TABOR: A Highly Accurate Approach to Inspecting and Restoring Trojan Backdoors in AI Systems

AI-generated keywords: Trojan Backdoor AI Systems TABOR Detection Restoration

AI-generated Key Points

The license of the paper does not allow us to build upon its content and the key points are generated using the paper metadata rather than the full article.

  • Trojan backdoor: hidden pattern intentionally implanted in a deep neural network
  • Trigger: specific input data that activates the trojan backdoor
  • Challenging task to detect and determine trojan backdoors in AI systems
  • Existing techniques have limitations and unrealistic assumptions
  • TABOR (Trojan Backdoor Inspection and Restoration): new technique for trojan detection
  • TABOR approaches trojan detection as a non-convex optimization problem
  • TABOR designs a new objective function guided by explainable AI techniques and heuristics
  • TABOR defines a novel metric for measuring the quality of identified trojan backdoors
  • Anomaly detection method enhances TABOR's ability to identify triggers while filtering out false alarms
  • Authors of the research paper: Wenbo Guo, Lun Wang, Xinyu Xing, Min Du, and Dawn Song
Also access our AI generated: Comprehensive summary, Lay summary, Blog-like article; or ask questions about this paper to our AI assistant.

Authors: Wenbo Guo, Lun Wang, Xinyu Xing, Min Du, Dawn Song

Abstract: A trojan backdoor is a hidden pattern typically implanted in a deep neural network. It could be activated and thus forces that infected model behaving abnormally only when an input data sample with a particular trigger present is fed to that model. As such, given a deep neural network model and clean input samples, it is very challenging to inspect and determine the existence of a trojan backdoor. Recently, researchers design and develop several pioneering solutions to address this acute problem. They demonstrate the proposed techniques have a great potential in trojan detection. However, we show that none of these existing techniques completely address the problem. On the one hand, they mostly work under an unrealistic assumption (e.g. assuming availability of the contaminated training database). On the other hand, the proposed techniques cannot accurately detect the existence of trojan backdoors, nor restore high-fidelity trojan backdoor images, especially when the triggers pertaining to the trojan vary in size, shape and position. In this work, we propose TABOR, a new trojan detection technique. Conceptually, it formalizes a trojan detection task as a non-convex optimization problem, and the detection of a trojan backdoor as the task of resolving the optimization through an objective function. Different from the existing technique also modeling trojan detection as an optimization problem, TABOR designs a new objective function--under the guidance of explainable AI techniques as well as heuristics--that could guide optimization to identify a trojan backdoor in a more effective fashion. In addition, TABOR defines a new metric to measure the quality of a trojan backdoor identified. Using an anomaly detection method, we show the new metric could better facilitate TABOR to identify intentionally injected triggers in an infected model and filter out false alarms......

Submitted to arXiv on 02 Aug. 2019

Ask questions about this paper to our AI assistant

You can also chat with multiple papers at once here.

The license of the paper does not allow us to build upon its content and the AI assistant only knows about the paper metadata rather than the full article.

AI assistant instructions?

Results of the summarizing process for the arXiv paper: 1908.01763v1

This paper's license doesn't allow us to build upon its content and the summarizing process is here made with the paper's metadata rather than the article.

In the field of artificial intelligence (AI), a trojan backdoor refers to a hidden pattern that is intentionally implanted in a deep neural network. This pattern remains dormant until a specific trigger is present in the input data, causing the infected model to behave abnormally. Detecting and determining the existence of trojan backdoors in AI systems is a challenging task, especially when the triggers vary in size, shape, and position. Previous research has proposed various techniques to address this problem, but none of them fully solve it. These existing techniques often make unrealistic assumptions, such as assuming access to the contaminated training database. Additionally, they struggle to accurately detect trojan backdoors or restore high-fidelity trojan backdoor images. To overcome these limitations, this work introduces TABOR (Trojan Backdoor Inspection and Restoration), a new technique for trojan detection. TABOR approaches trojan detection as a non-convex optimization problem and formulates it as an objective function. Unlike previous methods that also model trojan detection as an optimization problem, TABOR designs a new objective function guided by explainable AI techniques and heuristics. This new objective function enables more effective identification of trojan backdoors. Furthermore, TABOR defines a novel metric for measuring the quality of identified trojan backdoors. By using an anomaly detection method, this metric enhances TABOR's ability to identify intentionally injected triggers in an infected model while filtering out false alarms. The authors of this work are Wenbo Guo, Lun Wang, Xinyu Xing, Min Du, and Dawn Song. Their research paper titled "TABOR: A Highly Accurate Approach to Inspecting and Restoring Trojan Backdoors in AI Systems" presents TABOR as an advanced technique for detecting and addressing trojan backdoors in AI systems with improved accuracy compared to existing methods due its novel objective function and metric for measuring quality of identified backdoors.
Created on 14 Oct. 2023

Assess the quality of the AI-generated content by voting

Score: 0

Why do we need votes?

Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.

The previous summary was created more than a year ago and can be re-run (if necessary) by clicking on the Run button below.

The license of this specific paper does not allow us to build upon its content and the summarizing tools will be run using the paper metadata rather than the full article. However, it still does a good job, and you can also try our tools on papers with more open licenses.

Similar papers summarized with our AI tools

Navigate through even more similar papers through a

tree representation

Look for similar papers (in beta version)

By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.

Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.