Backdoor Attack of DNN Models Based on Structure Modification Using Steganography

被引:0
|
作者
Wang, Shuaipeng [1 ]
机构
[1] School of Information and Electronics, Beijing Institute of Technology, Beijing, China
关键词
Compilation and indexing terms; Copyright 2024 Elsevier Inc;
D O I
暂无
中图分类号
学科分类号
摘要
Deep neural networks - Malware - Steganography
引用
收藏
页码:877 / 880
相关论文
共 50 条
  • [1] Invisible backdoor attack with attention and steganography
    Chen, Wenmin
    Xu, Xiaowei
    Wang, Xiaodong
    Zhou, Huasong
    Li, Zewen
    Chen, Yangming
    Computer Vision and Image Understanding, 2024, 249
  • [2] Enhanced Coalescence Backdoor Attack Against DNN Based on Pixel Gradient
    Yin, Jianyao
    Chen, Honglong
    Li, Junjian
    Gao, Yudong
    NEURAL PROCESSING LETTERS, 2024, 56 (02)
  • [3] Enhanced Coalescence Backdoor Attack Against DNN Based on Pixel Gradient
    Jianyao Yin
    Honglong Chen
    Junjian Li
    Yudong Gao
    Neural Processing Letters, 56
  • [4] An Improved Optimized Model for Invisible Backdoor Attack Creation Using Steganography
    Alghazzawi, Daniyal M.
    Rabie, Osama Bassam J.
    Bhatia, Surbhi
    Hasan, Syed Hamid
    Computers, Materials and Continua, 2022, 72 (01): : 1173 - 1193
  • [5] An Improved Optimized Model for Invisible Backdoor Attack Creation Using Steganography
    Alghazzawi, Daniyal M.
    Rabie, Osama Bassam J.
    Bhatia, Surbhi
    Hasan, Syed Hamid
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (01): : 1173 - 1193
  • [6] RIBAC: Towards Robust and Imperceptible Backdoor Attack against Compact DNN
    Phan, Huy
    Shi, Cong
    Xie, Yi
    Zhang, Tianfang
    Li, Zhuohang
    Zhao, Tianming
    Liu, Jian
    Wang, Yan
    Chen, Yingying
    Yuan, Bo
    COMPUTER VISION - ECCV 2022, PT IV, 2022, 13664 : 708 - 724
  • [7] A Master Key backdoor for universal impersonation attack against DNN-based face verification
    Guo, Wei
    Tondi, Benedetta
    Barni, Mauro
    PATTERN RECOGNITION LETTERS, 2021, 144 : 61 - 67
  • [8] Backdoor Attack with Imperceptible Input and Latent Modification
    Khoa Doan
    Lao, Yingjie
    Li, Ping
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 34 (NEURIPS 2021), 2021, 34
  • [9] A Master Key backdoor for universal impersonation attack against DNN-based face verification
    Guo, Wei
    Tondi, Benedetta
    Barni, Mauro
    Guo, Wei (wei.guo.cn@outlook.com), 1600, Elsevier B.V. (144): : 61 - 67
  • [10] Stealthy Backdoor Attack for Code Models
    Yang, Zhou
    Xu, Bowen
    Zhang, Jie M.
    Kang, Hong Jin
    Shi, Jieke
    He, Junda
    Lo, David
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2024, 50 (04) : 721 - 741