Detailed Information

Cited 2 time in webofscience Cited 3 time in scopus
Metadata Downloads

Study of scale-free structures in feed-forward neural networks against backdoor attacks

Full metadata record
DC Field Value Language
dc.contributor.authorKaviani, Sara-
dc.contributor.authorSohn, Insoo-
dc.date.accessioned2023-04-27T17:40:36Z-
dc.date.available2023-04-27T17:40:36Z-
dc.date.issued2021-06-
dc.identifier.issn2405-9595-
dc.identifier.issn2405-9595-
dc.identifier.urihttps://scholarworks.dongguk.edu/handle/sw.dongguk/4934-
dc.description.abstractDue to the computational complexities of artificial neural networks, MLaaS (machine learning as a service), which is one of the main cloud computing services, is taking the responsibility of the neural network training. With the increase in demand for third-party neural network training, there is a high possibility of adversarial attacks through malicious training. Backdoor attacks are among the most efficient attacks which cause targeted misclassification while the accuracy on clean data is not affected. In this paper, we provide the first investigation about the influence of applying scale-free networks to feed-forward neural networks (FFNNs) against backdoor attacks inserted via the MNIST dataset. It is the first time that the feed-forward neural network structure is changed to improve the network robustness against backdoor attacks using scale-free structure before the network is getting attacked. It has been achieved that scale-free neural networks with long range connections not only keep the accuracy high with strong stability but also make it independent of the number of hidden layers and prevent overfitting. (C) 2021 The Korean Institute of Communications and Information Sciences (KICS). Publishing services by Elsevier B.V.-
dc.format.extent4-
dc.language영어-
dc.language.isoENG-
dc.publisherELSEVIER-
dc.titleStudy of scale-free structures in feed-forward neural networks against backdoor attacks-
dc.typeArticle-
dc.publisher.location네델란드-
dc.identifier.doi10.1016/j.icte.2020.11.004-
dc.identifier.scopusid2-s2.0-85106795723-
dc.identifier.wosid000659127000023-
dc.identifier.bibliographicCitationICT EXPRESS, v.7, no.2, pp 265 - 268-
dc.citation.titleICT EXPRESS-
dc.citation.volume7-
dc.citation.number2-
dc.citation.startPage265-
dc.citation.endPage268-
dc.type.docTypeArticle-
dc.identifier.kciidART002737255-
dc.description.isOpenAccessY-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.description.journalRegisteredClasskci-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordAuthorFeed-forward neural networks-
dc.subject.keywordAuthorScale-free networks-
dc.subject.keywordAuthorBackdoor attack-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > Department of Electronics and Electrical Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Sohn, In Soo photo

Sohn, In Soo
College of Engineering (Department of Electronics and Electrical Engineering)
Read more

Altmetrics

Total Views & Downloads

BROWSE