2021
DOI: 10.48550/arxiv.2109.05507
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Check Your Other Door! Creating Backdoor Attacks in the Frequency Domain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…optimized the backdoor trigger function during the training process towards imperceptible trigger in the input space, while later works Zhong, Qian, and Zhang 2022) further made backdoors imperceptible in the latent space. Recent approaches (Wang et al 2021;Hammoud and Ghanem 2021) exploited the frequency domain for stealthy attacks.…”
Section: Previous Backdoor Attacksmentioning
confidence: 99%
“…optimized the backdoor trigger function during the training process towards imperceptible trigger in the input space, while later works Zhong, Qian, and Zhang 2022) further made backdoors imperceptible in the latent space. Recent approaches (Wang et al 2021;Hammoud and Ghanem 2021) exploited the frequency domain for stealthy attacks.…”
Section: Previous Backdoor Attacksmentioning
confidence: 99%
“…METHODOLOGY In images, high frequency signals encompass intricate details, while low frequency signals encapsulate broader features such as contours. Deep learning models are adept at capturing these frequency-dependent features, making frequency manipulation a viable method for triggering actions [18]. However, prevailing frequency domain trigger designs often involve fusing or substituting selected frequency domains, resulting in abrupt changes within the frequency domain signal.…”
Section: Introductionmentioning
confidence: 99%
“…First, the original palette of the image is compressed into a smaller palette by reducing the color depth. Then, image dithering techniques are used to enhance concealment by removing obvious artifacts by exploiting the existing colors of the artifacts.Most of the current work generates poisoned samples in the pixel domain, Hammoud and Ghanem[43] attempted to generate invisible trigger patterns in the frequency domain with success. After training the network naturally, they generated a Fourier heatmap of the model and analysed the sensitivity of the DNN to input perturbations through the Fourier heatmap.…”
mentioning
confidence: 99%