Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
110 tokens/sec
GPT-4o
56 tokens/sec
Gemini 2.5 Pro Pro
44 tokens/sec
o3 Pro
6 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Defense Against Multi-target Trojan Attacks (2207.03895v1)

Published 8 Jul 2022 in cs.CV

Abstract: Adversarial attacks on deep learning-based models pose a significant threat to the current AI infrastructure. Among them, Trojan attacks are the hardest to defend against. In this paper, we first introduce a variation of the Badnet kind of attacks that introduces Trojan backdoors to multiple target classes and allows triggers to be placed anywhere in the image. The former makes it more potent and the latter makes it extremely easy to carry out the attack in the physical space. The state-of-the-art Trojan detection methods fail with this threat model. To defend against this attack, we first introduce a trigger reverse-engineering mechanism that uses multiple images to recover a variety of potential triggers. We then propose a detection mechanism by measuring the transferability of such recovered triggers. A Trojan trigger will have very high transferability i.e. they make other images also go to the same class. We study many practical advantages of our attack method and then demonstrate the detection performance using a variety of image datasets. The experimental results show the superior detection performance of our method over the state-of-the-arts.

User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (7)
  1. Haripriya Harikumar (8 papers)
  2. Santu Rana (68 papers)
  3. Kien Do (35 papers)
  4. Sunil Gupta (78 papers)
  5. Wei Zong (1 paper)
  6. Willy Susilo (21 papers)
  7. Svetha Venkastesh (1 paper)
Citations (3)

Summary

We haven't generated a summary for this paper yet.