• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于关键路径的深度神经网络后门检测

Critical Path-Based Backdoor Detection for Deep Neural Networks.

作者信息

Jiang Wei, Wen Xiangyu, Zhan Jinyu, Wang Xupeng, Song Ziwei, Bian Chen

出版信息

IEEE Trans Neural Netw Learn Syst. 2024 Mar;35(3):4032-4046. doi: 10.1109/TNNLS.2022.3201586. Epub 2024 Feb 29.

DOI:10.1109/TNNLS.2022.3201586
PMID:36074883
Abstract

Backdoor attack to deep neural networks (DNNs) is among the predominant approaches to bring great threats into artificial intelligence. The existing methods to detect backdoor attacks focus on the perspective of distributions in DNNs, however, limited by its ability of generalization across DNN models. In this article, a critical-path-based backdoor detector (CPBD) is proposed, which approaches to detect backdoor attacks via DNN's interpretability. CPBD is designed to efficiently discover the characteristics of backdoors, which distinguish the critical paths in the attacked DNNs. To deal with the intractably large number of neurons, we propose to simplify the neurons, and the preserved key nodes are integrated into a set of critical paths. Thus, a DNN model can be formulated as a combination of several critical paths. Afterward, the detection of backdoors is performed based on the analysis of critical paths corresponding to different classes. Then, combining all the above steps, the CPBD algorithm is integrated to present the results in a standard and systematic manner. In addition, CPBD is able to locate neurons associated with malicious triggers, the combination of which is named as trigger propagation path. Extensive experiments are conducted, which testify the efficiency of the proposed method on multiple DNNs and different trigger sizes.

摘要

对深度神经网络(DNN)的后门攻击是给人工智能带来巨大威胁的主要途径之一。现有的检测后门攻击的方法主要从DNN中的分布角度出发,然而,其跨DNN模型的泛化能力有限。在本文中,提出了一种基于关键路径的后门检测器(CPBD),该检测器通过DNN的可解释性来检测后门攻击。CPBD旨在有效发现后门的特征,这些特征区分了受攻击DNN中的关键路径。为了处理数量庞大的神经元,我们提出简化神经元,并将保留的关键节点整合到一组关键路径中。因此,一个DNN模型可以被表述为几个关键路径的组合。随后,基于对不同类别的关键路径的分析来进行后门检测。然后,结合上述所有步骤,集成CPBD算法以标准和系统的方式呈现结果。此外,CPBD能够定位与恶意触发器相关的神经元,这些神经元的组合被称为触发器传播路径。进行了大量实验,验证了所提方法在多个DNN和不同触发器大小上的有效性。

相似文献

1
Critical Path-Based Backdoor Detection for Deep Neural Networks.基于关键路径的深度神经网络后门检测
IEEE Trans Neural Netw Learn Syst. 2024 Mar;35(3):4032-4046. doi: 10.1109/TNNLS.2022.3201586. Epub 2024 Feb 29.
2
Detecting Scene-Plausible Perceptible Backdoors in Trained DNNs Without Access to the Training Set.在无法访问训练集的情况下,检测训练后的 DNN 中场景合理的可察觉后门。
Neural Comput. 2021 Apr 13;33(5):1329-1371. doi: 10.1162/neco_a_01376.
3
Detection of Backdoors in Trained Classifiers Without Access to the Training Set.在无法访问训练集的情况下检测训练分类器中的后门。
IEEE Trans Neural Netw Learn Syst. 2022 Mar;33(3):1177-1191. doi: 10.1109/TNNLS.2020.3041202. Epub 2022 Feb 28.
4
SecureNet: Proactive intellectual property protection and model security defense for DNNs based on backdoor learning.SecureNet:基于后门学习的 DNN 主动式知识产权保护和模型安全防御
Neural Netw. 2024 Jun;174:106199. doi: 10.1016/j.neunet.2024.106199. Epub 2024 Feb 21.
5
Backdoor Learning: A Survey.后门学习:一项综述。
IEEE Trans Neural Netw Learn Syst. 2024 Jan;35(1):5-22. doi: 10.1109/TNNLS.2022.3182979. Epub 2024 Jan 4.
6
Unambiguous and High-Fidelity Backdoor Watermarking for Deep Neural Networks.用于深度神经网络的明确且高保真的后门水印
IEEE Trans Neural Netw Learn Syst. 2024 Aug;35(8):11204-11217. doi: 10.1109/TNNLS.2023.3250210. Epub 2024 Aug 5.
7
Backdoor Attack against Face Sketch Synthesis.针对面部草图合成的后门攻击。
Entropy (Basel). 2023 Jun 25;25(7):974. doi: 10.3390/e25070974.
8
Towards Unified Robustness Against Both Backdoor and Adversarial Attacks.迈向抵御后门攻击和对抗性攻击的统一鲁棒性。
IEEE Trans Pattern Anal Mach Intell. 2024 Dec;46(12):7589-7605. doi: 10.1109/TPAMI.2024.3392760. Epub 2024 Nov 6.
9
Exploiting Missing Value Patterns for a Backdoor Attack on Machine Learning Models of Electronic Health Records: Development and Validation Study.利用缺失值模式对电子健康记录机器学习模型进行后门攻击:开发与验证研究
JMIR Med Inform. 2022 Aug 19;10(8):e38440. doi: 10.2196/38440.
10
A Textual Backdoor Defense Method Based on Deep Feature Classification.一种基于深度特征分类的文本后门防御方法。
Entropy (Basel). 2023 Jan 23;25(2):220. doi: 10.3390/e25020220.