Abstract
In recent years, a number of backdoor attacks against deep neural networks (DNN) have been proposed. In this paper, we reveal that backdoor attacks are vulnerable to image compressions, as backdoor instances used to trigger backdoor attacks are usually compressed by image compression methods during data transmission. When backdoor instances are compressed, the feature of backdoor trigger will be destroyed, which could result in significant performance degradation for backdoor attacks. As a countermeasure, we propose the first compression-resistant backdoor attack method based on feature consistency training. Specifically, both backdoor images and their compressed versions are used for training, and the feature difference between backdoor images and their compressed versions are minimized through feature consistency training. As a result, the DNN treats the feature of compressed images as the feature of backdoor images in feature space. After training, the backdoor attack will be robust to image compressions. Furthermore, we consider three different image compressions (i.e., JPEG, JPEG2000, WEBP) during the feature consistency training, so that the backdoor attack can be robust to multiple image compression algorithms. Experimental results demonstrate that when the backdoor instances are compressed, the attack success rate of common backdoor attack is 6.63% (JPEG), 6.20% (JPEG2000) and 3.97% (WEBP) respectively, while the attack success rate of the proposed compression-resistant backdoor attack is 98.77% (JPEG), 97.69% (JPEG2000), and 98.93% (WEBP) respectively. The compression-resistant attack is robust under various parameters settings. In addition, extensive experiments have demonstrated that even if only one image compression method is used in the feature consistency training process, the proposed compression-resistant backdoor attack has the generalization ability to resist multiple unseen image compression methods.
Full Text
Topics from this Paper
Backdoor Attack
Image Compression
Image Compression Methods
Compressed Versions
Images In Feature Space
+ Show 5 more
Create a personalized feed of these topics
Get StartedTalk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Similar Papers
Oct 1, 2021
Computers & Security
Jul 1, 2022
Computers & Security
Nov 1, 2021
Mar 22, 2023
IEEE Transactions on Dependable and Secure Computing
May 1, 2022
May 23, 2022
Computers, Materials & Continua
Jan 1, 2022
May 1, 2022
Dec 6, 2021
Chinese Journal of Electronics
Mar 1, 2022
Applied Sciences
Oct 25, 2021
Sensors
May 14, 2023
IEEE Transactions on Dependable and Secure Computing
Jan 1, 2020
Applied Intelligence
Applied Intelligence
Nov 25, 2023
Applied Intelligence
Nov 25, 2023
Applied Intelligence
Nov 25, 2023
Applied Intelligence
Nov 24, 2023
Applied Intelligence
Nov 24, 2023
Applied Intelligence
Nov 23, 2023
Applied Intelligence
Nov 23, 2023
Applied Intelligence
Nov 23, 2023
Applied Intelligence
Nov 23, 2023
Applied Intelligence
Nov 22, 2023