• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

通过翻转有限位实现的通用权重攻击

Versatile Weight Attack via Flipping Limited Bits.

作者信息

Bai Jiawang, Wu Baoyuan, Li Zhifeng, Xia Shu-Tao

出版信息

IEEE Trans Pattern Anal Mach Intell. 2023 Nov;45(11):13653-13665. doi: 10.1109/TPAMI.2023.3296408. Epub 2023 Oct 3.

DOI:10.1109/TPAMI.2023.3296408
PMID:37463082
Abstract

Many attack paradigms against deep neural networks have been well studied, such as the backdoor attack in the training stage and the adversarial attack in the inference stage. In this article, we study a novel attack paradigm, the bit-flip based weight attack, which directly modifies weight bits of the attacked model in the deployment stage. To meet various attack scenarios, we propose a general formulation including terms to achieve effectiveness and stealthiness goals and a constraint on the number of bit-flips. Furthermore, benefitting from this extensible and flexible formulation, we present two cases with different malicious purposes, i.e., single sample attack (SSA) and triggered samples attack (TSA). SSA which aims at misclassifying a specific sample into a target class is a binary optimization with determining the state of the binary bits (0 or 1); TSA which is to misclassify the samples embedded with a specific trigger is a mixed integer programming (MIP) with flipped bits and a learnable trigger. Utilizing the latest technique in integer programming, we equivalently reformulate them as continuous optimization problems, whose approximate solutions can be effectively and efficiently obtained by the alternating direction method of multipliers (ADMM) method. Extensive experiments demonstrate the superiority of our methods.

摘要

针对深度神经网络的许多攻击范式已得到充分研究,例如训练阶段的后门攻击和推理阶段的对抗攻击。在本文中,我们研究了一种新颖的攻击范式,即基于位翻转的权重攻击,它在部署阶段直接修改被攻击模型的权重位。为了满足各种攻击场景,我们提出了一个通用公式,包括实现有效性和隐蔽性目标的项以及对位翻转次数的约束。此外,受益于这种可扩展且灵活的公式,我们提出了两种具有不同恶意目的的情况,即单样本攻击(SSA)和触发样本攻击(TSA)。旨在将特定样本误分类到目标类别的SSA是一种确定二进制位(0或1)状态的二元优化;TSA是将嵌入特定触发器的样本误分类,是一种具有翻转位和可学习触发器的混合整数规划(MIP)。利用整数规划中的最新技术,我们将它们等效地重新表述为连续优化问题,其近似解可以通过乘子交替方向法(ADMM)有效地获得。大量实验证明了我们方法的优越性。

相似文献

1
Versatile Weight Attack via Flipping Limited Bits.通过翻转有限位实现的通用权重攻击
IEEE Trans Pattern Anal Mach Intell. 2023 Nov;45(11):13653-13665. doi: 10.1109/TPAMI.2023.3296408. Epub 2023 Oct 3.
2
T-BFA: Targeted Bit-Flip Adversarial Weight Attack.T-BFA:靶向位翻转对抗权重攻击。
IEEE Trans Pattern Anal Mach Intell. 2021 Sep 16;PP. doi: 10.1109/TPAMI.2021.3112932.
3
Poison Ink: Robust and Invisible Backdoor Attack.毒墨:稳健且不可见的后门攻击
IEEE Trans Image Process. 2022;31:5691-5705. doi: 10.1109/TIP.2022.3201472. Epub 2022 Sep 2.
4
Detection of Backdoors in Trained Classifiers Without Access to the Training Set.在无法访问训练集的情况下检测训练分类器中的后门。
IEEE Trans Neural Netw Learn Syst. 2022 Mar;33(3):1177-1191. doi: 10.1109/TNNLS.2020.3041202. Epub 2022 Feb 28.
5
l-Box ADMM: A Versatile Framework for Integer Programming.l-Box交替方向乘子法:整数规划的通用框架。
IEEE Trans Pattern Anal Mach Intell. 2019 Jul;41(7):1695-1708. doi: 10.1109/TPAMI.2018.2845842. Epub 2018 Jun 11.
6
Backdoor Attack on Deep Neural Networks Triggered by Fault Injection Attack on Image Sensor Interface.图像传感器接口故障注入攻击引发的深度神经网络后门攻击。
Sensors (Basel). 2023 May 14;23(10):4742. doi: 10.3390/s23104742.
7
Backdoor Attack against Face Sketch Synthesis.针对面部草图合成的后门攻击。
Entropy (Basel). 2023 Jun 25;25(7):974. doi: 10.3390/e25070974.
8
How to backdoor split learning.后门分裂学习。
Neural Netw. 2023 Nov;168:326-336. doi: 10.1016/j.neunet.2023.09.037. Epub 2023 Sep 24.
9
BadCM: Invisible Backdoor Attack Against Cross-Modal Learning.BadCM:针对跨模态学习的隐形后门攻击。
IEEE Trans Image Process. 2024;33:2558-2571. doi: 10.1109/TIP.2024.3378918. Epub 2024 Apr 3.
10
Critical Path-Based Backdoor Detection for Deep Neural Networks.基于关键路径的深度神经网络后门检测
IEEE Trans Neural Netw Learn Syst. 2024 Mar;35(3):4032-4046. doi: 10.1109/TNNLS.2022.3201586. Epub 2024 Feb 29.