SAB:A Stealing and Robust Backdoor Attack based on Steganographic Algorithm against Federated Learning
AI-generated Key Points
⚠The license of the paper does not allow us to build upon its content and the key points are generated using the paper metadata rather than the full article.
- Federated learning is an innovative network architecture in technology aimed at safeguarding user privacy.
- The increasing adoption of federated learning has exposed vulnerabilities to backdoor attacks within the system.
- There is a growing need to explore and enhance security measures in federated learning.
- Current research has identified various backdoors that can be detected through human inspection or countered by detection algorithms.
- A new approach called SAB (Stealing and Robust Backdoor Attack based on Steganographic Algorithm against Federated Learning) has been introduced to address backdoor attacks in federated learning.
- SAB uses steganographic algorithms, particularly image steganography, to construct triggers that enhance the accuracy of backdoors.
- SAB incorporates multiple loss joint computation techniques for generating triggers with smaller distances to benign samples and greater imperceptibility to the human eye.
- SAB can mitigate or evade specific backdoor defense methods, making it a powerful tool for malicious actors exploiting vulnerabilities in federated learning systems.
- The bottom-95% method used in SAB extends the lifespan of backdoor attacks by updating gradients on minor value points, reducing detection likelihood.
- SAB integrates Sparse-update techniques to improve generalization of backdoors and overall accuracy in federated learning environments.
Authors: Weida Xu, Yang Xu, Sicong Zhang
Abstract: Federated learning, an innovative network architecture designed to safeguard user privacy, is gaining widespread adoption in the realm of technology. However, given the existence of backdoor attacks in federated learning, exploring the security of federated learning is significance. Nevertheless, the backdoors investigated in current federated learning research can be readily detected by human inspection or resisted by detection algorithms. Accordingly, a new goal has been set to develop stealing and robust federated learning backdoor attacks. In this paper, we introduce a novel approach, SAB, tailored specifically for backdoor attacks in federated learning, presenting an alternative gradient updating mechanism. SAB attack based on steganographic algorithm, using image steganographic algorithm to build a full-size trigger to improve the accuracy of backdoors and use multiple loss joint computation to produce triggers. SAB exhibits smaller distances to benign samples and greater imperceptibility to the human eye. As such, our triggers are capable of mitigating or evading specific backdoor defense methods. In SAB, the bottom-95\% method is applied to extend the lifespan of backdoor attacks. It updates the gradient on minor value points to reduce the probability of being cleaned. Finally, the generalization of backdoors is enhanced with Sparse-update to improve the backdoor accuracy.
Ask questions about this paper to our AI assistant
You can also chat with multiple papers at once here.
⚠The license of the paper does not allow us to build upon its content and the AI assistant only knows about the paper metadata rather than the full article.
Assess the quality of the AI-generated content by voting
Score: 0
Why do we need votes?
Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.
Similar papers summarized with our AI tools
Navigate through even more similar papers through a
tree representationLook for similar papers (in beta version)
By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.
Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.