TY - JOUR
T1 - One-to-Multiple Clean-Label Image Camouflage (OmClic) based backdoor attack on deep learning
AU - Wang, Guohong
AU - Ma, Hua
AU - Gao, Yansong
AU - Abuadbba, Alsharif
AU - Zhang, Zhi
AU - Kang, Wei
AU - Al-Sarawi, Said F.
AU - Zhang, Gongxuan
AU - Abbott, Derek
N1 - Funding Information:
The authors would like to thank the shepherd from the Knowledge-Based Systems committee and the anonymous reviewers, for their insightful comments that greatly enriched the quality of our work. This work is supported in part by the Natural Science Foundation of China under Grants 62272232 , 62172224 .
Publisher Copyright:
© 2024 Elsevier B.V.
PY - 2024/3/15
Y1 - 2024/3/15
N2 - Image camouflage has been utilized to create clean-label poisoned images for implanting backdoor into a DL model. But there exists a crucial limitation that one attack/poisoned image can only fit a single input size of the DL model, which greatly increases its attack budget when attacking multiple commonly adopted input sizes of DL models. This work proposes to constructively craft an attack image through camouflaging but can fit multiple DL models’ input sizes simultaneously, namely OmClic. Thus, through OmClic, we are able to always implant a backdoor regardless of which common input size is chosen by the user to train the DL model given the same attack budget (i.e., a fraction of the poisoning rate). With our camouflaging algorithm formulated as a multi-objective optimization, M=5 input sizes can be concurrently targeted with one attack image, which artifact is retained to be almost visually imperceptible at the same time. Extensive evaluations validate the proposed OmClic can reliably succeed in various settings using diverse types of images. Further experiments on OmClic based backdoor insertion to DL models show that high backdoor performances (i.e., attack success rate and clean data accuracy) are achievable no matter which common input size is randomly chosen by the user to train the model. So that the OmClic based backdoor attack budget is reduced by M× compared to the state-of-the-art camouflage based backdoor attack as a baseline. Significantly, the same set of OmClic based poisonous attack images is transferable to different model architectures for backdoor implant.
AB - Image camouflage has been utilized to create clean-label poisoned images for implanting backdoor into a DL model. But there exists a crucial limitation that one attack/poisoned image can only fit a single input size of the DL model, which greatly increases its attack budget when attacking multiple commonly adopted input sizes of DL models. This work proposes to constructively craft an attack image through camouflaging but can fit multiple DL models’ input sizes simultaneously, namely OmClic. Thus, through OmClic, we are able to always implant a backdoor regardless of which common input size is chosen by the user to train the DL model given the same attack budget (i.e., a fraction of the poisoning rate). With our camouflaging algorithm formulated as a multi-objective optimization, M=5 input sizes can be concurrently targeted with one attack image, which artifact is retained to be almost visually imperceptible at the same time. Extensive evaluations validate the proposed OmClic can reliably succeed in various settings using diverse types of images. Further experiments on OmClic based backdoor insertion to DL models show that high backdoor performances (i.e., attack success rate and clean data accuracy) are achievable no matter which common input size is randomly chosen by the user to train the model. So that the OmClic based backdoor attack budget is reduced by M× compared to the state-of-the-art camouflage based backdoor attack as a baseline. Significantly, the same set of OmClic based poisonous attack images is transferable to different model architectures for backdoor implant.
KW - Backdoor attack
KW - Camouflage attack
KW - Clean-label data poisoning
KW - Machine learning
KW - One-to-multiple
UR - http://www.scopus.com/inward/record.url?scp=85184772584&partnerID=8YFLogxK
U2 - 10.1016/j.knosys.2024.111456
DO - 10.1016/j.knosys.2024.111456
M3 - Article
AN - SCOPUS:85184772584
SN - 0950-7051
VL - 288
JO - Knowledge-Based Systems
JF - Knowledge-Based Systems
M1 - 111456
ER -