Clean-image backdoor: Attacking multi-label models with poisoned labels only
Multi-label models have been widely used in various applications including image
annotation and object detection. The fly in the ointment is its inherent vulnerability to …
annotation and object detection. The fly in the ointment is its inherent vulnerability to …
Watch out! simple horizontal class backdoor can trivially evade defense
All current backdoor attacks on deep learning (DL) models fall under the category of a
vertical class backdoor (VCB). In VCB attacks, any sample from a class activates the …
vertical class backdoor (VCB). In VCB attacks, any sample from a class activates the …
Django: Detecting trojans in object detection models via gaussian focus calibration
Object detection models are vulnerable to backdoor or trojan attacks, where an attacker can
inject malicious triggers into the model, leading to altered behavior during inference. As a …
inject malicious triggers into the model, leading to altered behavior during inference. As a …
[HTML][HTML] A qualitative AI security risk assessment of autonomous vehicles
This paper systematically analyzes the security risks associated with artificial intelligence
(AI) components in autonomous vehicles (AVs). Given the increasing reliance on AI for …
(AI) components in autonomous vehicles (AVs). Given the increasing reliance on AI for …
Tijo: Trigger inversion with joint optimization for defending multimodal backdoored models
Abstract We present a Multimodal Backdoor defense technique TIJO (Trigger Inversion
using Joint Optimization). Recently Walmer et al. demonstrated successful backdoor attacks …
using Joint Optimization). Recently Walmer et al. demonstrated successful backdoor attacks …
Finding naturally occurring physical backdoors in image datasets
E Wenger, R Bhattacharjee… - Advances in …, 2022 - proceedings.neurips.cc
Extensive literature on backdoor poison attacks has studied attacks and defenses for
backdoors using “digital trigger patterns.” In contrast,“physical backdoors” use physical …
backdoors using “digital trigger patterns.” In contrast,“physical backdoors” use physical …
Versatile Backdoor Attack with Visible, Semantic, Sample-Specific, and Compatible Triggers
Deep neural networks (DNNs) can be manipulated to exhibit specific behaviors when
exposed to specific trigger patterns, without affecting their performance on benign samples …
exposed to specific trigger patterns, without affecting their performance on benign samples …
[HTML][HTML] Security threats to agricultural artificial intelligence: Position and perspective
In light of their remarkable predictive capabilities, artificial intelligence (AI) models driven by
deep learning (DL) have witnessed widespread adoption in the agriculture sector …
deep learning (DL) have witnessed widespread adoption in the agriculture sector …
Macab: Model-agnostic clean-annotation backdoor to object detection with natural trigger in real-world
Object detection is the foundation of various critical computer-vision tasks such as
segmentation, object tracking, and event detection. To train an object detector with …
segmentation, object tracking, and event detection. To train an object detector with …
Horizontal class backdoor to deep learning
All existing backdoor attacks to deep learning (DL) models belong to the vertical class
backdoor (VCB). That is, any sample from a class will activate the implanted backdoor in the …
backdoor (VCB). That is, any sample from a class will activate the implanted backdoor in the …