STEALTHY BACKDOOR ATTACK WITH ADVERSARIAL TRAINING

被引:2
|
作者
Feng, Le [1 ]
Li, Sheng [1 ]
Qian, Zhenxing [1 ]
Zhang, Xinpeng [1 ]
机构
[1] Fudan Univ, Sch Comp Sci & Technol, Shanghai, Peoples R China
基金
美国国家科学基金会;
关键词
Backdoor; Invisibility; Example-dependent; Adversarial training;
D O I
10.1109/ICASSP43922.2022.9746008
中图分类号
O42 [声学];
学科分类号
070206 ; 082403 ;
摘要
Research shows that deep neural networks are vulnerable to backdoor attacks. The backdoor network behaves normally on clean examples, but once backdoor patterns are attached to examples, backdoor examples will be classified into the target class. In the previous backdoor attack schemes, backdoor patterns are not stealthy and may be detected. Thus, to achieve the stealthiness of backdoor patterns, we explore an invisible and example-dependent backdoor attack scheme. Specifically, we employ the backdoor generation network to generate the invisible backdoor pattern for each example, and backdoor patterns are not generic to each other. However, without other measures, the backdoor attack scheme cannot bypass the neural cleanse detection. Thus, we propose adversarial training to bypass neural cleanse detection. Experiments show that the proposed backdoor attack achieves a considerable attack success rate, invisibility, and can bypass the existing defense strategies.
引用
收藏
页码:2969 / 2973
页数:5
相关论文
共 50 条
  • [1] SIMTROJAN: STEALTHY BACKDOOR ATTACK
    Ren, Yankun
    Li, Longfei
    Zhou, Jun
    2021 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2021, : 819 - 823
  • [2] Stand-in Backdoor: A Stealthy and Powerful Backdoor Attack
    Li, Shuang
    Li, Hongwei
    Chen, Hanxiao
    2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [3] Stealthy Backdoor Attack for Code Models
    Yang, Zhou
    Xu, Bowen
    Zhang, Jie M.
    Kang, Hong Jin
    Shi, Jieke
    He, Junda
    Lo, David
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2024, 50 (04) : 721 - 741
  • [4] Distributed Swift and Stealthy Backdoor Attack on Federated Learning
    Sundar, Agnideven Palanisamy
    Li, Feng
    Zou, Xukai
    Gao, Tianchong
    2022 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE AND STORAGE (NAS), 2022, : 193 - 200
  • [5] Stealthy Backdoor Attack Based on Singular Value Decomposition
    Wu S.-X.
    Yin Y.-Y.
    Song S.-Q.
    Chen G.-H.
    Sang J.-T.
    Yu J.
    Ruan Jian Xue Bao/Journal of Software, 2024, 35 (05): : 2400 - 2413
  • [6] A stealthy and robust backdoor attack via frequency domain transform
    Hou, Ruitao
    Huang, Teng
    Yan, Hongyang
    Ke, Lishan
    Tang, Weixuan
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2023, 26 (05): : 2767 - 2783
  • [7] A stealthy and robust backdoor attack via frequency domain transform
    Ruitao Hou
    Teng Huang
    Hongyang Yan
    Lishan Ke
    Weixuan Tang
    World Wide Web, 2023, 26 : 2767 - 2783
  • [8] RF Domain Backdoor Attack on Signal Classification Via Stealthy Trigger
    Tang Z.
    Zhao T.
    Zhang T.
    Phan H.
    Wang Y.
    Shi C.
    Yuan B.
    Chen Y.
    IEEE Transactions on Mobile Computing, 2024, 23 (12) : 1 - 16
  • [9] Stealthy dynamic backdoor attack against neural networks for image classification
    Dong, Liang
    Qiu, Jiawei
    Fu, Zhongwang
    Chen, Leiyang
    Cui, Xiaohui
    Shen, Zhidong
    APPLIED SOFT COMPUTING, 2023, 149
  • [10] SGBA: A stealthy scapegoat backdoor attack against deep neural networks
    He, Ying
    Shen, Zhili
    Xia, Chang
    Hua, Jingyu
    Tong, Wei
    Zhong, Sheng
    COMPUTERS & SECURITY, 2024, 136