Just How Toxic is Data Poisoning? A Unified Benchmark for Backdoor and Data Poisoning Attacks

06/22/2020
by   Avi Schwarzschild, et al.
0

Data poisoning and backdoor attacks manipulate training data in order to cause models to fail during inference. A recent survey of industry practitioners found that data poisoning is the number one concern among threats ranging from model stealing to adversarial attacks. However, we find that the impressive performance evaluations from data poisoning attacks are, in large part, artifacts of inconsistent experimental design. Moreover, we find that existing poisoning methods have been tested in contrived scenarios, and they fail in realistic settings. In order to promote fair comparison in future work, we develop unified benchmarks for data poisoning and backdoor attacks.

READ FULL TEXT
research
08/07/2023

A reading survey on adversarial machine learning: Adversarial attacks and their understanding

Deep Learning has empowered us to train neural networks for complex data...
research
09/26/2018

Adversarial Attacks on Cognitive Self-Organizing Networks: The Challenge and the Way Forward

Future communications and data networks are expected to be largely cogni...
research
11/19/2019

Adversarial Attacks on Grid Events Classification: An Adversarial Machine Learning Approach

With the ever-increasing reliance on data for data-driven applications i...
research
11/18/2020

Strong Data Augmentation Sanitizes Poisoning and Backdoor Attacks Without an Accuracy Tradeoff

Data poisoning and backdoor attacks manipulate victim models by maliciou...
research
10/20/2021

Adversarial attacks against Bayesian forecasting dynamic models

The last decade has seen the rise of Adversarial Machine Learning (AML)....
research
11/19/2019

Attack on Grid Event Cause Analysis: An Adversarial Machine Learning Approach

With the ever-increasing reliance on data for data-driven applications i...
research
01/04/2022

Unified Field Multiplier for ECC: Inherent Resistance against Horizontal SCA Attacks

In this paper we introduce a unified field multiplier for the EC kP oper...

Please sign up or login with your details

Forgot password? Click here to reset