Backdoor Attacks to Deep Learning Models and Countermeasures: A Survey

被引:5
|
作者
Li, Yudong [1 ]
Zhang, Shigeng [1 ,2 ]
Wang, Weiping [1 ]
Song, Hong [1 ]
机构
[1] Cent South Univ, Sch Comp Sci & Engn, Changsha 410083, Peoples R China
[2] Parallel & Distributed Proc Lab PDL Changsha, Sci & Technol, Changsha 410003, Peoples R China
来源
IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY | 2023年 / 4卷
关键词
Deep learning; Face recognition; Data models; Computational modeling; Training; Perturbation methods; Video on demand; security; backdoor attack;
D O I
10.1109/OJCS.2023.3267221
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Backdoor attacks have severely threatened deep neural network (DNN) models in the past several years. In backdoor attacks, the attackers try to plant hidden backdoors into DNN models, either in the training or inference stage, to mislead the output of the model when the input contains some specified triggers without affecting the prediction of normal inputs not containing the triggers. As a rapidly developing topic, numerous works on designing various backdoor attacks and developing techniques to defend against such attacks have been proposed in recent years. However, a comprehensive and holistic overview of backdoor attacks and countermeasures is still missing. In this paper, we provide a systematic overview of the design of backdoor attacks and the defense strategies to defend against backdoor attacks, covering the latest published works. We review representative backdoor attacks and defense strategies in both the computer vision domain and other domains, discuss their pros and cons, and make comparisons among them. We outline key challenges to be addressed and potential research directions in the future.
引用
收藏
页码:134 / 146
页数:13
相关论文
共 50 条
  • [21] A Comprehensive Overview of Backdoor Attacks in Large Language Models Within Communication Networks
    Yang, Haomiao
    Xiang, Kunlan
    Ge, Mengyu
    Li, Hongwei
    Lu, Rongxing
    Yu, Shui
    IEEE NETWORK, 2024, 38 (06): : 211 - 218
  • [22] Backdoor Attacks Against Deep Learning-based Massive MIMO Localization
    Zhao, Tianya
    Wang, Xuyu
    Mao, Shiwen
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 2796 - 2801
  • [23] Adversarial Deep Learning: A Survey on Adversarial Attacks and Defense Mechanisms on Image Classification
    Khamaiseh, Samer Y.
    Bagagem, Derek
    Al-Alaj, Abdullah
    Mancino, Mathew
    Alomari, Hakam W.
    IEEE ACCESS, 2022, 10 : 102266 - 102291
  • [24] Adversarial Attacks on Deep Learning Models of Computer Vision: A Survey
    Ding, Jia
    Xu, Zhiwu
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2020, PT III, 2020, 12454 : 396 - 408
  • [25] Membership Inference Attacks Against Deep Learning Models via Logits Distribution
    Yan, Hongyang
    Li, Shuhao
    Wang, Yajie
    Zhang, Yaoyuan
    Sharif, Kashif
    Hu, Haibo
    Li, Yuanzhang
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 3799 - 3808
  • [26] Exploring Clean Label Backdoor Attacks and Defense in Language Models
    Zhao, Shuai
    Tuan, Luu Anh
    Fu, Jie
    Wen, Jinming
    Luo, Weiqi
    IEEE-ACM TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING, 2024, 32 : 3014 - 3024
  • [27] Model Agnostic Defence Against Backdoor Attacks in Machine Learning
    Udeshi, Sakshi
    Peng, Shanshan
    Woo, Gerald
    Loh, Lionell
    Rawshan, Louth
    Chattopadhyay, Sudipta
    IEEE TRANSACTIONS ON RELIABILITY, 2022, 71 (02) : 880 - 895
  • [28] Precise Defense Approach Against Small-Scale Backdoor Attacks in Industrial Internet of Things
    Ran, Ziyong
    Yao, Yu
    Li, Wenxuan
    Yang, Wei
    Li, Weihao
    Wu, Yunfeng
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (05): : 5742 - 5754
  • [29] Invisible Backdoor Attacks on Deep Neural Networks Via Steganography and Regularization
    Li, Shaofeng
    Xue, Minhui
    Zhao, Benjamin
    Zhu, Haojin
    Zhang, Xinpeng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (05) : 2088 - 2105
  • [30] Going Deep: Using deep learning techniques with simplified mathematical models against XOR BR and TBR PUFs (Attacks and Countermeasures)
    Khalafalla, Mahmoud
    Elmohr, Mahmoud A.
    Gebotys, Catherine
    PROCEEDINGS OF THE 2020 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2020, : 80 - 90