2022
DOI: 10.1109/access.2022.3141077
|View full text |Cite
|
Sign up to set email alerts
|

A Feature-Based On-Line Detector to Remove Adversarial-Backdoors by Iterative Demarcation

Abstract: This paper proposes a novel feature-based on-line detection strategy, Removing Adversarial-Backdoors by Iterative Demarcation (RAID), for backdoor attacks. The proposed method is comprised of two parts: off-line training and on-line retraining. In the off-line training, a novelty detector and a shallow neural network are trained with clean validation data. During the on-line implementation, both models attempt to detect samples from the streaming data that differ from the validation data (i.e., flag likelypois… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 52 publications
0
4
0
Order By: Relevance
“…Similar to Spectral Signature [152] and Activation Clustering [132], the SCAn defense [131] extracts intermediary representations from a suspicious DNN as inputs to a separate outlier detection scheme. The Raid defense [154], meanwhile, decomposes a suspicious DNN into its feature extractor and classifier subnetworks and trains a new classifier atop the extractor using clean validation data. An outlier detection scheme then compares the predictions of the two classifiers given the same input feature representation.…”
Section: ) Data-based Backdoor Defensesmentioning
confidence: 99%
“…Similar to Spectral Signature [152] and Activation Clustering [132], the SCAn defense [131] extracts intermediary representations from a suspicious DNN as inputs to a separate outlier detection scheme. The Raid defense [154], meanwhile, decomposes a suspicious DNN into its feature extractor and classifier subnetworks and trains a new classifier atop the extractor using clean validation data. An outlier detection scheme then compares the predictions of the two classifiers given the same input feature representation.…”
Section: ) Data-based Backdoor Defensesmentioning
confidence: 99%
“…Closely related to backdoor detection is backdoor mitigation or erasure [23,26,31,43]. Techniques include randomized smoothing [58,69,70] and fine-pruning to remove the affected neurons [45,71].…”
Section: Backdoor Defensesmentioning
confidence: 99%
“…Chou et al [90] utilised saliency map for detecting potential triggers in the input, and then they filtered the samples containing the triggers. Li et al [111] claimed that it is not evidental that there Fu et al [123] recently proposed a novel feature-based on-line detection strategy for neural Trojans that is named Removing Adversarial-Backdoors by Iterative Demarcation (RAID). This is achieved in two stages, which are off-line training and on-line retraining.…”
Section: F Input Filteringmentioning
confidence: 99%