2020
DOI: 10.48550/arxiv.2007.08142
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Odyssey: Creation, Analysis and Detection of Trojan Models

Abstract: Along with the success of deep neural network (DNN) models in solving various real world problems, rise the threats to these models that aim to degrade their integrity. Trojan attack is one of the recent variant of data poisoning attacks that involves manipulation or modification of the model to act balefully. This can occur when an attacker interferes with the training pipeline by inserting triggers into some of the training samples and trains the model to act maliciously only for samples that are stamped wit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 33 publications
(37 reference statements)
0
3
0
Order By: Relevance
“…The top algorithms of it are: Random Forest, Decision Trees, Logistic Regression, Support Vector Machines. Convolutional Neural Networks (CNN) by Al-Saffar et al (2017); Edraki et al (2020), Recurrent Neural Network (RNN) by Sak et al (2014), Long Short-Term Memory (LSTM) by Sak et al (2014), Multilayer perceptron (MLP). These are the types of DL that are generally trained as supervised methods.…”
Section: Supervised Learningmentioning
confidence: 99%
“…The top algorithms of it are: Random Forest, Decision Trees, Logistic Regression, Support Vector Machines. Convolutional Neural Networks (CNN) by Al-Saffar et al (2017); Edraki et al (2020), Recurrent Neural Network (RNN) by Sak et al (2014), Long Short-Term Memory (LSTM) by Sak et al (2014), Multilayer perceptron (MLP). These are the types of DL that are generally trained as supervised methods.…”
Section: Supervised Learningmentioning
confidence: 99%
“…The attack is insidious since the Trojan trigger is only known to the attacker; the model outputs the correct label when the trigger is absent. Other state-of-the-art Trojan insertion methods are proposed in [9,22,34,51,4]. Inserting Trojans using transfer learning [46] or retraining [25] has been demonstrated.…”
Section: Related Workmentioning
confidence: 99%
“…The state-of-the-art Trojan insertion methods [12,32,44,63,17,8,17] use a minuscule amount of data poisoned with the Trojan trigger pattern (e.g., a local patch, a filter with specific settings). Alternative methods inject Trojans through transfer learning [58], retraining a DNN [35], direct manipulation of DNN weights [11,43], or addition of malicious modules [50].…”
Section: Adversarial Trojan Attacks and Defensesmentioning
confidence: 99%