Stateful detection of adversarial reprogramming

Yang Zheng, Xiaoyi Feng, Zhaoqiang Xia, Xiaoyue Jiang, Maura Pintor, Ambra Demontis, Battista Biggio, Fabio Roli

Research output: Contribution to journalArticlepeer-review

2 Scopus citations

Abstract

Adversarial reprogramming allows stealing computational resources by repurposing machine learning models to perform a different task chosen by the attacker. For example, a model trained to recognize images of animals can be reprogrammed to recognize medical images by embedding an adversarial program in the images provided as inputs. This attack can be perpetrated even if the target model is a black box, supposed that the machine-learning model is provided as a service and the attacker can query the model and collect its outputs. So far, no defense has been demonstrated effective in this scenario. We show for the first time that this attack is detectable using stateful defenses, which store the queries made to the classifier and detect the abnormal cases in which they are similar. Once a malicious query is detected, the account of the user who made it can be blocked. Thus, the attacker must create many accounts to perpetrate the attack. To decrease this number, the attacker could create the adversarial program against a surrogate classifier and then fine-tune it by making a few queries to the target model. In this scenario, the effectiveness of the stateful defense is reduced, but we show that it is still effective.

Original languageEnglish
Article number119093
JournalInformation Sciences
Volume642
DOIs
StatePublished - Sep 2023

Keywords

  • Adversarial machine learning
  • Adversarial reprogramming
  • Neural networks
  • Stateful defenses

Fingerprint

Dive into the research topics of 'Stateful detection of adversarial reprogramming'. Together they form a unique fingerprint.

Cite this