April 22, 2024, 4:42 a.m. | Beichen Li, Yuanfang Guo, Heqi Peng, Yangxi Li, Yunhong Wang

cs.LG updates on arXiv.org arxiv.org

arXiv:2404.12852v1 Announce Type: cross
Abstract: Deep neural networks are vulnerable to backdoor attacks. Among the existing backdoor defense methods, trigger reverse engineering based approaches, which reconstruct the backdoor triggers via optimizations, are the most versatile and effective ones compared to other types of methods. In this paper, we summarize and construct a generic paradigm for the typical trigger reverse engineering process. Based on this paradigm, we propose a new perspective to defeat trigger reverse engineering by manipulating the classification confidence …

abstract arxiv attacks backdoor cs.cr cs.cv cs.lg defense engineering framework lsp networks neural networks ones type types via vulnerable

Data Engineer

@ Lemon.io | Remote: Europe, LATAM, Canada, UK, Asia, Oceania

Artificial Intelligence – Bioinformatic Expert

@ University of Texas Medical Branch | Galveston, TX

Lead Developer (AI)

@ Cere Network | San Francisco, US

Research Engineer

@ Allora Labs | Remote

Ecosystem Manager

@ Allora Labs | Remote

Founding AI Engineer, Agents

@ Occam AI | New York