April 22, 2024, 4:42 a.m. | Beichen Li, Yuanfang Guo, Heqi Peng, Yangxi Li, Yunhong Wang

cs.LG updates on arXiv.org arxiv.org

arXiv:2404.12852v1 Announce Type: cross
Abstract: Deep neural networks are vulnerable to backdoor attacks. Among the existing backdoor defense methods, trigger reverse engineering based approaches, which reconstruct the backdoor triggers via optimizations, are the most versatile and effective ones compared to other types of methods. In this paper, we summarize and construct a generic paradigm for the typical trigger reverse engineering process. Based on this paradigm, we propose a new perspective to defeat trigger reverse engineering by manipulating the classification confidence …

abstract arxiv attacks backdoor cs.cr cs.cv cs.lg defense engineering framework lsp networks neural networks ones type types via vulnerable

Founding AI Engineer, Agents

@ Occam AI | New York

AI Engineer Intern, Agents

@ Occam AI | US

AI Research Scientist

@ Vara | Berlin, Germany and Remote

Data Architect

@ University of Texas at Austin | Austin, TX

Data ETL Engineer

@ University of Texas at Austin | Austin, TX

Lead GNSS Data Scientist

@ Lurra Systems | Melbourne