Gao et al., 2021 - Google Patents
Design and evaluation of a multi-domain trojan detection method on deep neural networksGao et al., 2021
View PDF- Document ID
- 2392223242473854430
- Author
- Gao Y
- Kim Y
- Doan B
- Zhang Z
- Zhang G
- Nepal S
- Ranasinghe D
- Kim H
- Publication year
- Publication venue
- IEEE Transactions on Dependable and Secure Computing
External Links
Snippet
Trojan attacks on deep neural networks (DNNs) exploit a backdoor embedded in a DNN model that can hijack any input with an attacker's chosen signature trigger. Emerging defence mechanisms are mainly designed and validated on vision domain tasks (eg, image …
- 230000001537 neural 0 title abstract description 24
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30634—Querying
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
- G06N3/04—Architectures, e.g. interconnection topology
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
- G06N3/08—Learning methods
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
- G06K9/6232—Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods
- G06K9/6247—Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods based on an approximation criterion, e.g. principal component analysis
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Gao et al. | Design and evaluation of a multi-domain trojan detection method on deep neural networks | |
Hu et al. | Artificial intelligence security: Threats and countermeasures | |
Machado et al. | Adversarial machine learning in image classification: A survey toward the defender’s perspective | |
Rosenberg et al. | Adversarial machine learning attacks and defense methods in the cyber security domain | |
Sharmeen et al. | Avoiding future digital extortion through robust protection against ransomware threats using deep learning based adaptive approaches | |
Gao et al. | Backdoor attacks and countermeasures on deep learning: A comprehensive review | |
Liu et al. | Fine-pruning: Defending against backdooring attacks on deep neural networks | |
Kong et al. | A survey on adversarial attack in the age of artificial intelligence | |
El-Alfy | Detection of phishing websites based on probabilistic neural networks and K-medoids clustering | |
Jøsang | Robustness of trust and reputation systems: Does it matter? | |
US11847111B2 (en) | Anomaly detection systems and methods | |
Alzahrani et al. | A review on android ransomware detection using deep learning techniques | |
Shao et al. | Bddr: An effective defense against textual backdoor attacks | |
Chen et al. | Towards resilient machine learning for ransomware detection | |
Chen et al. | LinkBreaker: Breaking the backdoor-trigger link in DNNs via neurons consistency check | |
Cao et al. | Understanding the security of deepfake detection | |
Sarkar et al. | Facehack: Attacking facial recognition systems using malicious facial characteristics | |
Kumar et al. | SDIF-CNN: Stacking deep image features using fine-tuned convolution neural network models for real-world malware detection and classification | |
Pillai et al. | Hybrid unsupervised web-attack detection and classification–A deep learning approach | |
He et al. | CTRF: Ethereum‐based ponzi contract identification | |
Li et al. | Deep learning algorithms for cyber security applications: A survey | |
Edraki et al. | Odyssey: Creation, analysis and detection of trojan models | |
Anandhi et al. | Performance evaluation of deep neural network on malware detection: visual feature approach | |
Albishry et al. | An attribute extraction for automated malware attack classification and detection using soft computing techniques | |
Singla et al. | Privacy Enhancement in Internet of Things (IoT) via mRMR for prevention and avoidance of data leakage |