2018 13th International Conference on Malicious and Unwanted Software (MALWARE) 2018
DOI: 10.1109/malware.2018.8659362
|View full text |Cite
|
Sign up to set email alerts
|

Resilience of Pruned Neural Network Against Poisoning Attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…There exists work [56,27] attempting to directly mitigate the backdoor attack without inspecting the model behavior. The key technique behind these methods is to compress the model (e.g., by model pruning or similar techniques) or fine-tune the model with benign inputs to alter the model behavior hoping that the backdoor behavior is eliminated.…”
Section: Pre-deployment Techniques No Inspectionsmentioning
confidence: 99%
See 1 more Smart Citation
“…There exists work [56,27] attempting to directly mitigate the backdoor attack without inspecting the model behavior. The key technique behind these methods is to compress the model (e.g., by model pruning or similar techniques) or fine-tune the model with benign inputs to alter the model behavior hoping that the backdoor behavior is eliminated.…”
Section: Pre-deployment Techniques No Inspectionsmentioning
confidence: 99%
“…The key technique behind these methods is to compress the model (e.g., by model pruning or similar techniques) or fine-tune the model with benign inputs to alter the model behavior hoping that the backdoor behavior is eliminated. Specifically, Zhao et al [56] found that model pruning can remove some behaviors of a trained model, and potentially it can remove the backdoor of the model if pruning is purely using benign data.…”
Section: Pre-deployment Techniques No Inspectionsmentioning
confidence: 99%
“…Finally, the authors devised a methodology for trojan detection by investigating the simulations of multiple types of embedded trojans. In comparison to previous work, the trojan detection approach is an extension of the observation in [ 12 ] about pruned NNs having a higher resilience against adding malicious triggers. Thus, two identical models, one with and one without embedded trojan, will have different inefficiency/utilization measured by the modified KL divergence.…”
Section: Introductionmentioning
confidence: 99%