2020 Ieee Region 10 Conference (Tencon) 2020
DOI: 10.1109/tencon50793.2020.9293933
|View full text |Cite
|
Sign up to set email alerts
|

Blackbox Trojanising of Deep Learning Models: Using Non-Intrusive Network Structure and Binary Alterations

Abstract: Recent advancements in Artificial Intelligence namely inDeep Learning has heightened its adoption in many applications. Some are playing important roles to the extent that we are heavily dependent on them for our livelihood. However, as with all technologies, there are vulnerabilities that malicious actors could exploit. A form of exploitation is to turn these technologies, intended for good, to become dual-purposed instruments to support deviant acts like malicious software trojans. As part of proactive defen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 23 publications
0
5
0
Order By: Relevance
“…Since the behavior of a neural network can significantly change while appearing benign from the outside if only minimal model parameters are changed [172], [174]. These attacks can take the form of network structure modification [174], flipping weight bits [172], or subnet replacement [173].…”
Section: Access Controls Mechanism and Authentication Systemsmentioning
confidence: 99%
“…Since the behavior of a neural network can significantly change while appearing benign from the outside if only minimal model parameters are changed [172], [174]. These attacks can take the form of network structure modification [174], flipping weight bits [172], or subnet replacement [173].…”
Section: Access Controls Mechanism and Authentication Systemsmentioning
confidence: 99%
“…A summary of triggers for each attack is provided in Table 5 on Page 12. Huai et al [42] x x x Xue et al [30] x x x Xue et al [30] x x x Liu et al [43] x Hu et al [44] x x Lin et al [45] x x x Dai et al [46] x Zhao et al [47] x Liu et al [48] x Chen et al [49] x Tan et al [50] x x Tang et al [51] x Wu et al [52] x x Barni et al [53] x Xiong et al [54] x Kwon et al [55] x Chen et al [56] x x Chen et al [57] x x He et al [31] x x x Xue et al [58] x x x Yao et al [59] x x Quiring et al [60] x Bhalerao et al [61] x x x Costales et al [62] x x Kwon et al [63] x Liu et al [64] x x Rakin et al [65] x Liu et al [66] x x Zhou et al [67] x Zhu et al [68] x Gu et al [69] x Guo et al [70] x x x x Clements et al [71] x x Munoz et al [72] x x Li et al [73] x Li et al [74] x Xu et al [75] x x Venceslai et al [76] x Kwon et al [77] x Cole et al [78] x x x x Zeng et al [79] x x Pan [80] x x Garofalo et al…”
Section: Triggersmentioning
confidence: 99%
“…In the systematic review of Trojan attacks, papers that were published between 2020-2021 are [44,45,49,51,62,64,65,80]. Tang et al [51] proposed a training-free Trojan attack strategy in which a little Trojan module named TrojanNet is inserted into the target model.…”
Section: Trojansmentioning
confidence: 99%
See 1 more Smart Citation
“…At the Black box testing stage of the online Foam Product Production Monitoring System application, testing is carried out by running all the functions and features available from this application and then seeing whether the results of these functions are as expected, [15] Testing is carried out, using the assumption of not knowing the internal structure of the program (black box). Concentrate on finding conditions where the program does not run according to specifications (functional) using specifications for test data [16].…”
Section: Black Box Testmentioning
confidence: 99%