Debiasing backdoor attack: A benign application of backdoor attack in eliminating data bias

被引:1
|
作者
Wu, Shangxi [1 ]
He, Qiuyang [1 ]
Zhang, Yi [1 ]
Lu, Dongyuan [2 ]
Sang, Jitao [1 ]
机构
[1] Beijing Jiaotong Univ, Beijing Key Lab Traff Data Anal & Min, Beijing 100091, Peoples R China
[2] Univ Int Business & Econ, Sch Informat Technol & Management, Beijing 100029, Peoples R China
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
Backdoor attack; Debias; Benign application;
D O I
10.1016/j.ins.2023.119171
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Backdoor attack which carries out a threat to model training has received increasing attention in recent years. Reviewing the previous research on adversarial attacks posing risk at the testing stage while at the same time facilitating the understanding of model predictions, we argue that the backdoor attack also has the potential to probe into the model learning process and help improve model performance. We started by attributing the phenomenon of Clean Accuracy Drop (CAD) in backdoor attack as the result of pseudo-deletion to the training data. Then an explanation from the perspective of model classification boundary is provided to explain this phenomenon that backdoor attack has advantages over undersampling in the data debiasing problem. Based on the above findings, we proposed Debiasing Backdoor Attack (DBA), employing backdoor attacks to address the data bias problem. Experiments demonstrate the effectiveness of backdoor attacks in debiasing tasks, with the envisioning of a broader range of benign application scenarios. Our code for the study can be found at https://github .com /KirinNg /DBA.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Data Poisoning Quantization Backdoor Attack
    Tran Huynh
    Anh Tran
    Khoa D Doan
    Tung Pham
    COMPUTER VISION - ECCV 2024, PT LXXXIV, 2025, 15142 : 38 - 54
  • [2] Stand-in Backdoor: A Stealthy and Powerful Backdoor Attack
    Li, Shuang
    Li, Hongwei
    Chen, Hanxiao
    2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [3] Shadow backdoor attack: Multi-intensity backdoor attack against federated learning
    Ren, Qixian
    Zheng, Yu
    Yang, Chao
    Li, Yue
    Ma, Jianfeng
    COMPUTERS & SECURITY, 2024, 139
  • [4] Transferable Graph Backdoor Attack
    Yang, Shuiqiao
    Doan, Bao Gia
    Montague, Paul
    De Vel, Olivier
    Abraham, Tamas
    Camtepe, Seyit
    Ranasinghe, Damith C.
    Kanhere, Salil S.
    PROCEEDINGS OF 25TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2022, 2022, : 321 - 332
  • [5] Dyn-Backdoor: Backdoor Attack on Dynamic Link Prediction
    Chen, Jinyin
    Xiong, Haiyang
    Zheng, Haibin
    Zhang, Jian
    Liu, Yi
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (01): : 525 - 542
  • [6] SIMTROJAN: STEALTHY BACKDOOR ATTACK
    Ren, Yankun
    Li, Longfei
    Zhou, Jun
    2021 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2021, : 819 - 823
  • [7] STEALTHY BACKDOOR ATTACK WITH ADVERSARIAL TRAINING
    Feng, Le
    Li, Sheng
    Qian, Zhenxing
    Zhang, Xinpeng
    2022 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2022, : 2969 - 2973
  • [8] Survey of Textual Backdoor Attack and Defense
    Zheng M.
    Lin Z.
    Liu Z.
    Fu P.
    Wang W.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (01): : 221 - 242
  • [9] Backdoor Attack With Sparse and Invisible Trigger
    Gao, Yinghua
    Li, Yiming
    Gong, Xueluan
    Li, Zhifeng
    Xia, Shu-Tao
    Wang, Qian
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 6364 - 6376
  • [10] Sniper Backdoor: Single Client Targeted Backdoor Attack in Federated Learning
    Abad, Gorka
    Paguada, Servio
    Ersoy, Oguzhan
    Picek, Stjepan
    Ramirez-Duran, Victor Julio
    Urbieta, Aitor
    2023 IEEE CONFERENCE ON SECURE AND TRUSTWORTHY MACHINE LEARNING, SATML, 2023, : 377 - 391