A Target-Agnostic Attack on Deep Models: Exploiting Security Vulnerabilities of Transfer Learning

04/08/2019
by   Shahbaz Rezaei, et al.
0

Due to the lack of enough training data and high computational cost to train a deep neural network from scratch, transfer learning has been extensively used in many deep-neural-network-based applications, such as face recognition, image classification, speech recognition, etc. A commonly-used transfer learning approach involves taking a part of a pre-trained model, adding a few layers at the end, and re-training the new layers with a small dataset. This approach, while efficient and widely used, imposes a security vulnerability because the pre-trained models used in transfer learning are usually available publicly to everyone, including potential attackers. In this paper, we show that without any additional knowledge other than the pre-trained model, an attacker can launch an effective and efficient brute force attack that can craft instances of input to trigger each target class with high confidence. Note that we assume that the attacker does not have access to any target-specific information, including samples from target classes, re-trained model, and probabilities assigned by Softmax to each class, and thus called target-agnostic attack. These assumptions render all previous attacks impractical, to the best of our knowledge. To evaluate the proposed attack, we perform a set of experiments on face recognition and speech recognition tasks and show the effectiveness of the attack. Our work sheds light on a fundamental security challenge of transfer learning in deep neural networks.

READ FULL TEXT
research
06/07/2023

Transfer Learning of Transformer-based Speech Recognition Models from Czech to Slovak

In this paper, we are comparing several methods of training the Slovak s...
research
01/26/2021

Adversarial Vulnerability of Active Transfer Learning

Two widely used techniques for training supervised machine learning mode...
research
01/23/2019

Programmable Neural Network Trojan for Pre-Trained Feature Extractor

Neural network (NN) trojaning attack is an emerging and important attack...
research
01/27/2022

Few-shot Transfer Learning for Holographic Image Reconstruction using a Recurrent Neural Network

Deep learning-based methods in computational microscopy have been shown ...
research
08/19/2023

Disposable Transfer Learning for Selective Source Task Unlearning

Transfer learning is widely used for training deep neural networks (DNN)...
research
02/21/2018

Deep Collaborative Weight-based Classification

One of the biggest problems in deep learning is its difficulty to retain...
research
11/23/2020

Application of Facial Recognition using Convolutional Neural Networks for Entry Access Control

The purpose of this paper is to design a solution to the problem of faci...

Please sign up or login with your details

Forgot password? Click here to reset