Author:
Yin Jianyao,Chen Honglong,Li Junjian,Gao Yudong
Abstract
AbstractDeep learning has been widely used in many applications such as face recognition, autonomous driving, etc. However, deep learning models are vulnerable to various adversarial attacks, among which backdoor attack is emerging recently. Most of the existing backdoor attacks use the same trigger or the same trigger generation approach to generate the poisoned samples in the training and testing sets, which is also commonly adopted by many backdoor defense strategies. In this paper, we develop an enhanced backdoor attack (EBA) that aims to reveal the potential flaws of existing backdoor defense methods. We use a low-intensity trigger to embed the backdoor, while a high-intensity trigger to activate it. Furthermore, we propose an enhanced coalescence backdoor attack (ECBA) where multiple low-intensity incipient triggers are designed to train the backdoor model, and then, all incipient triggers are gathered on one sample and enhanced to launch the attack. Experiment results on three popular datasets show that our proposed attacks can achieve high attack success rates while maintaining the model classification accuracy of benign samples. Meanwhile, by hiding the incipient poisoned samples and preventing them from activating the backdoor, the proposed attack exhibits significant stealth and the ability to evade mainstream defense methods during the model training phase.
Publisher
Springer Science and Business Media LLC
Reference36 articles.
1. Wang M, Deng W (2021) Deep face recognition: a survey. Neurocomputing 429:215–244
2. Chen C, Seff A, Kornhauser A, Xiao J (2015) Deepdriving: Learning affordance for direct perception in autonomous driving. In: Proc. of IEEE international conference on computer vision, pp 2722–2730
3. Bae H-S, Lee H-J, Lee S-G (2016) Voice recognition based on adaptive mfcc and deep learning. In: Proc. of IEEE 11th conference on industrial electronics and applications (ICIEA) pp 1542–1546
4. Gregor K, Danihelka I, Graves A, Rezende D, Wierstra D (2015) Draw: A recurrent neural network for image generation. In: Proc. of international conference on machine learning, pp 1462–1471
5. Lin K, Chen H, Yan N, Ni Z, Wang Z, Yu J (2023) Double Polling-Based Tag Information Collection for Sensor-Augmented RFID Systems. IEEE Transactions on Mobile Computing, pp 1–14