Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
102 tokens/sec
GPT-4o
59 tokens/sec
Gemini 2.5 Pro Pro
43 tokens/sec
o3 Pro
6 tokens/sec
GPT-4.1 Pro
50 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Systematic Evaluation of Backdoor Data Poisoning Attacks on Image Classifiers (2004.11514v1)

Published 24 Apr 2020 in cs.CV, cs.CR, cs.LG, and cs.NE

Abstract: Backdoor data poisoning attacks have recently been demonstrated in computer vision research as a potential safety risk for ML systems. Traditional data poisoning attacks manipulate training data to induce unreliability of an ML model, whereas backdoor data poisoning attacks maintain system performance unless the ML model is presented with an input containing an embedded "trigger" that provides a predetermined response advantageous to the adversary. Our work builds upon prior backdoor data-poisoning research for ML image classifiers and systematically assesses different experimental conditions including types of trigger patterns, persistence of trigger patterns during retraining, poisoning strategies, architectures (ResNet-50, NasNet, NasNet-Mobile), datasets (Flowers, CIFAR-10), and potential defensive regularization techniques (Contrastive Loss, Logit Squeezing, Manifold Mixup, Soft-Nearest-Neighbors Loss). Experiments yield four key findings. First, the success rate of backdoor poisoning attacks varies widely, depending on several factors, including model architecture, trigger pattern and regularization technique. Second, we find that poisoned models are hard to detect through performance inspection alone. Third, regularization typically reduces backdoor success rate, although it can have no effect or even slightly increase it, depending on the form of regularization. Finally, backdoors inserted through data poisoning can be rendered ineffective after just a few epochs of additional training on a small set of clean data without affecting the model's performance.

User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (8)
  1. Loc Truong (4 papers)
  2. Chace Jones (1 paper)
  3. Brian Hutchinson (22 papers)
  4. Andrew August (3 papers)
  5. Brenda Praggastis (12 papers)
  6. Robert Jasper (3 papers)
  7. Nicole Nichols (8 papers)
  8. Aaron Tuor (23 papers)
Citations (44)

Summary

We haven't generated a summary for this paper yet.