当前位置: X-MOL 学术IEEE Trans. Image Process. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Poison Ink: Robust and Invisible Backdoor Attack
IEEE Transactions on Image Processing ( IF 10.6 ) Pub Date : 2022-08-30 , DOI: 10.1109/tip.2022.3201472
Jie Zhang 1 , Chen Dongdong 2 , Qidong Huang 1 , Jing Liao 3 , Weiming Zhang 1 , Huamin Feng 4 , Gang Hua 5 , Nenghai Yu 1
Affiliation  

Recent research shows deep neural networks are vulnerable to different types of attacks, such as adversarial attacks, data poisoning attacks, and backdoor attacks. Among them, backdoor attacks are the most cunning and can occur in almost every stage of the deep learning pipeline. Backdoor attacks have attracted lots of interest from both academia and industry. However, most existing backdoor attack methods are visible or fragile to some effortless pre-processing such as common data transformations. To address these limitations, we propose a robust and invisible backdoor attack called “Poison Ink”. Concretely, we first leverage the image structures as target poisoning areas and fill them with poison ink (information) to generate the trigger pattern. As the image structure can keep its semantic meaning during the data transformation, such a trigger pattern is inherently robust to data transformations. Then we leverage a deep injection network to embed such input-aware trigger pattern into the cover image to achieve stealthiness. Compared to existing popular backdoor attack methods, Poison Ink outperforms both in stealthiness and robustness. Through extensive experiments, we demonstrate that Poison Ink is not only general to different datasets and network architectures but also flexible for different attack scenarios. Besides, it also has very strong resistance against many state-of-the-art defense techniques.

中文翻译:

Poison Ink:强大且无形的后门攻击

最近的研究表明,深度神经网络容易受到不同类型的攻击,例如对抗性攻击、数据中毒攻击和后门攻击。其中,后门攻击最为狡猾,几乎可以发生在深度学习管道的每个阶段。后门攻击引起了学术界和工业界的极大兴趣。但是,大多数现有的后门攻击方法对于一些轻松的预处理(例如常见的数据转换)是可见的或脆弱的。为了解决这些限制,我们提出了一种强大且不可见的后门攻击,称为“Poison Ink”。具体来说,我们首先利用图像结构作为目标中毒区域,并用毒墨(信息)填充它们以生成触发模式。由于图像结构在数据转换过程中可以保持其语义,这种触发模式对数据转换具有内在的鲁棒性。然后我们利用深度注入网络将这种输入感知触发模式嵌入到封面图像中以实现隐身。与现有流行的后门攻击方法相比,Poison Ink 在隐蔽性和鲁棒性方面都表现出色。通过广泛的实验,我们证明 Poison Ink 不仅适用于不同的数据集和网络架构,而且对于不同的攻击场景也很灵活。此外,它对许多最先进的防御技术也有很强的抵抗力。Poison Ink 在隐蔽性和鲁棒性方面都表现出色。通过广泛的实验,我们证明 Poison Ink 不仅适用于不同的数据集和网络架构,而且对于不同的攻击场景也很灵活。此外,它对许多最先进的防御技术也有很强的抵抗力。Poison Ink 在隐蔽性和鲁棒性方面都表现出色。通过广泛的实验,我们证明 Poison Ink 不仅适用于不同的数据集和网络架构,而且对于不同的攻击场景也很灵活。此外,它对许多最先进的防御技术也有很强的抵抗力。
更新日期:2022-09-03
down
wechat
bug