A Systematic Evaluation of Backdoor Attacks in Various Domains

Book Chapter (2023)
Authors

Stefanos Koffas (TU Delft - Cyber Security)

Behrad Tajalli (Radboud Universiteit Nijmegen)

J. Xu (TU Delft - Cyber Security)

Mauro Conti (TU Delft - Cyber Security, UniversitĂ  degli Studi di Padova)

Stjepan Picek (Radboud Universiteit Nijmegen, TU Delft - Cyber Security)

Research Group
Cyber Security
To reference this document use:
https://doi.org/10.1007/978-3-031-40677-5_20
More Info
expand_more
Publication Year
2023
Language
English
Research Group
Cyber Security
Pages (from-to)
519-552
ISBN (print)
9783031406768
ISBN (electronic)
9783031406775
DOI:
https://doi.org/10.1007/978-3-031-40677-5_20
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Deep learning found its place in various real-world applications, where many also have security requirements. Unfortunately, as these systems become more pervasive, understanding how they fail becomes more challenging. While there are multiple failure modes in machine learning, one category received significant attention in the last few years-backdoor attacks. Backdoor attacks aim to make a model misclassify some of its inputs to a preset-specific label while other classification results would behave normally. While many works investigate various backdoor attacks and defenses for different domains, no works aim to provide a systematic comparison of backdoor attacks for different scenarios. This work considers backdoor attacks in image, sound, text, and graph domains and provides a comparative analysis of their respective strengths.

Files

978-3-031-40677-5_20.pdf
(pdf | 1.91 Mb)
- Embargo expired in 17-02-2025
License info not available