Nothing Special   »   [go: up one dir, main page]

Gao et al., 2021 - Google Patents

Design and evaluation of a multi-domain trojan detection method on deep neural networks

Gao et al., 2021

View PDF
Document ID
2392223242473854430
Author
Gao Y
Kim Y
Doan B
Zhang Z
Zhang G
Nepal S
Ranasinghe D
Kim H
Publication year
Publication venue
IEEE Transactions on Dependable and Secure Computing

External Links

Snippet

Trojan attacks on deep neural networks (DNNs) exploit a backdoor embedded in a DNN model that can hijack any input with an attacker's chosen signature trigger. Emerging defence mechanisms are mainly designed and validated on vision domain tasks (eg, image …
Continue reading at arxiv.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30634Querying
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • G06N3/04Architectures, e.g. interconnection topology
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • G06N3/08Learning methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • G06K9/6232Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods
    • G06K9/6247Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods based on an approximation criterion, e.g. principal component analysis

Similar Documents

Publication Publication Date Title
Gao et al. Design and evaluation of a multi-domain trojan detection method on deep neural networks
Hu et al. Artificial intelligence security: Threats and countermeasures
Machado et al. Adversarial machine learning in image classification: A survey toward the defender’s perspective
Rosenberg et al. Adversarial machine learning attacks and defense methods in the cyber security domain
Sharmeen et al. Avoiding future digital extortion through robust protection against ransomware threats using deep learning based adaptive approaches
Gao et al. Backdoor attacks and countermeasures on deep learning: A comprehensive review
Liu et al. Fine-pruning: Defending against backdooring attacks on deep neural networks
Kong et al. A survey on adversarial attack in the age of artificial intelligence
El-Alfy Detection of phishing websites based on probabilistic neural networks and K-medoids clustering
Jøsang Robustness of trust and reputation systems: Does it matter?
US11847111B2 (en) Anomaly detection systems and methods
Alzahrani et al. A review on android ransomware detection using deep learning techniques
Shao et al. Bddr: An effective defense against textual backdoor attacks
Chen et al. Towards resilient machine learning for ransomware detection
Chen et al. LinkBreaker: Breaking the backdoor-trigger link in DNNs via neurons consistency check
Cao et al. Understanding the security of deepfake detection
Sarkar et al. Facehack: Attacking facial recognition systems using malicious facial characteristics
Kumar et al. SDIF-CNN: Stacking deep image features using fine-tuned convolution neural network models for real-world malware detection and classification
Pillai et al. Hybrid unsupervised web-attack detection and classification–A deep learning approach
He et al. CTRF: Ethereum‐based ponzi contract identification
Li et al. Deep learning algorithms for cyber security applications: A survey
Edraki et al. Odyssey: Creation, analysis and detection of trojan models
Anandhi et al. Performance evaluation of deep neural network on malware detection: visual feature approach
Albishry et al. An attribute extraction for automated malware attack classification and detection using soft computing techniques
Singla et al. Privacy Enhancement in Internet of Things (IoT) via mRMR for prevention and avoidance of data leakage