Differential analysis of triggers and benign features for black-box DNN backdoor detection
IEEE Transactions on Information Forensics and Security, 2023•ieeexplore.ieee.org
This paper proposes a data-efficient detection method for deep neural networks against
backdoor attacks under a black-box scenario. The proposed approach is motivated by the
intuition that features corresponding to triggers have a higher influence in determining the
backdoored network output than any other benign features. To quantitatively measure the
effects of triggers and benign features on determining the backdoored network output, we
introduce five metrics. To calculate the five-metric values for a given input, we first generate …
backdoor attacks under a black-box scenario. The proposed approach is motivated by the
intuition that features corresponding to triggers have a higher influence in determining the
backdoored network output than any other benign features. To quantitatively measure the
effects of triggers and benign features on determining the backdoored network output, we
introduce five metrics. To calculate the five-metric values for a given input, we first generate …
This paper proposes a data-efficient detection method for deep neural networks against backdoor attacks under a black-box scenario. The proposed approach is motivated by the intuition that features corresponding to triggers have a higher influence in determining the backdoored network output than any other benign features. To quantitatively measure the effects of triggers and benign features on determining the backdoored network output, we introduce five metrics. To calculate the five-metric values for a given input, we first generate several synthetic samples by injecting the input’s partial contents into clean validation samples. Then, the five metrics are computed by using the output labels of the corresponding synthetic samples. One contribution of this work is the use of a tiny clean validation dataset. Having the computed five metrics, five novelty detectors are trained from the validation dataset. A meta novelty detector fuses the output of the five trained novelty detectors to generate a meta confidence score. During online testing, our method determines if online samples are poisoned or not via assessing their meta confidence scores output by the meta novelty detector. We show the efficacy of our methodology through a broad range of backdoor attacks, including ablation studies and comparison to existing approaches. Our methodology is promising since the proposed five metrics quantify the inherent differences between clean and poisoned samples. Additionally, our detection method can be incrementally improved by appending more metrics that may be proposed to address future advanced attacks. Code is available at https://github.com/fu1001hao/Five-Metrics-Detector.git .
ieeexplore.ieee.org