• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

毒墨:稳健且不可见的后门攻击

Poison Ink: Robust and Invisible Backdoor Attack.

出版信息

IEEE Trans Image Process. 2022;31:5691-5705. doi: 10.1109/TIP.2022.3201472. Epub 2022 Sep 2.

DOI:10.1109/TIP.2022.3201472
PMID:36040942
Abstract

Recent research shows deep neural networks are vulnerable to different types of attacks, such as adversarial attacks, data poisoning attacks, and backdoor attacks. Among them, backdoor attacks are the most cunning and can occur in almost every stage of the deep learning pipeline. Backdoor attacks have attracted lots of interest from both academia and industry. However, most existing backdoor attack methods are visible or fragile to some effortless pre-processing such as common data transformations. To address these limitations, we propose a robust and invisible backdoor attack called "Poison Ink". Concretely, we first leverage the image structures as target poisoning areas and fill them with poison ink (information) to generate the trigger pattern. As the image structure can keep its semantic meaning during the data transformation, such a trigger pattern is inherently robust to data transformations. Then we leverage a deep injection network to embed such input-aware trigger pattern into the cover image to achieve stealthiness. Compared to existing popular backdoor attack methods, Poison Ink outperforms both in stealthiness and robustness. Through extensive experiments, we demonstrate that Poison Ink is not only general to different datasets and network architectures but also flexible for different attack scenarios. Besides, it also has very strong resistance against many state-of-the-art defense techniques.

摘要

最近的研究表明,深度神经网络容易受到不同类型的攻击,如对抗攻击、数据中毒攻击和后门攻击。其中,后门攻击最为狡猾,可以在深度学习管道的几乎每个阶段发生。后门攻击引起了学术界和工业界的广泛关注。然而,大多数现有的后门攻击方法对于一些简单的预处理(如常见的数据转换)是可见的或脆弱的。为了解决这些限制,我们提出了一种名为“毒墨”的稳健且不可见的后门攻击。具体来说,我们首先利用图像结构作为目标中毒区域,并在其中填充毒墨(信息)以生成触发模式。由于图像结构在数据转换过程中可以保持其语义意义,因此这种触发模式天生对数据转换具有鲁棒性。然后,我们利用深度注入网络将这种输入感知的触发模式嵌入到覆盖图像中,以实现隐蔽性。与现有的流行后门攻击方法相比,毒墨在隐蔽性和鲁棒性方面都表现出色。通过广泛的实验,我们证明了毒墨不仅对不同的数据集和网络架构具有通用性,而且对不同的攻击场景也具有灵活性。此外,它还对许多最先进的防御技术具有很强的抵抗力。

相似文献

1
Poison Ink: Robust and Invisible Backdoor Attack.毒墨:稳健且不可见的后门攻击
IEEE Trans Image Process. 2022;31:5691-5705. doi: 10.1109/TIP.2022.3201472. Epub 2022 Sep 2.
2
Backdoor Attack on Deep Neural Networks Triggered by Fault Injection Attack on Image Sensor Interface.图像传感器接口故障注入攻击引发的深度神经网络后门攻击。
Sensors (Basel). 2023 May 14;23(10):4742. doi: 10.3390/s23104742.
3
Backdoor attack and defense in federated generative adversarial network-based medical image synthesis.联邦生成对抗网络的后门攻击与防御在医学图像合成中的应用。
Med Image Anal. 2023 Dec;90:102965. doi: 10.1016/j.media.2023.102965. Epub 2023 Sep 22.
4
Detection of Backdoors in Trained Classifiers Without Access to the Training Set.在无法访问训练集的情况下检测训练分类器中的后门。
IEEE Trans Neural Netw Learn Syst. 2022 Mar;33(3):1177-1191. doi: 10.1109/TNNLS.2020.3041202. Epub 2022 Feb 28.
5
Exploiting Missing Value Patterns for a Backdoor Attack on Machine Learning Models of Electronic Health Records: Development and Validation Study.利用缺失值模式对电子健康记录机器学习模型进行后门攻击:开发与验证研究
JMIR Med Inform. 2022 Aug 19;10(8):e38440. doi: 10.2196/38440.
6
Multidomain active defense: Detecting multidomain backdoor poisoned samples via ALL-to-ALL decoupling training without clean datasets.多域主动防御:在没有干净数据集的情况下,通过 ALL-to-ALL 去耦训练检测多域后门中毒样本。
Neural Netw. 2023 Nov;168:350-362. doi: 10.1016/j.neunet.2023.09.036. Epub 2023 Sep 25.
7
Towards Unified Robustness Against Both Backdoor and Adversarial Attacks.迈向抵御后门攻击和对抗性攻击的统一鲁棒性。
IEEE Trans Pattern Anal Mach Intell. 2024 Dec;46(12):7589-7605. doi: 10.1109/TPAMI.2024.3392760. Epub 2024 Nov 6.
8
BadCM: Invisible Backdoor Attack Against Cross-Modal Learning.BadCM:针对跨模态学习的隐形后门攻击。
IEEE Trans Image Process. 2024;33:2558-2571. doi: 10.1109/TIP.2024.3378918. Epub 2024 Apr 3.
9
Backdoor Attack against Face Sketch Synthesis.针对面部草图合成的后门攻击。
Entropy (Basel). 2023 Jun 25;25(7):974. doi: 10.3390/e25070974.
10
IBD: An Interpretable Backdoor-Detection Method via Multivariate Interactions.IBD:一种基于多元交互的可解释后门检测方法。
Sensors (Basel). 2022 Nov 10;22(22):8697. doi: 10.3390/s22228697.