Cited 3 time in
Defense Method Challenges Against Backdoor Attacks in Neural Networks
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Shamshiri, Samaneh | - |
| dc.contributor.author | Sohn, Insoo | - |
| dc.date.accessioned | 2024-08-08T11:31:57Z | - |
| dc.date.available | 2024-08-08T11:31:57Z | - |
| dc.date.issued | 2024-03 | - |
| dc.identifier.uri | https://scholarworks.dongguk.edu/handle/sw.dongguk/21845 | - |
| dc.description.abstract | Open-source machine-learning models demon-strated promising performance in a wide range of applications. However, they have been proved to be fragile against backdoor attacks. Backdoor attack, as a cyber-Threat, results in targeted or not-Targeted mis-classification of the neural networks without effecting the accuracy of the benign data samples. This happens through inserting imperceptible malicious triggers to the small part of datasets to change the prediction of the model based on attacker desired results. Therefore, a big part of researches focused on improving the robustness of the neural networks using different kind of detection and mitigation algorithms. In this paper, we discussed the challenges of the defense methods against backdoor attacks in machine learning models. Furthermore, we explored three state-of-The art defense algorithms against BDs including DB-COVIDNet, fine-pruning, LPSF and delve into the evolving landscape of backdoor attacks and the inherent difficulties in developing robust defense mechanisms. © 2024 IEEE. | - |
| dc.format.extent | 5 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | Institute of Electrical and Electronics Engineers Inc. | - |
| dc.title | Defense Method Challenges Against Backdoor Attacks in Neural Networks | - |
| dc.type | Article | - |
| dc.publisher.location | 미국 | - |
| dc.identifier.doi | 10.1109/ICAIIC60209.2024.10463411 | - |
| dc.identifier.scopusid | 2-s2.0-85189942196 | - |
| dc.identifier.bibliographicCitation | 6th International Conference on Artificial Intelligence in Information and Communication, ICAIIC 2024, pp 396 - 400 | - |
| dc.citation.title | 6th International Conference on Artificial Intelligence in Information and Communication, ICAIIC 2024 | - |
| dc.citation.startPage | 396 | - |
| dc.citation.endPage | 400 | - |
| dc.type.docType | Conference paper | - |
| dc.description.isOpenAccess | N | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.subject.keywordAuthor | backdoor attacks | - |
| dc.subject.keywordAuthor | backdoor defense | - |
| dc.subject.keywordAuthor | DB-COVIDNet | - |
| dc.subject.keywordAuthor | fine-pruning | - |
| dc.subject.keywordAuthor | LPSF | - |
| dc.subject.keywordAuthor | machine learning | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
30, Pildong-ro 1-gil, Jung-gu, Seoul, 04620, Republic of Korea+82-2-2260-3114
Copyright(c) 2023 DONGGUK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
