Use Procedural Noise to Achieve Backdoor Attack

被引:4
|
作者
Chen, Xuan [1 ]
Ma, Yuena [1 ]
Lu, Shiwei [1 ]
机构
[1] Air Force Engn Univ, Dept Base, Xian 710038, Peoples R China
关键词
Data models; Computational modeling; Training; Deep learning; Training data; Toxicology; Robustness; backdoor attack; procedural noise; global trigger;
D O I
10.1109/ACCESS.2021.3110239
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, more researchers pay their attention to the security of artificial intelligence. The backdoor attack is one of the threats and has a powerful, stealthy attack ability. There exist a growing trend towards the triggers is that become dynamic and global. In this paper, we propose a novel global backdoor trigger that is generated by procedural noise. Compared with most triggers, ours are much stealthy and straightforward to implement. In fact, there exist three types of procedural noise, and we evaluate the attack ability of triggers generated by them on the different classification datasets, including CIFAR-10, GTSRB, CelebA, and ImageNet12. The experiment results show that our attack approach can bypass most defense approaches, even for the inspections of humans. We only need poison 5%-10% training data, but the attack success rate(ASR) can reach over 99%. To test the robustness of the backdoor model against the corruption methods that in practice, we introduce 17 corruption methods and compute the accuracy, ASR of the backdoor model with them. The facts show that our backdoor model has strong robustness for most corruption methods, which means it can be applied in reality. Our code is available at https://github.com/928082786/pnoiseattack.
引用
收藏
页码:127204 / 127216
页数:13
相关论文
共 50 条
  • [1] Implementing a Multitarget Backdoor Attack Algorithm Based on Procedural Noise Texture Features
    Liu, Qian
    Kang, Chunying
    Zou, Qian
    Guan, Qiaochu
    IEEE ACCESS, 2024, 12 : 69539 - 69550
  • [2] Debiasing backdoor attack: A benign application of backdoor attack in eliminating data bias
    Wu, Shangxi
    He, Qiuyang
    Zhang, Yi
    Lu, Dongyuan
    Sang, Jitao
    INFORMATION SCIENCES, 2023, 643
  • [3] Stand-in Backdoor: A Stealthy and Powerful Backdoor Attack
    Li, Shuang
    Li, Hongwei
    Chen, Hanxiao
    2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [4] Shadow backdoor attack: Multi-intensity backdoor attack against federated learning
    Ren, Qixian
    Zheng, Yu
    Yang, Chao
    Li, Yue
    Ma, Jianfeng
    COMPUTERS & SECURITY, 2024, 139
  • [5] Transferable Graph Backdoor Attack
    Yang, Shuiqiao
    Doan, Bao Gia
    Montague, Paul
    De Vel, Olivier
    Abraham, Tamas
    Camtepe, Seyit
    Ranasinghe, Damith C.
    Kanhere, Salil S.
    PROCEEDINGS OF 25TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2022, 2022, : 321 - 332
  • [6] Dyn-Backdoor: Backdoor Attack on Dynamic Link Prediction
    Chen, Jinyin
    Xiong, Haiyang
    Zheng, Haibin
    Zhang, Jian
    Liu, Yi
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (01): : 525 - 542
  • [7] SIMTROJAN: STEALTHY BACKDOOR ATTACK
    Ren, Yankun
    Li, Longfei
    Zhou, Jun
    2021 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2021, : 819 - 823
  • [8] STEALTHY BACKDOOR ATTACK WITH ADVERSARIAL TRAINING
    Feng, Le
    Li, Sheng
    Qian, Zhenxing
    Zhang, Xinpeng
    2022 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2022, : 2969 - 2973
  • [9] Survey of Textual Backdoor Attack and Defense
    Zheng M.
    Lin Z.
    Liu Z.
    Fu P.
    Wang W.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (01): : 221 - 242
  • [10] Backdoor Attack With Sparse and Invisible Trigger
    Gao, Yinghua
    Li, Yiming
    Gong, Xueluan
    Li, Zhifeng
    Xia, Shu-Tao
    Wang, Qian
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 6364 - 6376