Andres R.
    NEUROCOMPUTING, 2020, 415 : 408 - 410
  • [37] An investigation on training deep neural networks using probabilistic transcriptions
    Das, Amit
    Hasegawa-Johnson, Mark
    17TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION (INTERSPEECH 2016), VOLS 1-5: UNDERSTANDING SPEECH PROCESSING IN HUMANS AND MACHINES, 2016, : 3858 - 3862
  • [38] Calibration of deep probabilistic models with decoupled bayesian neural networks
    Maronas, Juan
    Paredes, Roberto
    Ramos, Daniel
    NEUROCOMPUTING, 2020, 407 : 194 - 205
  • [39] Enhancing the Performance of SQL Injection Attack Detection through Probabilistic Neural Networks
    Alarfaj, Fawaz Khaled
    Khan, Nayeem Ahmad
    APPLIED SCIENCES-BASEL, 2023, 13 (07):
  • [40] Hardware Trojan Design on Neural Networks
    Clements, Joseph
    Lao, Yingjie
    2019 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2019,