Encyclopedia of Cryptography, Security and Privacy 2021
DOI: 10.1007/978-3-642-27739-9_1654-1
|View full text |Cite
|
Sign up to set email alerts
|

Neural Trojans

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

2
49
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(51 citation statements)
references
References 26 publications
2
49
0
Order By: Relevance
“…1) Offline Trojan Model Detection and Fix: Works in [33], [34] suggested approaches to remove the Trojan behavior without first checking whether the model is Trojaned or not. Fine-tuning is used to remove potential Trojans by pruning carefully chosen parameters of the DNN model [33].…”
Section: B Trojan Defencesmentioning
confidence: 99%
“…1) Offline Trojan Model Detection and Fix: Works in [33], [34] suggested approaches to remove the Trojan behavior without first checking whether the model is Trojaned or not. Fine-tuning is used to remove potential Trojans by pruning carefully chosen parameters of the DNN model [33].…”
Section: B Trojan Defencesmentioning
confidence: 99%
“…Many defenses against backdoor attacks have been proposed. However, the existing defense works require high computational resources [4]- [6], a large number of clean images to retrain the model [7], or backdoor attack information such as trigger size [5], [8]. In practice, these requirements are difficult to be satisfied, which makes these defense methods infeasible in real-world scenarios.…”
Section: Introductionmentioning
confidence: 99%
“…For the later case, their success have been proved in classificationbased applications like object detection [3] and scene [4], face [5], and traffic sign recognition [6]. Despite being broadly used in these applications, the wide adoption of DNNs in real-world missions is still threatened by their ingrained security concerns (e.g., lack of integrity check mechanisms and their uncertain black-box nature [7], [8]), which make them vulnerable to trojan or backdoor attacks (hereinafter trojan attacks) [9]- [12].…”
Section: Introductionmentioning
confidence: 99%
“…Previous defensive strategies either harden DNNs by increasing their robustness against adversarial samples [7], [12], [13] or detect adversarial inputs at testing time [7], [8], [12], [14]. This research is in the former category.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation