Detailed Information

Cited 16 time in webofscience Cited 20 time in scopus
Metadata Downloads

A defense method against backdoor attacks on neural networks

Full metadata record
DC Field Value Language
dc.contributor.authorKaviani, Sara-
dc.contributor.authorShamshiri, Samaneh-
dc.contributor.authorSohn, Insoo-
dc.date.accessioned2024-08-08T09:31:59Z-
dc.date.available2024-08-08T09:31:59Z-
dc.date.issued2023-03-
dc.identifier.issn0957-4174-
dc.identifier.issn1873-6793-
dc.identifier.urihttps://scholarworks.dongguk.edu/handle/sw.dongguk/20970-
dc.description.abstractDue to computational complexities of artificial neural networks (ANNs), there is an increasing demand for third parties and MLaaS (machine learning as a service) to take charge of the training procedure. Therefore, making ANNs robust against adversarial attacks has received a lot of attention. Backdoor attacks, which causes targeted mis-classification while the accuracy on clean data is not affected, are among the most efficient attacks. In this paper, we propose a method called link-pruning with scale-freeness (LPSF), in which the dormant threatening links from the neurons in the input layer to other neurons of feed-forward neural network are eliminated according to the information gained from a portion of clean input data and the essential links are strengthened by changing the fully-connected networks to scale-free structures. To the best of our knowledge, it is the first defense method that makes the network significantly robust against backdoor attack (BD) before the network is attacked. LPSF is evaluated on feed-forward neural networks and with malicious MNIST, FMNIST, handwritten Chinese characters and HODA datasets. Through LPSF strategy, we achieve a sufficiently high and stable accuracy on clean data and an exceeding reduction range of 50% - 94% for attack success rate.-
dc.format.extent14-
dc.language영어-
dc.language.isoENG-
dc.publisherElsevier Ltd-
dc.titleA defense method against backdoor attacks on neural networks-
dc.typeArticle-
dc.publisher.location네델란드-
dc.identifier.doi10.1016/j.eswa.2022.118990-
dc.identifier.scopusid2-s2.0-85140061018-
dc.identifier.wosid000877846900002-
dc.identifier.bibliographicCitationExpert Systems with Applications, v.213, pp 1 - 14-
dc.citation.titleExpert Systems with Applications-
dc.citation.volume213-
dc.citation.startPage1-
dc.citation.endPage14-
dc.type.docTypeArticle-
dc.description.isOpenAccessY-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaOperations Research & Management Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Artificial Intelligence-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryOperations Research & Management Science-
dc.subject.keywordAuthorFeed-forward neural networks-
dc.subject.keywordAuthorBackdoor attacks-
dc.subject.keywordAuthorScale-free networks-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > Department of Electronics and Electrical Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Sohn, In Soo photo

Sohn, In Soo
College of Engineering (Department of Electronics and Electrical Engineering)
Read more

Altmetrics

Total Views & Downloads

BROWSE