z-logo
open-access-imgOpen Access
Backdoor Attacks on Image Classification Models in Deep Neural Networks
Author(s) -
ZHANG Quanxin,
MA Wencong,
WANG Yajie,
ZHANG Yaoyuan,
SHI Zhiwei,
LI Yuanzhang
Publication year - 2022
Publication title -
chinese journal of electronics
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.267
H-Index - 25
eISSN - 2075-5597
pISSN - 1022-4653
DOI - 10.1049/cje.2021.00.126
Subject(s) - backdoor , computer science , interpretability , artificial intelligence , artificial neural network , machine learning , feature (linguistics) , pattern recognition (psychology) , computer security , philosophy , linguistics
Deep neural network (DNN) is applied widely in many applications and achieves state‐of‐the‐art performance. However, DNN lacks transparency and interpretability for users in structure. Attackers can use this feature to embed trojan horses in the DNN structure, such as inserting a backdoor into the DNN, so that DNN can learn both the normal main task and additional malicious tasks at the same time. Besides, DNN relies on data set for training. Attackers can tamper with training data to interfere with DNN training process, such as attaching a trigger on input data. Because of defects in DNN structure and data, the backdoor attack can be a serious threat to the security of DNN. The DNN attacked by backdoor performs well on benign inputs while it outputs an attacker‐specified label on trigger attached inputs. Backdoor attack can be conducted in almost every stage of the machine learning pipeline. Although there are a few researches in the backdoor attack on image classification, a systematic review is still rare in this field. This paper is a comprehensive review of backdoor attacks. According to whether attackers have access to the training data, we divide various backdoor attacks into two types: poisoning‐based attacks and non‐poisoning‐based attacks. We go through the details of each work in the timeline, discussing its contribution and deficiencies. We propose a detailed mathematical backdoor model to summary all kinds of backdoor attacks. In the end, we provide some insights about future studies.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here