Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Aliasing Backdoor Attacks on Pre-trained Models

Full metadata record
DC Field Value Language
dc.contributor.authorWei, Cheng'an-
dc.contributor.authorLee, Yeonjoon-
dc.contributor.authorChen, Kai-
dc.contributor.authorMeng, Guozhu-
dc.contributor.authorLv, Peizhuo-
dc.date.accessioned2024-01-20T09:02:59Z-
dc.date.available2024-01-20T09:02:59Z-
dc.date.issued2023-08-
dc.identifier.issn0000-0000-
dc.identifier.urihttps://scholarworks.bwise.kr/erica/handle/2021.sw.erica/117847-
dc.description.abstractPre-trained deep learning models are widely used to train accurate models with limited data in a short time. To reduce computational costs, pre-trained neural networks often employ subsampling operations. However, recent studies have shown that these subsampling operations can cause aliasing issues, resulting in problems with generalization. Despite this knowledge, there is still a lack of research on the relationship between the aliasing of neural networks and security threats, such as adversarial attacks and backdoor attacks, which manipulate model predictions without the awareness of victims. In this paper, we propose the aliasing backdoor, a low-cost and data-free attack that threatens mainstream pre-trained models and transfers to all student models fine-tuned from them. The key idea is to create an aliasing error in the strided layers of the network and manipulate a benign input to a targeted intermediate representation. To evaluate the attack, we conduct experiments on image classification, face recognition, and speech recognition tasks. The results show that our approach can effectively attack mainstream models with a success rate of over 95%. Our research, based on the aliasing error caused by subsampling, reveals a fundamental security weakness of strided layers, which are widely used in modern neural network architectures. To the best of our knowledge, this is the first work to exploit the strided layers to launch backdoor attacks. © USENIX Security 2023. All rights reserved.-
dc.format.extent18-
dc.language영어-
dc.language.isoENG-
dc.publisherUSENIX Association-
dc.titleAliasing Backdoor Attacks on Pre-trained Models-
dc.typeArticle-
dc.publisher.location미국-
dc.identifier.scopusid2-s2.0-85172793291-
dc.identifier.bibliographicCitation32nd USENIX Security Symposium, USENIX Security 2023, v.4, pp 2707 - 2724-
dc.citation.title32nd USENIX Security Symposium, USENIX Security 2023-
dc.citation.volume4-
dc.citation.startPage2707-
dc.citation.endPage2724-
dc.type.docTypeConference paper-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.identifier.urlhttps://www.usenix.org/conference/usenixsecurity23/presentation/wei-chengan-
Files in This Item
Go to Link
Appears in
Collections
COLLEGE OF COMPUTING > ERICA 컴퓨터학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Yeon joon photo

Lee, Yeon joon
ERICA 소프트웨어융합대학 (ERICA 컴퓨터학부)
Read more

Altmetrics

Total Views & Downloads

BROWSE