Invisible and Multi-triggers Backdoor Attack Approach on Deep Neural Networks through Frequency Domain

被引:0
|
作者
Sun, Fengxue [1 ]
Pei, Bei [2 ]
Chen, Guangyong [2 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing, Peoples R China
[2] Natl Engn Res Ctr Classified Protect & Safeguard, Shanghai, Peoples R China
基金
中国国家自然科学基金;
关键词
artificial intelligence security; backdoor attack; frequency domain; discrete cosine transform;
D O I
10.1109/ICSIP61881.2024.10671403
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, the security of deep neural networks (DNNs) has become a research hotspot with widespread deployments of machine learning models in our daily life. Backdoor attack is an emerging security threat to DNNs, where the infected model will output malicious targets for the images containing specific triggers. However, most existing backdoor attack approaches have only single trigger, and the triggers are often visible to human eyes. In order to overcome these limitations, in this paper, we propose an invisible and multi-triggers backdoor attack (IMT-BA) approach to simultaneously generate four invisible triggers. Firstly, in our IMT-BA approach, we divide the whole images into four blocks and apply Discrete Cosine Transform (DCT) algorithm to generate four invisible triggers aiming at four targets. Secondly, our IMT-BA approach can be easily deployed in real world without any knowledge of the hyperparameters and architectures of the DNNs models. Finally, we do the experiments with MNIST and CIFAR-10 datasets and the experiment results show our IMT-BA approach can fool both DNNs models and Human Visual System (HVS) with high success rate.
引用
收藏
页码:707 / 711
页数:5
相关论文
共 50 条
  • [41] Active intellectual property protection for deep neural networks through stealthy backdoor and users' identities authentication
    Xue, Mingfu
    Sun, Shichang
    Zhang, Yushu
    Wang, Jian
    Liu, Weiqiang
    APPLIED INTELLIGENCE, 2022, 52 (14) : 16497 - 16511
  • [42] Active intellectual property protection for deep neural networks through stealthy backdoor and users’ identities authentication
    Mingfu Xue
    Shichang Sun
    Yushu Zhang
    Jian Wang
    Weiqiang Liu
    Applied Intelligence, 2022, 52 : 16497 - 16511
  • [43] Cyber Attack of a Power Grid Analysis Using a Deep Neural Networks Approach
    Dogaru, Delia Ioana
    Dumitrache, Ioan
    CONTROL ENGINEERING AND APPLIED INFORMATICS, 2019, 21 (01): : 42 - 50
  • [44] MDTD: A Multi-Domain Trojan Detector for Deep Neural Networks
    Rajabi, Arezoo
    Asokraj, Surudhi
    Jiang, Fengqing
    Niu, Luyao
    Ramasubramanian, Bhaskar
    Ritcey, Jim
    Poovendran, Radha
    arXiv, 2023,
  • [45] MDTD: A Multi-Domain Trojan Detector for Deep Neural Networks
    Rajabi, Arezoo
    Asokraj, Surudhi
    Jiang, Fengqing
    Niu, Luyao
    Ramasubramanian, Bhaskar
    Ritcey, James
    Poovendran, Radha
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 2232 - 2246
  • [46] MDTD: A Multi-Domain Trojan Detector for Deep Neural Networks
    Rajabi, Arezoo
    Niu, Luyao
    Asokraj, Surudhi
    Ramasubramanian, Bhaskar
    Poovendran, Radha
    Jiang, Fengqing
    Ritcey, James
    CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023, : 2232 - 2246
  • [47] A novel approach to cloth classification through deep neural networks
    Li Fengxin
    Li Yueping
    Zhang Xiaofeng
    2017 INTERNATIONAL CONFERENCE ON SECURITY, PATTERN ANALYSIS, AND CYBERNETICS (SPAC), 2017, : 368 - 371
  • [48] Frequency-adaptive multi-scale deep neural networks
    Huang, Jizu
    You, Rukang
    Zhou, Tao
    COMPUTER METHODS IN APPLIED MECHANICS AND ENGINEERING, 2025, 437
  • [49] Howling Noise Cancellation in Time-Frequency Domain by Deep Neural Networks
    Gan, Huaguo
    Luo, Gaoyong
    Luo, Yaqing
    Luo, Wenbin
    PROCEEDINGS OF SIXTH INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICICT 2021), VOL 2, 2022, 236 : 319 - 332
  • [50] Frequency constraint-based adversarial attack on deep neural networks for medical image classification
    Chen, Fang
    Wang, Jian
    Liu, Han
    Kong, Wentao
    Zhao, Zhe
    Ma, Longfei
    Liao, Hongen
    Zhang, Daoqiang
    COMPUTERS IN BIOLOGY AND MEDICINE, 2023, 164