BackdoorMBTI: A Backdoor Learning Multimodal Benchmark Tool Kit for Backdoor Defense Evaluation DOI

Haiyang Yu,

Tian Xie,

Jiaping Gui

и другие.

Опубликована: Апрель 4, 2025

Язык: Английский

Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning DOI Open Access
Antonio Emanuele Cinà, Kathrin Grosse, Ambra Demontis

и другие.

ACM Computing Surveys, Год журнала: 2023, Номер 55(13s), С. 1 - 39

Опубликована: Март 1, 2023

The success of machine learning is fueled by the increasing availability computing power and large training datasets. data used to learn new models or update existing ones, assuming that it sufficiently representative will be encountered at test time. This assumption challenged threat poisoning, an attack manipulates compromise model’s performance Although poisoning has been acknowledged as a relevant in industry applications, variety different attacks defenses have proposed so far, complete systematization critical review field still missing. In this survey, we provide comprehensive learning, reviewing more than 100 papers published past 15 years. We start categorizing current then organize accordingly. While focus mostly on computer-vision argue our also encompasses state-of-the-art for other modalities. Finally, discuss resources research shed light limitations open questions field.

Язык: Английский

Процитировано

68

Poisoning Web-Scale Training Datasets is Practical DOI

Nicholas Carlini,

Matthew Jagielski,

Christopher A. Choquette-Choo

и другие.

2022 IEEE Symposium on Security and Privacy (SP), Год журнала: 2024, Номер 29, С. 407 - 425

Опубликована: Май 19, 2024

Язык: Английский

Процитировано

33

Backdoor Defense via Adaptively Splitting Poisoned Dataset DOI
Kuofeng Gao, Yang Bai, Jindong Gu

и другие.

2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Год журнала: 2023, Номер unknown

Опубликована: Июнь 1, 2023

Backdoor defenses have been studied to alleviate the threat of deep neural networks (DNNs) being backdoor attacked and thus maliciously altered. Since DNNs usually adopt some external training data from an untrusted third party, a robust defense strategy during stage is importance. We argue that core training-time select poisoned samples handle them properly. In this work, we summarize unified framework as splitting dataset into two pools. Under our framework, propose adaptively dataset-based (ASD). Concretely, apply loss-guided split meta-learning-inspired dynamically update With clean pool polluted pool, ASD successfully defends against attacks training. Extensive experiments on multiple benchmark datasets DNN models six state-of-the-art demonstrate superiority ASD. Our code available at https://github.com/KuofengGao/ASD.

Язык: Английский

Процитировано

26

Delving into the Adversarial Robustness of Federated Learning DOI Open Access
Jie Zhang, Bo Li, Chen Chen

и другие.

Proceedings of the AAAI Conference on Artificial Intelligence, Год журнала: 2023, Номер 37(9), С. 11245 - 11253

Опубликована: Июнь 26, 2023

In Federated Learning (FL), models are as fragile centrally trained against adversarial examples. However, the robustness of federated learning remains largely unexplored. This paper casts light on challenge learning. To facilitate a better understanding vulnerability existing FL methods, we conduct comprehensive evaluations various attacks and training methods. Moreover, reveal negative impacts induced by directly adopting in FL, which seriously hurts test accuracy, especially non-IID settings. this work, propose novel algorithm called Decision Boundary based Adversarial Training (DBFAT), consists two components (local re-weighting global regularization) to improve both accuracy systems. Extensive experiments multiple datasets demonstrate that DBFAT consistently outperforms other baselines under IID

Язык: Английский

Процитировано

20

Backdoor Attacks via Machine Unlearning DOI Open Access
Zihao Liu, Tianhao Wang, Mengdi Huai

и другие.

Proceedings of the AAAI Conference on Artificial Intelligence, Год журнала: 2024, Номер 38(13), С. 14115 - 14123

Опубликована: Март 24, 2024

As a new paradigm to erase data from model and protect user privacy, machine unlearning has drawn significant attention. However, existing studies on mainly focus its effectiveness efficiency, neglecting the security challenges introduced by this technique. In paper, we aim bridge gap study possibility of conducting malicious attacks leveraging unlearning. Specifically, consider backdoor attack via unlearning, where an attacker seeks inject in unlearned submitting requests, so that prediction made can be changed when particular trigger presents. our study, propose two approaches. The first approach does not require poison any training model. achieve goal only requesting unlearn small subset his contributed data. second allows few instances with pre-defined upfront, then activate request. Both approaches are proposed maximizing utility while ensuring stealthiness. is demonstrated different algorithms as well models datasets.

Язык: Английский

Процитировано

8

Just a little human intelligence feedback! Unsupervised learning assisted supervised learning data poisoning based backdoor removal DOI
Ting Luo, Huaibing Peng, Anmin Fu

и другие.

Computer Communications, Год журнала: 2025, Номер unknown, С. 108052 - 108052

Опубликована: Янв. 1, 2025

Язык: Английский

Процитировано

1

Robustness enhancement of deep reinforcement learning-based traffic signal control model via structure compression DOI
Dongwei Xu,

Xiangwang Liao,

Zefeng Yu

и другие.

Knowledge-Based Systems, Год журнала: 2025, Номер unknown, С. 113022 - 113022

Опубликована: Янв. 1, 2025

Язык: Английский

Процитировано

1

Few-shot Backdoor Defense Using Shapley Estimation DOI

Jiyang Guan,

Zhuozhuo Tu,

Ran He

и другие.

2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Год журнала: 2022, Номер unknown, С. 13348 - 13357

Опубликована: Июнь 1, 2022

Deep neural networks have achieved impressive performance in a variety of tasks over the last decade, such as autonomous driving, face recognition, and medical diagnosis. However, prior works show that deep are easily manipulated into specific, attacker-decided behaviors inference stage by backdoor attacks which inject malicious small hidden triggers model training, raising serious security threats. To determine triggered neurons protect against attacks, we exploit Shapley value develop new approach called Pruning (ShapPruning) successfully mitigates from models data-insufficient situation (1 image per class or even free data). Considering interaction between neurons, ShapPruning identifies few infected (under 1 % all neurons) manages to model's structure accuracy after pruning many possible. accelerate ShapPruning, further propose discarding threshold ∊ -greedy strategy estimation, making it possible repair poisoned with only several minutes. Experiments demonstrate effectiveness robustness our method various compared existing methods.

Язык: Английский

Процитировано

27

Backdoor attack and defense in federated generative adversarial network-based medical image synthesis DOI
Ruinan Jin, Xiaoxiao Li

Medical Image Analysis, Год журнала: 2023, Номер 90, С. 102965 - 102965

Опубликована: Сен. 22, 2023

Язык: Английский

Процитировано

16

Enhancing Fine-Tuning based Backdoor Defense with Sharpness-Aware Minimization DOI
Mingli Zhu,

Shaokui Wei,

Li Shen

и другие.

2021 IEEE/CVF International Conference on Computer Vision (ICCV), Год журнала: 2023, Номер unknown, С. 4443 - 4454

Опубликована: Окт. 1, 2023

Backdoor defense, which aims to detect or mitigate the effect of malicious triggers introduced by attackers, is becoming increasingly critical for machine learning security and integrity. Fine-tuning based on benign data a natural defense erase backdoor in backdoored model. However, recent studies show that, given limited data, vanilla fine-tuning has poor performance. In this work, we firstly investigate process mitigation from neuron weight perspective, find that backdoor-related neurons are only slightly perturbed process, explains its To enhance inspired observation often have larger norms, propose FT-SAM, novel paradigm shrink norms incorporating sharpness-aware minimization with fine-tuning. We demonstrate effectiveness our method several benchmark datasets network architectures, where it achieves state-of-the-art performance, provide extensive analysis reveal FT-SAM's mechanism. Overall, work provides promising avenue improving robustness models against attacks. Codes available at https://github.com/SCLBD/BackdoorBench.

Язык: Английский

Процитировано

14