2020
DOI: 10.1007/978-3-030-66415-2_4
|View full text |Cite
|
Sign up to set email alerts
|

Deep k-NN Defense Against Clean-Label Data Poisoning Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
43
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 69 publications
(43 citation statements)
references
References 14 publications
0
43
0
Order By: Relevance
“…Inspecting Offline Data Poisoning. Some backdoor defenses [12,24,25,46] must inspect a poisoned offline dataset to mitigate backdoor attacks, which is not required by NTD. However, the user can indeed use NTD to detect trigger samples from the dataset when the entire training dataset is under access and perform rigorous human inspection against the detected samples to recover the trigger.…”
Section: Discussionmentioning
confidence: 99%
“…Inspecting Offline Data Poisoning. Some backdoor defenses [12,24,25,46] must inspect a poisoned offline dataset to mitigate backdoor attacks, which is not required by NTD. However, the user can indeed use NTD to detect trigger samples from the dataset when the entire training dataset is under access and perform rigorous human inspection against the detected samples to recover the trigger.…”
Section: Discussionmentioning
confidence: 99%
“…Previous defenses against data poisoning [55,40,42] have relied mainly on data sanitization, i.e. trying to find and remove poisons by outlier detection (often in feature space).…”
Section: Deficiencies Of Defense Strategiesmentioning
confidence: 99%
“…Defenses aim to sanitize training data of poisons by detecting outliers (often in feature space), and removing or relabeling these points [55,40,42]. In some cases, these defenses are in the setting of general performance degrading attacks, while others deal with targeted attacks.…”
Section: E1 Deficiencies Of Filtering Defensesmentioning
confidence: 99%
See 1 more Smart Citation
“…Subsequent backdoor attacks produce poison examples which don't visibly contain the trigger [3,22,27]. Poisoning attacks have also precipitated several defense strategies, but sanitization-based defenses may be overwhelmed by some attacks [2,10,15,21].…”
Section: A Synopsis Of Triggerless and Backdoor Data Poisoningmentioning
confidence: 99%