An Invisible Backdoor Attack based on DCT-Injection

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In recent years, as deep learning models have been widely used, the research on the security of network models attracts more and more attention. As a novel type of attack method, backdoor attacks pose a great threat to the models due to their stealthiness. To improve the security of network models, possible backdoor attacks need to be investigated. The current mainstream backdoor attacks embed trigger patterns to images in the spatial domain, which makes their trigger patterns observable. To solve this problem, an invisible backdoor attack based on discrete cosine transform (DCT) injection is proposed in this paper, which injects backdoor information in the frequency domain by using DCT. Experiments on three different models with CIFAR-10 dataset demonstrate that the proposed method is more effective and stealthier than the spatial domain embedding backdoor attack. It is further demonstrated that the proposed method is resistant to Fine-Pruning defense by comparing it with mainstream backdoor attacks.

Original languageEnglish
Title of host publicationProceedings of 2022 IEEE International Conference on Unmanned Systems, ICUS 2022
EditorsRong Song
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages399-404
Number of pages6
ISBN (Electronic)9781665484565
DOIs
StatePublished - 2022
Event2022 IEEE International Conference on Unmanned Systems, ICUS 2022 - Guangzhou, China
Duration: 28 Oct 202230 Oct 2022

Publication series

NameProceedings of 2022 IEEE International Conference on Unmanned Systems, ICUS 2022

Conference

Conference2022 IEEE International Conference on Unmanned Systems, ICUS 2022
Country/TerritoryChina
CityGuangzhou
Period28/10/2230/10/22

Keywords

  • backdoor attacks
  • DCT
  • deep learning
  • frequency
  • injection

Fingerprint

Dive into the research topics of 'An Invisible Backdoor Attack based on DCT-Injection'. Together they form a unique fingerprint.

Cite this