Notice
This is not the latest version of this item. The latest version can be found at:https://dspace.mit.edu/handle/1721.1/137762.2
Spectral Signatures in Backdoor Attacks
| dc.contributor.author | Tran, Brandon | |
| dc.contributor.author | Li, Jerry | |
| dc.contributor.author | Madry, Aleksander | |
| dc.date.accessioned | 2021-11-08T18:28:18Z | |
| dc.date.available | 2021-11-08T18:28:18Z | |
| dc.date.issued | 2018 | |
| dc.identifier.uri | https://hdl.handle.net/1721.1/137762 | |
| dc.description.abstract | © 2018 Curran Associates Inc. All rights reserved. A recent line of work has uncovered a new form of data poisoning: so-called backdoor attacks. These attacks are particularly dangerous because they do not affect a network's behavior on typical, benign data. Rather, the network only deviates from its expected output when triggered by a perturbation planted by an adversary. In this paper, we identify a new property of all known backdoor attacks, which we call spectral signatures. This property allows us to utilize tools from robust statistics to thwart the attacks. We demonstrate the efficacy of these signatures in detecting and removing poisoned examples on real image sets and state of the art neural network architectures. We believe that understanding spectral signatures is a crucial first step towards designing ML systems secure against such backdoor attacks. | en_US |
| dc.language.iso | en | |
| dc.relation.isversionof | https://papers.nips.cc/paper/8024-spectral-signatures-in-backdoor-attacks | en_US |
| dc.rights | Article is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use. | en_US |
| dc.source | Neural Information Processing Systems (NIPS) | en_US |
| dc.title | Spectral Signatures in Backdoor Attacks | en_US |
| dc.type | Article | en_US |
| dc.identifier.citation | Tran, Brandon, Li, Jerry and Madry, Aleksander. 2018. "Spectral Signatures in Backdoor Attacks." | |
| dc.contributor.department | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science | en_US |
| dc.eprint.version | Final published version | en_US |
| dc.type.uri | http://purl.org/eprint/type/ConferencePaper | en_US |
| eprint.status | http://purl.org/eprint/status/NonPeerReviewed | en_US |
| dc.date.updated | 2019-06-13T17:40:55Z | |
| dspace.date.submission | 2019-06-13T17:40:56Z | |
| mit.metadata.status | Authority Work and Publication Information Needed | en_US |
