Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
80 tokens/sec
GPT-4o
59 tokens/sec
Gemini 2.5 Pro Pro
43 tokens/sec
o3 Pro
7 tokens/sec
GPT-4.1 Pro
50 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Rethink the Evaluation for Attack Strength of Backdoor Attacks in Natural Language Processing (2201.02993v2)

Published 9 Jan 2022 in cs.CL, cs.CR, and cs.LG

Abstract: It has been shown that NLP models are vulnerable to a kind of security threat called the Backdoor Attack, which utilizes a backdoor trigger' paradigm to mislead the models. The most threatening backdoor attack is the stealthy backdoor, which defines the triggers as text style or syntactic. Although they have achieved an incredible high attack success rate (ASR), we find that the principal factor contributing to their ASR is not thebackdoor trigger' paradigm. Thus the capacity of these stealthy backdoor attacks is overestimated when categorized as backdoor attacks. Therefore, to evaluate the real attack power of backdoor attacks, we propose a new metric called attack successful rate difference (ASRD), which measures the ASR difference between clean state and poison state models. Besides, since the defenses against stealthy backdoor attacks are absent, we propose Trigger Breaker, consisting of two too simple tricks that can defend against stealthy backdoor attacks effectively. Experiments show that our method achieves significantly better performance than state-of-the-art defense methods against stealthy backdoor attacks.

User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (4)
  1. Lingfeng Shen (18 papers)
  2. Haiyun Jiang (34 papers)
  3. Lemao Liu (62 papers)
  4. Shuming Shi (126 papers)
Citations (1)