Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Trojan horse attack method based on neural network image classification and related equipment

A neural network and neural network model technology, applied in the field of Trojan attack methods and related equipment based on neural network image classification, can solve problems such as difficult deployment, achieve the effects of concealing attacks, avoiding Trojan detection, and improving performance

Pending Publication Date: 2022-04-08
BEIJING UNIV OF POSTS & TELECOMM +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, since the interpretability of the deep neural network as the foundation of the model is still a difficult theoretical problem, the application based on the deep neural network, especially the image classification task it is good at, is difficult to deploy in the environment with extremely high security requirements. key system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trojan horse attack method based on neural network image classification and related equipment
  • Trojan horse attack method based on neural network image classification and related equipment
  • Trojan horse attack method based on neural network image classification and related equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to make the purpose, technical solutions and advantages of the present application clearer, the present application will be further described in detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0022] It should be noted that, unless otherwise defined, the technical terms or scientific terms used in the embodiments of the present application shall have the usual meanings understood by those skilled in the art to which the present application belongs. "First", "second" and similar words used in the embodiments of the present application do not indicate any order, quantity or importance, but are only used to distinguish different components. "Comprising" or "comprising" and similar words mean that the elements or items appearing before the word include the elements or items listed after the word and their equivalents, without excluding other elements or items. Words such as "connected" or "connected" are not ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a Trojan horse attack method based on neural network image classification and related equipment. The method comprises the following steps: randomly selecting part of training data in a training set; performing poisoning operation on the training data to obtain poisoning data; adversarial disturbance is added into the poisoning data to obtain disturbance data; adding the disturbance data into the training set to obtain a training sample; training a neural network model by using the training sample, and implanting a back door into the neural network model to obtain a poisoning neural network model; and triggering the poisoning neural network model by using the disturbance data to realize Trojan attack. The Trojan attack method based on neural network image classification is provided for a deep neural network Trojan attack and defense technology platform, and is used for actually displaying the attack process of the Trojan and verifying the Trojan defense effect.

Description

technical field [0001] The present application relates to the technical field of machine learning, in particular to a method for attacking Trojan horses based on neural network image classification and related equipment. Background technique [0002] As the most important model in the field of modern artificial intelligence, deep neural network has been widely used in the fields of industry, medical treatment, multimedia, World Wide Web and science, and has shown performance close to or even surpassing human intelligence, and its influence even penetrates into politics and social sciences. and the legal field. [0003] However, since the interpretability of the deep neural network as the foundation of the model is still a difficult theoretical problem, the application based on the deep neural network, especially the image classification task it is good at, is difficult to deploy in the environment with extremely high security requirements. in key systems. Its existing nega...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57G06V10/96G06V10/774G06V10/764G06V10/82G06N3/08G06N3/04G06K9/62
Inventor 王玉龙贾哲宋佳璇苏森徐鹏双锴张忠宝程祥
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products