Deep neural networks (DNNs) are widely deployed today, from image classification to voice recognition to natural language processing. However, DNNs are opaque mathematical models that do not present logical explanations of their behaviors. This lack of transparency in DNN models can lead to certain unexpected and unpredictable behaviors that could be exploited by attackers. Prior works have demonstrated a series of attacks on DNN models. One particular attack is backdoor attack. By poisoning the training data, backdoor attacks seek to embed hidden malicious behaviors inside DNN models. The malicious behaviors are only activated when a "trigger'" is present in inputs. Triggers are specific patterns in inputs chosen by the attacker, e.g. sti...
Backdoor attacks mislead machine-learning models to output an attacker-specified class when presente...
Backdoor attacks are a serious security threat to open-source and outsourced development of computat...
Deep Neural Networks are well known to be vulnerable to adversarial attacks and backdoor attacks, wh...
Deep neural networks (DNNs) are widely deployed today, from image classification to voice recognitio...
Deep learning has made tremendous success in the past decade. As a result, it is becoming widely dep...
Together with impressive advances touching every aspect of our society, AI technology based on Deep ...
This electronic version was submitted by the student author. The certified thesis is available in th...
Deep neural network (DNN) has progressed rapidly during the past decade and DNN models have been dep...
Backdoor attacks are a serious security threat to open-source and outsourced development of computat...
Deep neural networks (DNNs), while accurate, are expensive to train. Many practitioners, therefore, ...
Backdoor attacks are rapidly emerging threats to deep neural networks (DNNs). In the backdoor attack...
We present a novel defense, against backdoor attacks on Deep Neural Networks (DNNs), wherein adversa...
One major goal of the AI security community is to securely and reliably produce and deploy deep lear...
Backdoors are powerful attacks against deep neural networks (DNNs). By poisoning training data, atta...
With the success of deep learning algorithms in various domains, studying adversarial attacks to sec...
Backdoor attacks mislead machine-learning models to output an attacker-specified class when presente...
Backdoor attacks are a serious security threat to open-source and outsourced development of computat...
Deep Neural Networks are well known to be vulnerable to adversarial attacks and backdoor attacks, wh...
Deep neural networks (DNNs) are widely deployed today, from image classification to voice recognitio...
Deep learning has made tremendous success in the past decade. As a result, it is becoming widely dep...
Together with impressive advances touching every aspect of our society, AI technology based on Deep ...
This electronic version was submitted by the student author. The certified thesis is available in th...
Deep neural network (DNN) has progressed rapidly during the past decade and DNN models have been dep...
Backdoor attacks are a serious security threat to open-source and outsourced development of computat...
Deep neural networks (DNNs), while accurate, are expensive to train. Many practitioners, therefore, ...
Backdoor attacks are rapidly emerging threats to deep neural networks (DNNs). In the backdoor attack...
We present a novel defense, against backdoor attacks on Deep Neural Networks (DNNs), wherein adversa...
One major goal of the AI security community is to securely and reliably produce and deploy deep lear...
Backdoors are powerful attacks against deep neural networks (DNNs). By poisoning training data, atta...
With the success of deep learning algorithms in various domains, studying adversarial attacks to sec...
Backdoor attacks mislead machine-learning models to output an attacker-specified class when presente...
Backdoor attacks are a serious security threat to open-source and outsourced development of computat...
Deep Neural Networks are well known to be vulnerable to adversarial attacks and backdoor attacks, wh...