论文标题
后门学习:调查
Backdoor Learning: A Survey
论文作者
论文摘要
后门攻击打算将隐藏的后门嵌入深度神经网络(DNN)中,以便攻击模型在良性样本上表现良好,而如果攻击者指定的触发器激活了隐藏的后门,则其预测将发生恶意改变。当培训过程没有得到充分控制时,例如在第三方数据集上的培训或采用第三方模型时,这种威胁可能会发生,这构成了新的现实威胁。尽管后门学习是一个新兴且迅速发展的研究领域,但其系统评价仍然是空白的。在本文中,我们介绍了该领域的首次全面调查。我们根据其特征总结并分类现有的后门攻击和防御措施,并为分析基于中毒的后门攻击提供了统一的框架。此外,我们还分析了后门攻击与相关领域(即$ verseversial攻击和数据中毒)之间的关系,并总结了广泛采用的基准数据集。最后,我们简要概述了依靠审查作品的某些未来研究指示。 \ url {https://github.com/thuyimingli/backdoor-learning-resources-resources}也可以找到与后门相关资源的精选列表。
Backdoor attack intends to embed hidden backdoor into deep neural networks (DNNs), so that the attacked models perform well on benign samples, whereas their predictions will be maliciously changed if the hidden backdoor is activated by attacker-specified triggers. This threat could happen when the training process is not fully controlled, such as training on third-party datasets or adopting third-party models, which poses a new and realistic threat. Although backdoor learning is an emerging and rapidly growing research area, its systematic review, however, remains blank. In this paper, we present the first comprehensive survey of this realm. We summarize and categorize existing backdoor attacks and defenses based on their characteristics, and provide a unified framework for analyzing poisoning-based backdoor attacks. Besides, we also analyze the relation between backdoor attacks and relevant fields ($i.e.,$ adversarial attacks and data poisoning), and summarize widely adopted benchmark datasets. Finally, we briefly outline certain future research directions relying upon reviewed works. A curated list of backdoor-related resources is also available at \url{https://github.com/THUYimingLi/backdoor-learning-resources}.