Annual Computer Security Applications Conference 2020
DOI: 10.1145/3427228.3427264
|View full text |Cite
|
Sign up to set email alerts
|

Februus: Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

3
116
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 137 publications
(119 citation statements)
references
References 24 publications
3
116
0
Order By: Relevance
“…Typically, a Grey-box setting is assumed, where our attacker has control over a small percentage of training data (typically less than 2%), and no knowledge of either the network architecture, or the defense parameters. Our threat model is consistent with many state-of-the-art attacks/defenses [12], [20], [28], [40], [41], including those considered in this paper. Fig.…”
Section: Threat Models and Assumptionssupporting
confidence: 65%
See 3 more Smart Citations
“…Typically, a Grey-box setting is assumed, where our attacker has control over a small percentage of training data (typically less than 2%), and no knowledge of either the network architecture, or the defense parameters. Our threat model is consistent with many state-of-the-art attacks/defenses [12], [20], [28], [40], [41], including those considered in this paper. Fig.…”
Section: Threat Models and Assumptionssupporting
confidence: 65%
“…is to detect and/or recover a poisoned network/input without affecting the performance on the test set [12], [17], [41].…”
Section: Threat Models and Assumptionsmentioning
confidence: 99%
See 2 more Smart Citations
“…The reported hardware vulnerabilities and successful attacks raise increasing concerns that shatter the trustworthiness of ML systems. As opposed to mitigation approaches developed for software-oriented attacks [179]- [181], defense methodologies against hardware-based ML attacks are still in the nascent stage of development. Edge devices such as smartphone, automobiles, robots, drones, cameras, etc.…”
Section: Defenses and Countermeasuresmentioning
confidence: 99%