Please use this identifier to cite or link to this item:
https://scholarbank.nus.edu.sg/handle/10635/176382
DC Field | Value | |
---|---|---|
dc.title | Bypassing Backdoor Detection Algorithms in Deep Learning | |
dc.contributor.author | Tan, Te Juin Lester | |
dc.contributor.author | Shokri Reza | |
dc.date.accessioned | 2020-09-21T01:28:40Z | |
dc.date.available | 2020-09-21T01:28:40Z | |
dc.date.issued | 2020-09-07 | |
dc.identifier.citation | Tan, Te Juin Lester, Shokri Reza (2020-09-07). Bypassing Backdoor Detection Algorithms in Deep Learning. IEEE European Symposium on Security and Privacy (EuroSP). ScholarBank@NUS Repository. | |
dc.identifier.uri | https://scholarbank.nus.edu.sg/handle/10635/176382 | |
dc.description.abstract | Deep learning models are vulnerable to various adversarial manipulations of their training data, parameters, and input sample. In particular, an adversary can modify the training data and model parameters to embed backdoors into the model, so the model behaves according to the adversary’s objective if the input contains the backdoor features, referred to as the backdoor trigger (e.g., a stamp on an image). The poisoned model’s behavior on clean data, however, remains unchanged. Many detection algorithms are designed to detect backdoors on input samples or model parameters, through the statistical difference between the latent representations of adversarial and clean input samples in the poisoned model. In this paper, we design an adversarial backdoor embedding algorithm that can bypass the existing detection algorithms including the state-of-the-art techniques. We design an adaptive adversarial training algorithm that optimizes the original loss function of the model, and also maximizes the indistinguishability of the hidden representations of poisoned data and clean data. This work calls for designing adversaryaware defense mechanisms for backdoor detection. | |
dc.source | Elements | |
dc.type | Conference Paper | |
dc.date.updated | 2020-09-19T11:31:09Z | |
dc.contributor.department | DEPARTMENT OF COMPUTER SCIENCE | |
dc.description.sourcetitle | IEEE European Symposium on Security and Privacy (EuroSP) | |
dc.published.state | Published | |
Appears in Collections: | Staff Publications Elements |
Show simple item record
Files in This Item:
File | Description | Size | Format | Access Settings | Version | |
---|---|---|---|---|---|---|
Shokri-EuroSP2020.pdf | Published version | 466.32 kB | Adobe PDF | OPEN | Published | View/Download |
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.