April 22, 2024, 4:11 a.m. | Beichen Li, Yuanfang Guo, Heqi Peng, Yangxi Li, Yunhong Wang

cs.CR updates on arXiv.org arxiv.org

arXiv:2404.12852v1 Announce Type: new
Abstract: Deep neural networks are vulnerable to backdoor attacks. Among the existing backdoor defense methods, trigger reverse engineering based approaches, which reconstruct the backdoor triggers via optimizations, are the most versatile and effective ones compared to other types of methods. In this paper, we summarize and construct a generic paradigm for the typical trigger reverse engineering process. Based on this paradigm, we propose a new perspective to defeat trigger reverse engineering by manipulating the classification confidence …

arxiv attacks backdoor backdoor attacks cs.cr cs.cv cs.lg defense engineering framework networks neural networks poisoning reverse reverse engineering trigger types vulnerable

Financial Crimes Compliance - Senior - Consulting - Location Open

@ EY | New York City, US, 10001-8604

Software Engineer - Cloud Security

@ Neo4j | Malmö

Security Consultant

@ LRQA | Singapore, Singapore, SG, 119963

Identity Governance Consultant

@ Allianz | Sydney, NSW, AU, 2000

Educator, Cybersecurity

@ Brain Station | Toronto

Principal Security Engineer

@ Hippocratic AI | Palo Alto