Natural Backdoor Attacks on Deep Neural Networks via Raindrops

Author:

Zhao Feng1ORCID,Zhou Li1ORCID,Zhong Qi2ORCID,Lan Rushi1ORCID,Zhang Leo Yu2ORCID

Affiliation:

1. Guangxi Key Laboratory of Image and Graphic Intelligent Processing, Guilin University of Electronic Technology, Guilin 541004, China

2. School of Information Technology, Deakin University, Geelong, VIC 3216, Australia

Abstract

Recently, deep learning has made significant inroads into the Internet of Things due to its great potential for processing big data. Backdoor attacks, which try to influence model prediction on specific inputs, have become a serious threat to deep neural network models. However, because the poisoned data used to plant a backdoor into the victim model typically follows a fixed specific pattern, most existing backdoor attacks can be readily prevented by common defense. In this paper, we leverage natural behavior and present a stealthy backdoor attack for image classification tasks: the raindrop backdoor attack (RDBA). We use raindrops as the backdoor trigger, and they are naturally merged with clean instances to synthesize poisoned data that are close to their natural counterparts in the rain. The raindrops dispersed over images are more diversified than the triggers in the literature, which are fixed, confined, and unpleasant patterns to the host content, making the triggers more stealthy. Extensive experiments on ImageNet and GTSRB datasets demonstrate the fidelity, effectiveness, stealthiness, and sustainability of RDBA in attacking models with current popular defense mechanisms.

Funder

National Natural Science Foundation of China

Publisher

Hindawi Limited

Subject

Computer Networks and Communications,Information Systems

Reference33 articles.

1. NuScenes: a multimodal dataset for autonomous driving;H. Caesar

2. Rethinking the Inception Architecture for Computer Vision

3. Second-Order Attention Network for Single Image Super-Resolution

4. An analysis of early use of deep learning terms in natural language processing;B. Dalbelo Bašić

5. BERT: pre-training of deep bidirectional transformers for language understanding;J. Devlin

Cited by 6 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Backdoor Attacks Prediction in IIoT Network using Optimal Double Mask Region Convolution Model;IETE Journal of Research;2024-02-06

2. Backdoor Attacks and Generative Model Fairness: Current Trends and Future Research Directions;2024 16th International Conference on COMmunication Systems & NETworkS (COMSNETS);2024-01-03

3. Implementing a Multitarget Backdoor Attack Algorithm Based on Procedural Noise Texture Features;IEEE Access;2024

4. SATBA: An Invisible Backdoor Attack Based on Spatial Attention;2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom);2023-11-01

5. DLP: towards active defense against backdoor attacks with decoupled learning process;Cybersecurity;2023-05-01

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3