Backdoor Attack of DNN Models Based on Structure Modification Using Steganography

被引:0
|
作者
Wang, Shuaipeng [1 ]
机构
[1] School of Information and Electronics, Beijing Institute of Technology, Beijing, China
关键词
Compilation and indexing terms; Copyright 2024 Elsevier Inc;
D O I
暂无
中图分类号
学科分类号
摘要
Deep neural networks - Malware - Steganography
引用
收藏
页码:877 / 880
相关论文
共 50 条
  • [21] Escape method of malicious traffic based on backdoor attack
    Ma B.
    Guo Y.
    Ma J.
    Zhang Q.
    Fang C.
    Tongxin Xuebao/Journal on Communications, 2024, 45 (04): : 73 - 83
  • [22] SATBA: An Invisible Backdoor Attack Based on Spatial Attention
    Zhou, Huasong
    Xu, Xiaowei
    Wang, Xiaodong
    Bullock, Leon Bevan
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 937 - 945
  • [23] Invisible Trigger Based Backdoor Attack and Its Evaluation
    Kumagai, Ryo
    Takemoto, Shu
    Nozaki, Yusuke
    Yoshikawa, Masaya
    2022 6TH INTERNATIONAL CONFERENCE ON IMAGING, SIGNAL PROCESSING AND COMMUNICATIONS, ICISPC, 2022, : 1 - 5
  • [24] Pixdoor: A Pixel-space Backdoor Attack on Deep Learning Models
    Arshad, Tram
    Asghar, Mamoona Naveed
    Qiao, Yuansong
    Lee, Brian
    Ye, Yuhang
    29TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO 2021), 2021, : 681 - 685
  • [25] BAGM: A Backdoor Attack for Manipulating Text-to-Image Generative Models
    Vice, Jordan
    Akhtar, Naveed
    Hartley, Richard
    Mian, Ajmal
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 4865 - 4880
  • [26] DriNet: Dynamic Backdoor Attack against Automatic Speech Recognization Models
    Ye, Jianbin
    Liu, Xiaoyuan
    You, Zheng
    Li, Guowei
    Liu, Bo
    APPLIED SCIENCES-BASEL, 2022, 12 (12):
  • [27] DeepSweep: An Evaluation Framework for Mitigating DNN Backdoor Attacks using Data Augmentation
    Qiu, Han
    Zeng, Yi
    Guo, Shangwei
    Zhang, Tianwei
    Qiu, Meikang
    Thuraisingham, Bhavani
    ASIA CCS'21: PROCEEDINGS OF THE 2021 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 363 - 377
  • [28] Deepfake attack prevention using steganography GANs
    Noreen, Iram
    Muneer, Muhammad Shahid
    Gillani, Saira
    PEERJ COMPUTER SCIENCE, 2022, 8
  • [29] Hermes Attack: Steal DNN Models with Lossless Inference Accuracy
    Zhu, Yuankun
    Cheng, Yueqiang
    Zhou, Husheng
    Lu, Yantao
    PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 1973 - 1988
  • [30] Audio steganography using bit modification
    Gopalan, K
    2003 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL II, PROCEEDINGS: SPEECH II; INDUSTRY TECHNOLOGY TRACKS; DESIGN & IMPLEMENTATION OF SIGNAL PROCESSING SYSTEMS; NEURAL NETWORKS FOR SIGNAL PROCESSING, 2003, : 421 - 424