Backdoor Attack of DNN Models Based on Structure Modification Using Steganography

被引:0
|
作者
Wang, Shuaipeng [1 ]
机构
[1] School of Information and Electronics, Beijing Institute of Technology, Beijing, China
关键词
Compilation and indexing terms; Copyright 2024 Elsevier Inc;
D O I
暂无
中图分类号
学科分类号
摘要
Deep neural networks - Malware - Steganography
引用
收藏
页码:877 / 880
相关论文
共 50 条
  • [31] Audio steganography using bit modification
    Gopalan, K
    2003 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOL I, PROCEEDINGS, 2003, : 629 - 632
  • [32] Clean-label Backdoor Attack on Machine Learning-based Malware Detection Models and Countermeasures
    Zheng, Wanjia
    Omote, Kazumasa
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 1235 - 1242
  • [33] AT-BOD: An Adversarial Attack on Fool DNN-Based Blackbox Object Detection Models
    Elaalami, Ilham A.
    Olatunji, Sunday O.
    Zagrouba, Rachid M.
    APPLIED SCIENCES-BASEL, 2022, 12 (04):
  • [34] Invisible Encoded Backdoor attack on DNNs using Conditional GAN
    Arshad, Tram
    Qiao, Yuansong
    Lee, Brian
    Ye, Yuhang
    2023 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, ICCE, 2023,
  • [35] Federated Learning Backdoor Attack Based on Frequency Domain Injection
    Liu, Jiawang
    Peng, Changgen
    Tan, Weijie
    Shi, Chenghui
    ENTROPY, 2024, 26 (02)
  • [36] Survey of Backdoor Attack and Defense Algorithms Based on Federated Learning
    Liu, Jialang
    Guo, Yanming
    Lao, Mingrui
    Yu, Tianyuan
    Wu, Yulun
    Feng, Yunhao
    Wu, Jiazhuang
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (10): : 2607 - 2626
  • [37] Secret data modification based image steganography technique using genetic algorithm having a flexible chromosome structure
    Shah, Pratik D.
    Bichkar, Rajankumar S.
    ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH, 2021, 24 (03): : 782 - 794
  • [38] Backdoor Attack on Machine Learning Based Android Malware Detectors
    Li, Chaoran
    Chen, Xiao
    Wang, Derui
    Wen, Sheng
    Ahmed, Muhammad Ejaz
    Camtepe, Seyit
    Xiang, Yang
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) : 3357 - 3370
  • [39] Replay Attack Detection using DNN for Channel Discrimination
    Nagarsheth, Parav
    Khoury, Elie
    Patil, Kailash
    Garland, Matt
    18TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION (INTERSPEECH 2017), VOLS 1-6: SITUATED INTERACTION, 2017, : 97 - 101
  • [40] Backdoor Attack Against One-Class Sequential Anomaly Detection Models
    Cheng, He
    Yuan, Shuhan
    ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PT III, PAKDD 2024, 2024, 14647 : 262 - 274