Sponge Attack Against Multi-Exit Networks With Data Poisoning

被引:0
|
作者
Huang, Benxuan [1 ]
Pang, Lihui [2 ]
Fu, Anmin [1 ]
Al-Sarawi, Said F. [3 ]
Abbott, Derek [3 ]
Gao, Yansong [4 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Cyber Sci & Engn, Nanjing 210094, Peoples R China
[2] Shenzhen Technol Univ, Sino German Coll Intelligent Mfg, Shenzhen 518118, Peoples R China
[3] Univ Adelaide, Sch Elect & Elect Engn, Adelaide, SA 5005, Australia
[4] CSIROs Data61, Sydney, NSW 2113, Australia
关键词
Training; Data models; Computational modeling; Perturbation methods; Object detection; Optimization; Meteorology; Data integrity; Machine learning; Computer network management; Data poisoning; sponge attack; multi-exit network; machine learning;
D O I
10.1109/ACCESS.2024.3370849
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The motivation for the development of multi-exit networks (MENs) lies in the desire to minimize the delay and energy consumption associated with the inference phase. Moreover, MENs are designed to expedite predictions for easily identifiable inputs by allowing them to exit the network prematurely, thereby reducing the computational burden due to challenging inputs. Nevertheless, there is a lack of comprehensive understanding regarding the security vulnerabilities inherent in MENs. In this study, we introduce a novel approach called the sponge attack, which aims to compromise the fundamental advantages of MENs that allow easily identifiable images to leave in early exits. By employing data poisoning techniques, we frame the sponge attack as an optimization problem that empowers an attacker to select a specific trigger, such as adverse weather conditions (e.g., raining), to compel inputs to traverse the complete network layers of the MEN (e.g., in the context of traffic sign recognition) instead of early-exits when the trigger condition is met. Remarkably, our attack has the capacity to increase inference latency, while maintaining the classification accuracy even in the presence of a trigger, thus operating discreetly. Extensive experimentation on three diverse natural datasets (CIFAR100, GTSRB, and STL10), each trained with three prominent MEN architectures (VGG16, ResNet56, and MSDNet), validates the efficacy of our attack in terms of latency augmentation and its effectiveness in preserving classification accuracy under trigger conditions.
引用
收藏
页码:33843 / 33851
页数:9
相关论文
共 50 条
  • [1] Energy attack method for adaptive multi-exit neural networks
    Du, Dongfang
    Sha, Chaofeng
    Peng, Xin
    INFORMATION AND SOFTWARE TECHNOLOGY, 2025, 179
  • [2] Multi-Exit Semantic Segmentation Networks
    Kouris, Alexandros
    Venieris, Stylianos I.
    Laskaridis, Stefanos
    Lane, Nicholas
    COMPUTER VISION, ECCV 2022, PT XXI, 2022, 13681 : 330 - 349
  • [3] Prediction Privacy in Distributed Multi-Exit Neural Networks: Vulnerabilities and Solutions
    Kannan, Tejas
    Feamster, Nick
    Hoffmann, Henry
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 1123 - 1137
  • [4] Video Surveillance on Mobile Edge Networks: Exploiting Multi-Exit Network
    Cao, Yuchen
    Fu, Siming
    He, Xiaoxuan
    Hu, Haoji
    Shan, Hangguan
    Yu, Lu
    ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 6621 - 6626
  • [5] Self-supervised efficient sample weighting for multi-exit networks
    Liu, Kai
    Moon, Seungbin
    KNOWLEDGE-BASED SYSTEMS, 2023, 280
  • [6] Deep Feature Surgery: Towards Accurate and Efficient Multi-exit Networks
    Gong, Cheng
    Chen, Yao
    Luo, Qiuyang
    Lu, Ye
    Li, Tao
    Zhang, Yuzhi
    Sun, Yufei
    Zhang, Le
    COMPUTER VISION - ECCV 2024, PT XLIX, 2025, 15107 : 435 - 451
  • [7] An equational axiomatization for multi-exit iteration
    Aceto, L
    Fokkink, W
    INFORMATION AND COMPUTATION, 1997, 137 (02) : 121 - 158
  • [8] Detection with multi-exit asymmetric boosting
    Pham, Minh-Tri
    Hoang, Viet-Dung D.
    Cham, Tat-Jen
    2008 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, VOLS 1-12, 2008, : 3087 - 3094
  • [9] Research on Multi-exit Laboratory Safe Evacuation
    Wang, Hao
    Wu, Ling
    Wang, Songtao
    IAENG International Journal of Applied Mathematics, 2024, 54 (03) : 524 - 531
  • [10] A note on an expressiveness hierarchy for multi-exit iteration
    Aceto, L
    Fokkink, W
    Ingólfsdóttir, A
    INFORMATION PROCESSING LETTERS, 2003, 87 (01) : 17 - 23