2022 IEEE 38th International Conference on Data Engineering (ICDE) 2022
DOI: 10.1109/icde53745.2022.00100
|View full text |Cite
|
Sign up to set email alerts
|

Towards Backdoor Attack on Deep Learning based Time Series Classification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 40 publications
0
3
0
Order By: Relevance
“…The reported average fooling rate is meticulously computed by aggregating outcomes from comprehensive experiments, encompassing all datasets explored and the application of algorithms across diverse DL models. The findings indicate that TimeTrojanDE [13] achieved a notable average fooling rate of 92.5%. TSBA [12] displayed a higher efficacy with a fooling rate of 99.07%, and TrojanFlow [11] was similarly effective, achieving a fooling rate of 99.65%.…”
Section: B Results and Discussionmentioning
confidence: 92%
See 2 more Smart Citations
“…The reported average fooling rate is meticulously computed by aggregating outcomes from comprehensive experiments, encompassing all datasets explored and the application of algorithms across diverse DL models. The findings indicate that TimeTrojanDE [13] achieved a notable average fooling rate of 92.5%. TSBA [12] displayed a higher efficacy with a fooling rate of 99.07%, and TrojanFlow [11] was similarly effective, achieving a fooling rate of 99.65%.…”
Section: B Results and Discussionmentioning
confidence: 92%
“…Even state-of-the-art computational configurations, bolstered by multiple GPU resources, experienced memory overflows when employing this approach for trigger generation on large and complex datasets, according to our rigorous empirical investigation. In [13], the authors proposed the TimeTrojan-DE algorithm, which also employs a generative approach to produce the trojan trigger for a white-box attack and incorporates an evolutionary algorithm aiming to decrease the number of iterations required to generate optimized triggers. Nevertheless, the authors highlighted that as the search space expands, the efficiency of the algorithm diminishes.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…LSTM, zaman serileri, ses ve metin gibi sıralı verileri işlemek için özel olarak tasarlanmış tekrarlı sinir ağı modelidir [42]. LSTM, sıralı verilerdeki uzun vadeli bağımlılıkları öğrenme yeteneğine sahiptir.…”
Section: Kullanılan Yöntemlerunclassified
“…However, there is no existing study on trojan attacks specifically targeting DL models working with time series data (TSD) in the SG. Despite the sparse research on trojan attacks in TSD unrelated to the complex event spectrum of SG, our comprehensive empirical analysis reveals that the methodologies proposed in these studies [11], [12] strain computational resources and cause memory overflows when applied to datasets with large numbers of samples and time steps as well as become less efficient as the search space widens [13]. Therefore, this paper aims to address this gap by proposing a novel approach for generating highly effective trojan attacks on DL models that use TSD in the SG.…”
Section: Introductionmentioning
confidence: 99%