Strategic safeguarding: A game theoretic approach for analyzing attacker-defender behavior in DNN backdoors DOI Creative Commons
Kassem Kallas, Quentin Le Roux, Wassim Hamidouche

et al.

EURASIP Journal on Information Security, Journal Year: 2024, Volume and Issue: 2024(1)

Published: Oct. 15, 2024

Deep neural networks (DNNs) are fundamental to modern applications like face recognition and autonomous driving. However, their security is a significant concern due various integrity risks, such as backdoor attacks. In these attacks, compromised training data introduce malicious behaviors into the DNN, which can be exploited during inference or deployment. This paper presents novel game-theoretic approach model interactions between an attacker defender in context of DNN attack. The contribution this multifaceted. First, it models interaction using framework. Second, designs utility function that captures objectives both parties, integrating clean accuracy attack success rate. Third, reduces game two-player zero-sum game, allowing for identification Nash equilibrium points through linear programming thorough analysis strategies. Additionally, framework provides varying levels flexibility regarding control afforded each player, thereby representing range real-world scenarios. Through extensive numerical simulations, demonstrates validity proposed identifies insightful guide players following optimal strategies under different assumptions. results indicate fully defense capabilities not always strategy either party. Instead, attackers must balance inducing errors minimizing information conveyed defender, while defenders should focus on risks preserving benign sample performance. These findings underscore effectiveness versatility approach, showcasing across scenarios highlighting its potential enhance against

Language: Английский

Human face localization and detection in highly occluded unconstrained environments DOI Creative Commons

Abdulaziz Alashbi,

Abdul Hakim H. M. Mohamed, Ayman A. El‐Saleh

et al.

Engineering Science and Technology an International Journal, Journal Year: 2024, Volume and Issue: 61, P. 101893 - 101893

Published: Nov. 29, 2024

Language: Английский

Citations

3

Attack Vectors for Face Recognition Systems: A Comprehensive Review DOI
Roberto Leyva, Gregory Epiphaniou, Carsten Maple

et al.

ACM Computing Surveys, Journal Year: 2025, Volume and Issue: unknown

Published: May 22, 2025

Face Recognition Systems (FRS) are critical and essential components for user authentication via biometrics. To name a few, baking, e-Commerce, border control entities propelling their progress. These of immense importance due to economic social relevance. FRS widespread usage leads security vulnerabilities that need be identified mitigated. This paper provides comprehensive review potential attacks on recently discovered from 2017–2024. Our work is significant regarding development because impact in terms security. The novelty systematic properly categorize threat vectors severity towards over the past eight years. We categorize, summarize, analyze this end. also elaborate taxonomy existing Architecture Reference (ARA) identify threats user-based FRS. findings show most persistent attack vectors, trends, severity, functionality, level sophistication required perform them. present description each create more resilient trustable systems fast-growing technology. can used by researchers practitioners interested state-of-the-art develop secure systems.

Language: Английский

Citations

0

Strategic safeguarding: A game theoretic approach for analyzing attacker-defender behavior in DNN backdoors DOI Creative Commons
Kassem Kallas, Quentin Le Roux, Wassim Hamidouche

et al.

EURASIP Journal on Information Security, Journal Year: 2024, Volume and Issue: 2024(1)

Published: Oct. 15, 2024

Deep neural networks (DNNs) are fundamental to modern applications like face recognition and autonomous driving. However, their security is a significant concern due various integrity risks, such as backdoor attacks. In these attacks, compromised training data introduce malicious behaviors into the DNN, which can be exploited during inference or deployment. This paper presents novel game-theoretic approach model interactions between an attacker defender in context of DNN attack. The contribution this multifaceted. First, it models interaction using framework. Second, designs utility function that captures objectives both parties, integrating clean accuracy attack success rate. Third, reduces game two-player zero-sum game, allowing for identification Nash equilibrium points through linear programming thorough analysis strategies. Additionally, framework provides varying levels flexibility regarding control afforded each player, thereby representing range real-world scenarios. Through extensive numerical simulations, demonstrates validity proposed identifies insightful guide players following optimal strategies under different assumptions. results indicate fully defense capabilities not always strategy either party. Instead, attackers must balance inducing errors minimizing information conveyed defender, while defenders should focus on risks preserving benign sample performance. These findings underscore effectiveness versatility approach, showcasing across scenarios highlighting its potential enhance against

Language: Английский

Citations

0