Design and Evaluation of a Multi-Domain Trojan Detection Method on Deep Neural Networks

Cited 17 time in webofscience Cited 0 time in scopus
  • Hit : 296
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorGao, Yansongko
dc.contributor.authorKim, Yeonjaeko
dc.contributor.authorDoan, Bao Giako
dc.contributor.authorZhang, Zhiko
dc.contributor.authorZhang, Gongxuanko
dc.contributor.authorNepal, Suryako
dc.contributor.authorRanasinghe, Damith C.ko
dc.contributor.authorKim, Hyoungshickko
dc.date.accessioned2022-08-09T06:00:43Z-
dc.date.available2022-08-09T06:00:43Z-
dc.date.created2022-08-09-
dc.date.created2022-08-09-
dc.date.issued2022-07-
dc.identifier.citationIEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.19, no.4, pp.2349 - 2364-
dc.identifier.issn1545-5971-
dc.identifier.urihttp://hdl.handle.net/10203/297900-
dc.description.abstractTrojan attacks on deep neural networks (DNNs) exploit a backdoor embedded in a DNN model that can hijack any input with an attacker's chosen signature trigger. Emerging defence mechanisms are mainly designed and validated on vision domain tasks (e.g., image classification) on 2D Convolutional Neural Network (CNN) model architectures; a defence mechanism that is general across vision, text, and audio domain tasks is demanded. This work designs and evaluates a run-time Trojan detection method exploiting STRong Intentional Perturbation of inputs that is a multi-domain input-agnostic Trojan detection defence across Vision, Text and Audio domains-thus termed as STRIP-ViTA. Specifically, STRIP-ViTA is demonstratively independent of not only task domain but also model architectures. Most importantly, unlike other detection mechanisms, it requires neither machine learning expertise nor expensive computational resource, which are the reason behind DNN model outsourcing scenario-one main attack surface of Trojan attack. We have extensively evaluated the performance of STRIP-ViTA over: i) CIFAR10 and GTSRB datasets using 2D CNNs for vision tasks; ii) IMDB and consumer complaint datasets using both LSTM and 1D CNNs for text tasks; and iii) speech command dataset using both 1D CNNs and 2D CNNs for audio tasks. Experimental results based on more than 30 tested Trojaned models (including publicly Trojaned model) corroborate that STRIP-ViTA performs well across all nine architectures and five datasets. Overall, STRIP-ViTA can effectively detect trigger inputs with small false acceptance rate (FAR) with an acceptable preset false rejection rate (FRR). In particular, for vision tasks, we can always achieve a 0 percent FRR and FAR given strong attack success rate always preferred by the attacker. By setting FRR to be 3 percent, average FAR of 1.1 and 3.55 percent are achieved for text and audio tasks, respectively. Moreover, we have evaluated STRIP-ViTA against a number of advanced backdoor attacks and compare its effectiveness with other recent state-of-the-arts.-
dc.languageEnglish-
dc.publisherIEEE COMPUTER SOC-
dc.titleDesign and Evaluation of a Multi-Domain Trojan Detection Method on Deep Neural Networks-
dc.typeArticle-
dc.identifier.wosid000822380500001-
dc.identifier.scopusid2-s2.0-85100787852-
dc.type.rimsART-
dc.citation.volume19-
dc.citation.issue4-
dc.citation.beginningpage2349-
dc.citation.endingpage2364-
dc.citation.publicationnameIEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING-
dc.identifier.doi10.1109/TDSC.2021.3055844-
dc.contributor.localauthorKim, Yeonjae-
dc.contributor.nonIdAuthorGao, Yansong-
dc.contributor.nonIdAuthorDoan, Bao Gia-
dc.contributor.nonIdAuthorZhang, Zhi-
dc.contributor.nonIdAuthorZhang, Gongxuan-
dc.contributor.nonIdAuthorNepal, Surya-
dc.contributor.nonIdAuthorRanasinghe, Damith C.-
dc.contributor.nonIdAuthorKim, Hyoungshick-
dc.description.isOpenAccessN-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorTrojan horses-
dc.subject.keywordAuthorTask analysis-
dc.subject.keywordAuthorComputational modeling-
dc.subject.keywordAuthorPerturbation methods-
dc.subject.keywordAuthorTraining-
dc.subject.keywordAuthorPredictive models-
dc.subject.keywordAuthorComputer architecture-
dc.subject.keywordAuthorSTRIP-ViTA-
dc.subject.keywordAuthortrojan detection-
dc.subject.keywordAuthorbackdoor attack-
dc.subject.keywordAuthordeep learning-
dc.subject.keywordAuthorAI security-
Appears in Collection
RIMS Journal Papers
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 17 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0