Sponge Attack Against Multi-Exit Networks With Data Poisoning

被引:0
|
作者
Huang, Benxuan [1 ]
Pang, Lihui [2 ]
Fu, Anmin [1 ]
Al-Sarawi, Said F. [3 ]
Abbott, Derek [3 ]
Gao, Yansong [4 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Cyber Sci & Engn, Nanjing 210094, Peoples R China
[2] Shenzhen Technol Univ, Sino German Coll Intelligent Mfg, Shenzhen 518118, Peoples R China
[3] Univ Adelaide, Sch Elect & Elect Engn, Adelaide, SA 5005, Australia
[4] CSIROs Data61, Sydney, NSW 2113, Australia
关键词
Training; Data models; Computational modeling; Perturbation methods; Object detection; Optimization; Meteorology; Data integrity; Machine learning; Computer network management; Data poisoning; sponge attack; multi-exit network; machine learning;
D O I
10.1109/ACCESS.2024.3370849
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The motivation for the development of multi-exit networks (MENs) lies in the desire to minimize the delay and energy consumption associated with the inference phase. Moreover, MENs are designed to expedite predictions for easily identifiable inputs by allowing them to exit the network prematurely, thereby reducing the computational burden due to challenging inputs. Nevertheless, there is a lack of comprehensive understanding regarding the security vulnerabilities inherent in MENs. In this study, we introduce a novel approach called the sponge attack, which aims to compromise the fundamental advantages of MENs that allow easily identifiable images to leave in early exits. By employing data poisoning techniques, we frame the sponge attack as an optimization problem that empowers an attacker to select a specific trigger, such as adverse weather conditions (e.g., raining), to compel inputs to traverse the complete network layers of the MEN (e.g., in the context of traffic sign recognition) instead of early-exits when the trigger condition is met. Remarkably, our attack has the capacity to increase inference latency, while maintaining the classification accuracy even in the presence of a trigger, thus operating discreetly. Extensive experimentation on three diverse natural datasets (CIFAR100, GTSRB, and STL10), each trained with three prominent MEN architectures (VGG16, ResNet56, and MSDNet), validates the efficacy of our attack in terms of latency augmentation and its effectiveness in preserving classification accuracy under trigger conditions.
引用
收藏
页码:33843 / 33851
页数:9
相关论文
共 50 条
  • [41] Robustifying Vision Transformer for Image Forgery Localization with Multi-Exit Architectures
    Shi, Zenan
    Chen, Haipeng
    Dong, Zhang
    SSRN, 2023,
  • [42] NEO-KD: Knowledge-Distillation-Based Adversarial Training for Robust Multi-Exit Neural Networks
    Ham, Seokil
    Park, Jungwuk
    Han, Dong-Jun
    Moon, Jaekyun
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 36 (NEURIPS 2023), 2023,
  • [43] Layout effects of multi-exit ticket-inspectors on pedestrian evacuation
    Liao, Weichen
    Zheng, Xiaoping
    Cheng, Lisheng
    Zhao, Ying
    Cheng, Yuan
    Wang, Yafei
    SAFETY SCIENCE, 2014, 70 : 1 - 8
  • [44] COST AWARE UNTARGETED POISONING ATTACK AGAINST GRAPH NEURAL NETWORKS
    Han, Yuwei
    Lai, Yuni
    Zhu, Yulin
    Zhou, Kai
    2024 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, ICASSP 2024, 2024, : 4940 - 4944
  • [45] Data Poisoning Attack against Recommender System Using Incomplete and Perturbed Data
    Zhang, Hengtong
    Tian, Changxin
    Li, Yaliang
    Su, Lu
    Yang, Nan
    Zhao, Wayne Xin
    Gao, Jing
    KDD '21: PROCEEDINGS OF THE 27TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2021, : 2154 - 2164
  • [46] Distillation-Based Multi-exit Fully Convolutional Network for Visual Tracking
    Ma, Ding
    Wu, Xiangqian
    PATTERN RECOGNITION AND COMPUTER VISION, PT I, 2021, 13019 : 329 - 341
  • [47] Simulation study on evacuation considering hazard information transmission in multi-exit scenario
    Wu L.
    Huo F.
    Zhang Q.
    Fan D.
    Lü Z.
    Xitong Gongcheng Lilun yu Shijian/System Engineering Theory and Practice, 2023, 43 (03): : 929 - 940
  • [48] Practical Data Poisoning Attack against Next-Item Recommendation
    Zhang, Hengtong
    Li, Yaliang
    Ding, Bolin
    Gao, Jing
    WEB CONFERENCE 2020: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW 2020), 2020, : 2458 - 2464
  • [49] Multi-Exit DNN Inference Acceleration Based on Multi-Dimensional Optimization for Edge Intelligence
    Dong, Fang
    Wang, Huitian
    Shen, Dian
    Huang, Zhaowu
    He, Qiang
    Zhang, Jinghui
    Wen, Liangsheng
    Zhang, Tingting
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2023, 22 (09) : 5389 - 5405
  • [50] Multi-exit Evacuation Strategy Based on Particle Swarm Optimization with Background Field
    Zhang L.-J.
    Liu J.-C.
    Tan S.-B.
    Dongbei Daxue Xuebao/Journal of Northeastern University, 2019, 40 (09): : 1222 - 1227