Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
119 tokens/sec
GPT-4o
56 tokens/sec
Gemini 2.5 Pro Pro
43 tokens/sec
o3 Pro
6 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Training set cleansing of backdoor poisoning by self-supervised representation learning (2210.10272v2)

Published 19 Oct 2022 in cs.LG, cs.CR, and cs.CV

Abstract: A backdoor or Trojan attack is an important type of data poisoning attack against deep neural network (DNN) classifiers, wherein the training dataset is poisoned with a small number of samples that each possess the backdoor pattern (usually a pattern that is either imperceptible or innocuous) and which are mislabeled to the attacker's target class. When trained on a backdoor-poisoned dataset, a DNN behaves normally on most benign test samples but makes incorrect predictions to the target class when the test sample has the backdoor pattern incorporated (i.e., contains a backdoor trigger). Here we focus on image classification tasks and show that supervised training may build stronger association between the backdoor pattern and the associated target class than that between normal features and the true class of origin. By contrast, self-supervised representation learning ignores the labels of samples and learns a feature embedding based on images' semantic content. %We thus propose to use unsupervised representation learning to avoid emphasising backdoor-poisoned training samples and learn a similar feature embedding for samples of the same class. Using a feature embedding found by self-supervised representation learning, a data cleansing method, which combines sample filtering and re-labeling, is developed. Experiments on CIFAR-10 benchmark datasets show that our method achieves state-of-the-art performance in mitigating backdoor attacks.

User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (9)
  1. H. Wang (637 papers)
  2. S. Karami (2 papers)
  3. O. Dia (1 paper)
  4. H. Ritter (7 papers)
  5. E. Emamjomeh-Zadeh (1 paper)
  6. J. Chen (285 papers)
  7. Z. Xiang (281 papers)
  8. D. J. Miller (24 papers)
  9. G. Kesidis (5 papers)
Citations (3)

Summary

We haven't generated a summary for this paper yet.