Multi-Targeted Backdoor: Indentifying Backdoor Attack for Multiple Deep Neural Networks

Cited 18 time in webofscience Cited 11 time in scopus
  • Hit : 509
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorKwon, Hyunko
dc.contributor.authorYoon, Hyunsooko
dc.contributor.authorPark, Ki-Woongko
dc.date.accessioned2020-05-26T02:20:17Z-
dc.date.available2020-05-26T02:20:17Z-
dc.date.created2020-04-04-
dc.date.issued2020-04-
dc.identifier.citationIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E103D, no.4-
dc.identifier.issn1745-1361-
dc.identifier.urihttp://hdl.handle.net/10203/274290-
dc.description.abstractWe propose a multi-targeted backdoor that misleads different models to different classes. The method trains multiple models with data that include specific triggers that will be misclassified by different models into different classes. For example, an attacker can use a single multi-targeted backdoor sample to make model A recognize it as a stop sign, model B as a left-turn sign, model C as a right-turn sign, and model D as a U-turn sign. We used MNIST and Fashion-MNIST as experimental datasets and Tensorflow as a machine learning library. Experimental results show that the proposed method with a trigger can cause misclassification as different classes by different models with a 100% attack success rate on MNIST and Fashion-MNIST while maintaining the 97.18% and 91.1% accuracy, respectively, on data without a trigger.-
dc.languageEnglish-
dc.publisherIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG-
dc.titleMulti-Targeted Backdoor: Indentifying Backdoor Attack for Multiple Deep Neural Networks-
dc.typeArticle-
dc.identifier.wosid000530667500018-
dc.identifier.scopusid2-s2.0-85082739677-
dc.type.rimsART-
dc.citation.volumeE103D-
dc.citation.issue4-
dc.citation.publicationnameIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS-
dc.identifier.doi10.1587/transinf.2019edl8170-
dc.contributor.localauthorYoon, Hyunsoo-
dc.contributor.nonIdAuthorPark, Ki-Woong-
dc.description.isOpenAccessN-
dc.type.journalArticleArticle-
dc.subject.keywordAuthormachine learning-
dc.subject.keywordAuthordeep neural network-
dc.subject.keywordAuthorbackdoor attack-
dc.subject.keywordAuthorpoisoning attack-
dc.subject.keywordAuthoradversarial example-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 18 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0