An anomaly detection approach for backdoored neural networks: face recognition as a case study

08/22/2022
by   Alexander Unnervik, et al.
0

Backdoor attacks allow an attacker to embed functionality jeopardizing proper behavior of any algorithm, machine learning or not. This hidden functionality can remain inactive for normal use of the algorithm until activated by the attacker. Given how stealthy backdoor attacks are, consequences of these backdoors could be disastrous if such networks were to be deployed for applications as critical as border or access control. In this paper, we propose a novel backdoored network detection method based on the principle of anomaly detection, involving access to the clean part of the training data and the trained network. We highlight its promising potential when considering various triggers, locations and identity pairs, without the need to make any assumptions on the nature of the backdoor and its setup. We test our method on a novel dataset of backdoored networks and report detectability results with perfect scores.

READ FULL TEXT
research
08/12/2020

Rule-based Anomaly Detection for Railway Signalling Networks

We propose a rule-based anomaly detection system for railway signalling ...
research
10/07/2021

Differential Anomaly Detection for Facial Images

Due to their convenience and high accuracy, face recognition systems are...
research
04/03/2018

Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks

Data poisoning is a type of adversarial attack on machine learning model...
research
02/24/2020

TrojanNet: Embedding Hidden Trojan Horse Models in Neural Networks

The complexity of large-scale neural networks can lead to poor understan...
research
08/30/2023

Demo: A Digital Twin of the 5G Radio Access Network for Anomaly Detection Functionality

Recently, the concept of digital twins (DTs) has received significant at...
research
04/22/2020

Discovering Imperfectly Observable Adversarial Actions using Anomaly Detection

Anomaly detection is a method for discovering unusual and suspicious beh...
research
03/01/2019

TamperNN: Efficient Tampering Detection of Deployed Neural Nets

Neural networks are powering the deployment of embedded devices and Inte...

Please sign up or login with your details

Forgot password? Click here to reset