Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring

被引:0
|
作者
Adi, Yossi [1 ]
Baum, Carsten [1 ]
Cisse, Moustapha [2 ,3 ]
Pinkas, Benny [1 ]
Keshet, Joseph [1 ]
机构
[1] Bar Ilan Univ, Ramat Gan, Israel
[2] Google Inc, Mountain View, CA USA
[3] Facebook AI Res, Mountain View, CA USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deep Neural Networks have recently gained lots of success after enabling several breakthroughs in notoriously challenging problems. Training these networks is computationally expensive and requires vast amounts of training data. Selling such pre-trained models can, therefore, be a lucrative business model. Unfortunately, once the models are sold they can be easily copied and redistributed. To avoid this, a tracking mechanism to identify models as the intellectual property of a particular vendor is necessary. In this work, we present an approach for watermarking Deep Neural Networks in a black-box way. Our scheme works for general classification tasks and can easily be combined with current learning algorithms. We show experimentally that such a watermark has no noticeable impact on the primary task that the model is designed for and evaluate the robustness of our proposal against a multitude of practical attacks. Moreover, we provide a theoretical analysis, relating our approach to previous work on backdooring.
引用
收藏
页码:1615 / 1631
页数:17
相关论文
共 50 条
  • [1] BadNets: Evaluating Backdooring Attacks on Deep Neural Networks
    Gu, Tianyu
    Liu, Kang
    Dolan-Gavitt, Brendan
    Garg, Siddharth
    [J]. IEEE ACCESS, 2019, 7 : 47230 - 47244
  • [2] A multitarget backdooring attack on deep neural networks with random location trigger
    Xiao, Yu
    Cong, Liu
    Mingwen, Zheng
    Yajie, Wang
    Xinrui, Liu
    Shuxiao, Song
    Yuexuan, Ma
    Jun, Zheng
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (03) : 2567 - 2583
  • [3] Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks
    Liu, Kang
    Dolan-Gavitt, Brendan
    Garg, Siddharth
    [J]. RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, RAID 2018, 2018, 11050 : 273 - 294
  • [4] Digital watermarking for deep neural networks
    Nagai, Yuki
    Uchida, Yusuke
    Sakazawa, Shigeyuki
    Satoh, Shin'ichi
    [J]. INTERNATIONAL JOURNAL OF MULTIMEDIA INFORMATION RETRIEVAL, 2018, 7 (01) : 3 - 16
  • [5] Digital watermarking for deep neural networks
    Yuki Nagai
    Yusuke Uchida
    Shigeyuki Sakazawa
    Shin’ichi Satoh
    [J]. International Journal of Multimedia Information Retrieval, 2018, 7 : 3 - 16
  • [6] Watermarking Deep Neural Networks for Embedded Systems
    Guo, Jia
    Potkonjak, Miodrag
    [J]. 2018 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD) DIGEST OF TECHNICAL PAPERS, 2018,
  • [7] Watermarking Deep Neural Networks with Greedy Residuals
    Liu, Hanwen
    Weng, Zhenyu
    Zhu, Yuesheng
    [J]. INTERNATIONAL CONFERENCE ON MACHINE LEARNING, VOL 139, 2021, 139
  • [8] Watermarking Deep Neural Networks in Image Processing
    Quan, Yuhui
    Teng, Huan
    Chen, Yixin
    Ji, Hui
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2021, 32 (05) : 1852 - 1865
  • [9] Speech watermarking using Deep Neural Networks
    Pavlovic, Kosta
    Kovacevic, Slavko
    Durovic, Igor
    [J]. 2020 28TH TELECOMMUNICATIONS FORUM (TELFOR), 2020, : 292 - 295
  • [10] ADVERSARIAL WATERMARKING TO ATTACK DEEP NEURAL NETWORKS
    Wang, Gengxing
    Chen, Xinyuan
    Xu, Chang
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2019, : 1962 - 1966