Please use this identifier to cite or link to this item:
https://scholarbank.nus.edu.sg/handle/10635/176382
Title: | Bypassing Backdoor Detection Algorithms in Deep Learning | Authors: | Tan, Te Juin Lester Shokri Reza |
Issue Date: | 7-Sep-2020 | Citation: | Tan, Te Juin Lester, Shokri Reza (2020-09-07). Bypassing Backdoor Detection Algorithms in Deep Learning. IEEE European Symposium on Security and Privacy (EuroSP). ScholarBank@NUS Repository. | Abstract: | Deep learning models are vulnerable to various adversarial manipulations of their training data, parameters, and input sample. In particular, an adversary can modify the training data and model parameters to embed backdoors into the model, so the model behaves according to the adversary’s objective if the input contains the backdoor features, referred to as the backdoor trigger (e.g., a stamp on an image). The poisoned model’s behavior on clean data, however, remains unchanged. Many detection algorithms are designed to detect backdoors on input samples or model parameters, through the statistical difference between the latent representations of adversarial and clean input samples in the poisoned model. In this paper, we design an adversarial backdoor embedding algorithm that can bypass the existing detection algorithms including the state-of-the-art techniques. We design an adaptive adversarial training algorithm that optimizes the original loss function of the model, and also maximizes the indistinguishability of the hidden representations of poisoned data and clean data. This work calls for designing adversaryaware defense mechanisms for backdoor detection. | Source Title: | IEEE European Symposium on Security and Privacy (EuroSP) | URI: | https://scholarbank.nus.edu.sg/handle/10635/176382 |
Appears in Collections: | Staff Publications Elements |
Show full item record
Files in This Item:
File | Description | Size | Format | Access Settings | Version | |
---|---|---|---|---|---|---|
Shokri-EuroSP2020.pdf | Published version | 466.32 kB | Adobe PDF | OPEN | Published | View/Download |
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.