• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Yin, Jia-Li (Yin, Jia-Li.) [1] (Scholars:印佳丽) | Wang, Weijian (Wang, Weijian.) [2] | Lyhwa (Lyhwa.) [3] | Lin, Wei (Lin, Wei.) [4] | Liu, Ximeng (Liu, Ximeng.) [5] (Scholars:刘西蒙)

Indexed by:

CPCI-S

Abstract:

Backdoor attacks and adversarial attacks are two major security threats to deep neural networks (DNNs), with the former one is a training-time data poisoning attack that aims to implant backdoor triggers into models by injecting trigger patterns into training samples, and the latter one is a testing-time attack trying to generate adversarial examples (AEs) from benign images to mislead a well-trained model. While previous works generally treat these two attacks separately, the inherent connection between these two attacks is rarely explored. In this paper, we focus on bridging backdoor and adversarial attacks and observe two intriguing phenomena when applying adversarial attacks on an infected model implanted with backdoors: 1) the sample is harder to be turned into an AE when the trigger is presented; 2) the AEs generated from backdoor samples are highly likely to be predicted as its true labels. Inspired by these observations, we proposed a novel backdoor defense method, dubbed Adversarial-Inspired Backdoor Defense (AIBD), to isolate the backdoor samples by leveraging a progressive top-q scheme and break the correlation between backdoor samples and their target labels using adversarial labels. Through extensive experiments on various datasets against six state-of-the-art backdoor attacks, the AIBD-trained models on poisoned data demonstrate superior performance over the existing defense methods.

Keyword:

Community:

  • [ 1 ] [Yin, Jia-Li]Fujian Prov Key Lab Informat Secur & Network Syst, Fuzhou 350108, Peoples R China
  • [ 2 ] [Wang, Weijian]Fujian Prov Key Lab Informat Secur & Network Syst, Fuzhou 350108, Peoples R China
  • [ 3 ] [Yin, Jia-Li]Fuzhou Univ, Coll Comp & Data Sci, Fuzhou 350118, Peoples R China
  • [ 4 ] [Wang, Weijian]Fuzhou Univ, Coll Comp & Data Sci, Fuzhou 350118, Peoples R China
  • [ 5 ] [Lyhwa]Fuzhou Univ, Coll Comp & Data Sci, Fuzhou 350118, Peoples R China
  • [ 6 ] [Liu, Ximeng]Fuzhou Univ, Coll Comp & Data Sci, Fuzhou 350118, Peoples R China
  • [ 7 ] [Lin, Wei]Fujian Prov Key Lab Big Data Min & Applicat, Fuzhou 350118, Peoples R China
  • [ 8 ] [Lin, Wei]Fujian Univ Technol, Coll Comp Sci & Math, Fuzhou 350118, Peoples R China
  • [ 9 ] [Liu, Ximeng]CTIHE, Lion Rock Labs Cyberspace Secur, Hong Kong, Peoples R China

Reprint 's Address:

  • 待查

    [Lyhwa]Fuzhou Univ, Coll Comp & Data Sci, Fuzhou 350118, Peoples R China;;[Lin, Wei]Fujian Prov Key Lab Big Data Min & Applicat, Fuzhou 350118, Peoples R China;;[Lin, Wei]Fujian Univ Technol, Coll Comp Sci & Math, Fuzhou 350118, Peoples R China

Show more details

Related Keywords:

Related Article:

Source :

THIRTY-NINTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, AAAI-25, VOL 39 NO 9

ISSN: 2159-5399

Year: 2025

Page: 9508-9516

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 0

Online/Total:1135/14093288
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1