marksman
- North America > United States > California > Santa Clara County > Palo Alto (0.05)
- North America > Canada > Ontario > Toronto (0.05)
- North America > United States > California > San Francisco County > San Francisco (0.14)
- North America > Canada > Quebec > Montreal (0.05)
- North America > United States > Texas > Dallas County > Dallas (0.04)
- (14 more...)
fa0126bb7ebad258bf4ffdbbac2dd787-Supplemental-Conference.pdf
This document provides additional details, analysis, and experimental results. To evaluate our method, we use four datasets, MNIST, CIFAR10, GTSRB (German Traffic Sign Recognition Benchmark), and T -IMNET, to evaluate our method. Note that MNIST, CIFAR10, and GTSRB have been widely used in the literature of backdoor attacks on DNN. During the evaluation stage, no augmentation is applied. In the evaluation stage, no augmentation is used.
- North America > United States > California > Santa Clara County > Palo Alto (0.05)
- North America > Canada > Ontario > Toronto (0.05)
- North America > United States > California > San Francisco County > San Francisco (0.14)
- North America > Canada > Ontario > Toronto (0.14)
- North America > Canada > Quebec > Montreal (0.04)
- (20 more...)
- Information Technology > Security & Privacy (1.00)
- Information Technology > Artificial Intelligence > Machine Learning > Neural Networks > Deep Learning (0.95)
- Information Technology > Sensing and Signal Processing > Image Processing (0.68)
- Information Technology > Artificial Intelligence > Representation & Reasoning (0.68)
FLAT: Latent-Driven Arbitrary-Target Backdoor Attacks in Federated Learning
Nguyen, Tuan, Doan, Khoa D, Wong, Kok-Seng
Federated learning (FL) is vulnerable to backdoor attacks, yet most existing methods are limited by fixed-pattern or single-target triggers, making them inflexible and easier to detect. We propose FLA T (FL Arbitrary-Target Attack), a novel backdoor attack that leverages a latent-driven conditional autoencoder to generate diverse, target-specific triggers as needed. By introducing a latent code, FLA T enables the creation of visually adaptive and highly variable triggers, allowing attackers to select arbitrary targets without retraining and to evade conventional detection mechanisms. Our approach unifies attack success, stealth, and diversity within a single framework, introducing a new level of flexibility and sophistication to backdoor attacks in FL. Extensive experiments show that FLA T achieves high attack success and remains robust against advanced FL defenses. These results highlight the urgent need for new defense strategies to address latent-driven, multi-target backdoor threats in federated settings.
- North America > Canada > Ontario > Toronto (0.14)
- Asia > Vietnam > Hanoi > Hanoi (0.04)
- North America > United States > Illinois (0.04)
- Africa > Ethiopia > Addis Ababa > Addis Ababa (0.04)
Imperio: Language-Guided Backdoor Attacks for Arbitrary Model Control
Chow, Ka-Ho, Wei, Wenqi, Yu, Lei
Revolutionized by the transformer architecture, natural language processing (NLP) has received unprecedented attention. While advancements in NLP models have led to extensive research into their backdoor vulnerabilities, the potential for these advancements to introduce new backdoor threats remains unexplored. This paper proposes Imperio, which harnesses the language understanding capabilities of NLP models to enrich backdoor attacks. Imperio provides a new model control experience. It empowers the adversary to control the victim model with arbitrary output through language-guided instructions. This is achieved using a language model to fuel a conditional trigger generator, with optimizations designed to extend its language understanding capabilities to backdoor instruction interpretation and execution. Our experiments across three datasets, five attacks, and nine defenses confirm Imperio's effectiveness. It can produce contextually adaptive triggers from text descriptions and control the victim model with desired outputs, even in scenarios not encountered during training. The attack maintains a high success rate across complex datasets without compromising the accuracy of clean inputs and also exhibits resilience against representative defenses. The source code is available at \url{https://khchow.com/Imperio}.