Backdoor Attacks to Deep Learning Models and Countermeasures: A Survey

被引:1
|
作者
Li, Yudong [1 ]
Zhang, Shigeng [1 ,2 ]
Wang, Weiping [1 ]
Song, Hong [1 ]
机构
[1] Cent South Univ, Sch Comp Sci & Engn, Changsha 410083, Peoples R China
[2] Parallel & Distributed Proc Lab PDL Changsha, Sci & Technol, Changsha 410003, Peoples R China
关键词
Deep learning; Face recognition; Data models; Computational modeling; Training; Perturbation methods; Video on demand; security; backdoor attack;
D O I
10.1109/OJCS.2023.3267221
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Backdoor attacks have severely threatened deep neural network (DNN) models in the past several years. In backdoor attacks, the attackers try to plant hidden backdoors into DNN models, either in the training or inference stage, to mislead the output of the model when the input contains some specified triggers without affecting the prediction of normal inputs not containing the triggers. As a rapidly developing topic, numerous works on designing various backdoor attacks and developing techniques to defend against such attacks have been proposed in recent years. However, a comprehensive and holistic overview of backdoor attacks and countermeasures is still missing. In this paper, we provide a systematic overview of the design of backdoor attacks and the defense strategies to defend against backdoor attacks, covering the latest published works. We review representative backdoor attacks and defense strategies in both the computer vision domain and other domains, discuss their pros and cons, and make comparisons among them. We outline key challenges to be addressed and potential research directions in the future.
引用
收藏
页码:134 / 146
页数:13
相关论文
共 50 条
  • [1] Privacy attacks against deep learning models and their countermeasures
    Shafee, Ahmed
    Awaad, Tasneem A.
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 114
  • [2] Backdoor Attacks Against Transfer Learning With Pre-Trained Deep Learning Models
    Wang, Shuo
    Nepal, Surya
    Rudolph, Carsten
    Grobler, Marthie
    Chen, Shangyu
    Chen, Tianle
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (03) : 1526 - 1539
  • [3] A Survey on Attacks and Their Countermeasures in Deep Learning: Applications in Deep Neural Networks, Federated, Transfer, and Deep Reinforcement Learning
    Ali, Haider
    Chen, Dian
    Harrington, Matthew
    Salazar, Nathaniel
    Al Ameedi, Mohannad
    Khan, Ahmad Faraz
    Butt, Ali R.
    Cho, Jin-Hee
    [J]. IEEE ACCESS, 2023, 11 : 120095 - 120130
  • [4] TrojDRL: Evaluation of Backdoor Attacks on Deep Reinforcement Learning
    Kiourti, Panagiota
    Wardega, Kacper
    Jha, Susmit
    Li, Wenchao
    [J]. PROCEEDINGS OF THE 2020 57TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2020,
  • [5] Toward a Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures
    Qiu, Huming
    Ma, Hua
    Zhang, Zhi
    Abuadbba, Alsharif
    Kang, Wei
    Fu, Anmin
    Gao, Yansong
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 455 - 468
  • [6] Dynamic Backdoor Attacks Against Machine Learning Models
    Salem, Ahmed
    Wen, Rui
    Backes, Michael
    Ma, Shiqing
    Zhang, Yang
    [J]. 2022 IEEE 7TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2022), 2022, : 703 - 718
  • [7] The Devil Is in the GAN: Backdoor Attacks and Defenses in Deep Generative Models
    Rawat, Ambrish
    Levacher, Killian
    Sinn, Mathieu
    [J]. COMPUTER SECURITY - ESORICS 2022, PT III, 2022, 13556 : 776 - 783
  • [8] Backdoor Attacks on Image Classification Models in Deep Neural Networks
    Zhang, Quanxin
    Ma, Wencong
    Wang, Yajie
    Zhang, Yaoyuan
    Shi, Zhiwei
    Li, Yuanzhang
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2022, 31 (02) : 199 - 212
  • [9] Backdoor Attacks on Image Classification Models in Deep Neural Networks
    ZHANG Quanxin
    MA Wencong
    WANG Yajie
    ZHANG Yaoyuan
    SHI Zhiwei
    LI Yuanzhang
    [J]. Chinese Journal of Electronics, 2022, 31 (02) : 199 - 212
  • [10] Deep Neural Backdoor in Semi-Supervised Learning: Threats and Countermeasures
    Yan, Zhicong
    Wu, Jun
    Li, Gaolei
    Li, Shenghong
    Guizani, Mohsen
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 4827 - 4842