2022
DOI: 10.1109/tr.2022.3159784
|View full text |Cite
|
Sign up to set email alerts
|

Model Agnostic Defence Against Backdoor Attacks in Machine Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 34 publications
(18 citation statements)
references
References 20 publications
0
17
0
Order By: Relevance
“…Due to the emerging threat of backdoor attacks, several kinds of defenses have been proposed. These roughly belong to the following categories : (1) Input preprocessing [25,26,27,28]: This kind of defense introduces a preprocessing module with the intent of damaging the trigger pattern before passing it into the DNN. (2) Detection based defense [29,30,31,32,33]: The aim here is to detect the presence of possible malicious samples or backdoored models.…”
Section: Backdoor Defensementioning
confidence: 99%
“…Due to the emerging threat of backdoor attacks, several kinds of defenses have been proposed. These roughly belong to the following categories : (1) Input preprocessing [25,26,27,28]: This kind of defense introduces a preprocessing module with the intent of damaging the trigger pattern before passing it into the DNN. (2) Detection based defense [29,30,31,32,33]: The aim here is to detect the presence of possible malicious samples or backdoored models.…”
Section: Backdoor Defensementioning
confidence: 99%
“…In the first stage, February uses GradCAM [61] to identify regions of influence, generating heatmaps to illustrate important regions in the input that contribute significantly to the learned features. In the second stage, a GAN-based inpainting method is employed to reconstruct the masked regions.Based on this idea, Udeshi et al [62] also designed a square trigger interceptor using the dominant color in the image to locate and remove backdoor triggers.…”
Section: A Dataset-based Defense Strategiesmentioning
confidence: 99%
“…The goal is to obtain true label of every test image on the fly, with only access to the hard-label predictions of that image. Test-time image transformations [14,36,35] and heuristic trigger search in image space [43] do not work well.…”
Section: Related Workmentioning
confidence: 99%
“…Simply applying testtime image transformations [14,36,35] without model retraining compromises the model's accuracy on clean inputs [37]. Heuristic trigger search in image space [43] does not scale to complex triggers or high image resolution.…”
Section: Introductionmentioning
confidence: 99%