2022
DOI: 10.1109/tip.2022.3201472
|View full text |Cite
|
Sign up to set email alerts
|

Poison Ink: Robust and Invisible Backdoor Attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
3
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 33 publications
(8 citation statements)
references
References 44 publications
0
8
0
Order By: Relevance
“…This survey identifies purportedly 22 handcrafted and 25 optimized backdoor attacks with an implementation on a DNN found in a FRS (see Tables 1-3). Prior work addresses this problem with dynamic, patchbased backdoor attacks, as illustrated on a FR model by Salem et al [116] or the Poison Ink attack [84]. Dynamic triggers aim to enhance the stealthiness of a backdoor by confusing defenses that are designed to reconstruct a backdoor trigger (see Section V for trigger reconstruction defenses).…”
Section: ) Design: Handcrafted or Optimized Triggersmentioning
confidence: 99%
“…This survey identifies purportedly 22 handcrafted and 25 optimized backdoor attacks with an implementation on a DNN found in a FRS (see Tables 1-3). Prior work addresses this problem with dynamic, patchbased backdoor attacks, as illustrated on a FR model by Salem et al [116] or the Poison Ink attack [84]. Dynamic triggers aim to enhance the stealthiness of a backdoor by confusing defenses that are designed to reconstruct a backdoor trigger (see Section V for trigger reconstruction defenses).…”
Section: ) Design: Handcrafted or Optimized Triggersmentioning
confidence: 99%
“…In terms of the trigger generation function, g 1 could take the benign sample x 0 as one of the input arguments to generate sample-specific trigger. For example, Poison ink [229] extracted a black and white edge image from one benign image, then colorized the edge image with a particular color as the trigger. Since the edge image is specific for each benign image, the trigger is also sample-specific.…”
Section: Backdoor Attacks With Different Fusion Strategiesmentioning
confidence: 99%
“…This method achieves promising experimental results showing that it can bypass most existing backdoor defenses because its triggering pattern is sample specific. Zhang et al [41] proposed embedding trigger patterns in the edge structure of poisoned images, which belong to highfrequency components and are not easily destroyed in data preprocessing. This method is called Poison Ink.…”
Section: B Invisible Backdoor Attackmentioning
confidence: 99%