Invisible and Multi-triggers Backdoor Attack Approach on Deep Neural Networks through Frequency Domain

被引:0
作者
Sun, Fengxue [1 ]
Pei, Bei [2 ]
Chen, Guangyong [2 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing, Peoples R China
[2] Natl Engn Res Ctr Classified Protect & Safeguard, Shanghai, Peoples R China
来源
2024 9TH INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING, ICSIP | 2024年
基金
中国国家自然科学基金;
关键词
artificial intelligence security; backdoor attack; frequency domain; discrete cosine transform;
D O I
10.1109/ICSIP61881.2024.10671403
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, the security of deep neural networks (DNNs) has become a research hotspot with widespread deployments of machine learning models in our daily life. Backdoor attack is an emerging security threat to DNNs, where the infected model will output malicious targets for the images containing specific triggers. However, most existing backdoor attack approaches have only single trigger, and the triggers are often visible to human eyes. In order to overcome these limitations, in this paper, we propose an invisible and multi-triggers backdoor attack (IMT-BA) approach to simultaneously generate four invisible triggers. Firstly, in our IMT-BA approach, we divide the whole images into four blocks and apply Discrete Cosine Transform (DCT) algorithm to generate four invisible triggers aiming at four targets. Secondly, our IMT-BA approach can be easily deployed in real world without any knowledge of the hyperparameters and architectures of the DNNs models. Finally, we do the experiments with MNIST and CIFAR-10 datasets and the experiment results show our IMT-BA approach can fool both DNNs models and Human Visual System (HVS) with high success rate.
引用
收藏
页码:707 / 711
页数:5
相关论文
共 21 条
  • [1] Chen X., 2021, IEEE Access, V9
  • [2] Chen Xinyun, 2017, CoRR
  • [3] Duang Y., 2022, 2022 15 INT C IM SIG, P1
  • [4] Gu T., 2017, P NEUR INF PROC SYST, P1
  • [5] Deep Residual Learning for Image Recognition
    He, Kaiming
    Zhang, Xiangyu
    Ren, Shaoqing
    Sun, Jian
    [J]. 2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, : 770 - 778
  • [6] Planning with SiMBA: Motion Planning under Uncertainty for Temporal Goals using Simplified Belief Guides
    Ho, Qi Heng
    Sunberg, Zachary N.
    Lahijanian, Morteza
    [J]. 2023 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND AUTOMATION, ICRA, 2023, : 5723 - 5729
  • [7] Hyun Kwon, 2020, ICIIT 2020: Proceedings of the 2020 5th International Conference on Intelligent Information Technology, P140, DOI 10.1145/3385209.3385216
  • [8] Krizhevsky A., 2009, THESIS
  • [9] LeCun Y., 1995, NEURAL NETW STAT MEC, V261, P276, DOI DOI 10.1142/2808
  • [10] Invisible Backdoor Attacks on Deep Neural Networks Via Steganography and Regularization
    Li, Shaofeng
    Xue, Minhui
    Zhao, Benjamin
    Zhu, Haojin
    Zhang, Xinpeng
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (05) : 2088 - 2105