• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

BadCM:针对跨模态学习的隐形后门攻击。

BadCM: Invisible Backdoor Attack Against Cross-Modal Learning.

作者信息

Zhang Zheng, Yuan Xu, Zhu Lei, Song Jingkuan, Nie Liqiang

出版信息

IEEE Trans Image Process. 2024;33:2558-2571. doi: 10.1109/TIP.2024.3378918. Epub 2024 Apr 3.

DOI:10.1109/TIP.2024.3378918
PMID:38530729
Abstract

Despite remarkable successes in unimodal learning tasks, backdoor attacks against cross-modal learning are still underexplored due to the limited generalization and inferior stealthiness when involving multiple modalities. Notably, since works in this area mainly inherit ideas from unimodal visual attacks, they struggle with dealing with diverse cross-modal attack circumstances and manipulating imperceptible trigger samples, which hinders their practicability in real-world applications. In this paper, we introduce a novel bilateral backdoor to fill in the missing pieces of the puzzle in the cross-modal backdoor and propose a generalized invisible backdoor framework against cross-modal learning (BadCM). Specifically, a cross-modal mining scheme is developed to capture the modality-invariant components as target poisoning areas, where well-designed trigger patterns injected into these regions can be efficiently recognized by the victim models. This strategy is adapted to different image-text cross-modal models, making our framework available to various attack scenarios. Furthermore, for generating poisoned samples of high stealthiness, we conceive modality-specific generators for visual and linguistic modalities that facilitate hiding explicit trigger patterns in modality-invariant regions. To the best of our knowledge, BadCM is the first invisible backdoor method deliberately designed for diverse cross-modal attacks within one unified framework. Comprehensive experimental evaluations on two typical applications, i.e., cross-modal retrieval and VQA, demonstrate the effectiveness and generalization of our method under multiple kinds of attack scenarios. Moreover, we show that BadCM can robustly evade existing backdoor defenses. Our code is available at https://github.com/xandery-geek/BadCM.

摘要

尽管在单模态学习任务中取得了显著成功,但由于在涉及多种模态时泛化能力有限且隐蔽性较差,针对跨模态学习的后门攻击仍未得到充分探索。值得注意的是,由于该领域的工作主要继承了单模态视觉攻击的思想,它们在处理各种跨模态攻击情况和操纵难以察觉的触发样本方面存在困难,这阻碍了它们在实际应用中的实用性。在本文中,我们引入了一种新颖的双边后门来填补跨模态后门难题中缺失的部分,并提出了一种针对跨模态学习的广义隐形后门框架(BadCM)。具体而言,我们开发了一种跨模态挖掘方案,以捕获模态不变的组件作为目标中毒区域,在这些区域注入精心设计的触发模式可以被受害模型有效识别。这种策略适用于不同的图像 - 文本跨模态模型,使我们的框架适用于各种攻击场景。此外,为了生成具有高隐蔽性的中毒样本,我们为视觉和语言模态设计了特定模态的生成器,便于在模态不变区域隐藏明确的触发模式。据我们所知,BadCM是第一个在统一框架内为各种跨模态攻击精心设计的隐形后门方法。在两个典型应用,即跨模态检索和视觉问答上进行的综合实验评估,证明了我们的方法在多种攻击场景下的有效性和泛化性。此外,我们表明BadCM可以稳健地规避现有的后门防御。我们的代码可在https://github.com/xandery-geek/BadCM获取。

相似文献

1
BadCM: Invisible Backdoor Attack Against Cross-Modal Learning.BadCM:针对跨模态学习的隐形后门攻击。
IEEE Trans Image Process. 2024;33:2558-2571. doi: 10.1109/TIP.2024.3378918. Epub 2024 Apr 3.
2
Poison Ink: Robust and Invisible Backdoor Attack.毒墨:稳健且不可见的后门攻击
IEEE Trans Image Process. 2022;31:5691-5705. doi: 10.1109/TIP.2022.3201472. Epub 2022 Sep 2.
3
Exploiting Missing Value Patterns for a Backdoor Attack on Machine Learning Models of Electronic Health Records: Development and Validation Study.利用缺失值模式对电子健康记录机器学习模型进行后门攻击:开发与验证研究
JMIR Med Inform. 2022 Aug 19;10(8):e38440. doi: 10.2196/38440.
4
Backdoor Learning: A Survey.后门学习:一项综述。
IEEE Trans Neural Netw Learn Syst. 2024 Jan;35(1):5-22. doi: 10.1109/TNNLS.2022.3182979. Epub 2024 Jan 4.
5
Backdoor Attack against Face Sketch Synthesis.针对面部草图合成的后门攻击。
Entropy (Basel). 2023 Jun 25;25(7):974. doi: 10.3390/e25070974.
6
How to backdoor split learning.后门分裂学习。
Neural Netw. 2023 Nov;168:326-336. doi: 10.1016/j.neunet.2023.09.037. Epub 2023 Sep 24.
7
Detection of Backdoors in Trained Classifiers Without Access to the Training Set.在无法访问训练集的情况下检测训练分类器中的后门。
IEEE Trans Neural Netw Learn Syst. 2022 Mar;33(3):1177-1191. doi: 10.1109/TNNLS.2020.3041202. Epub 2022 Feb 28.
8
Federated Learning Backdoor Attack Based on Frequency Domain Injection.基于频域注入的联邦学习后门攻击
Entropy (Basel). 2024 Feb 14;26(2):164. doi: 10.3390/e26020164.
9
Backdoor attack and defense in federated generative adversarial network-based medical image synthesis.联邦生成对抗网络的后门攻击与防御在医学图像合成中的应用。
Med Image Anal. 2023 Dec;90:102965. doi: 10.1016/j.media.2023.102965. Epub 2023 Sep 22.
10
Trap and Replace: Defending Backdoor Attacks by Trapping Them into an Easy-to-Replace Subnetwork.诱捕与替换:通过将后门攻击诱捕到易于替换的子网中来防御后门攻击
Adv Neural Inf Process Syst. 2022 Dec;35:36026-36039.