Survey on backdoor attacks targeted on neural network

According to existing neural network backdoor attack research works, the concept of neural network backdoor attack is first introduced.Secondly, the research status of neural network backdoor attack is explained from three aspects: research development, summary of typical work and classification.The...

Full description

Saved in:
Bibliographic Details
Main Authors: Qingyin TAN, Yingming ZENG, Ye HAN, Yijing LIU, Zheli LIU
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2021-06-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021053
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841529905761746944
author Qingyin TAN
Yingming ZENG
Ye HAN
Yijing LIU
Zheli LIU
author_facet Qingyin TAN
Yingming ZENG
Ye HAN
Yijing LIU
Zheli LIU
author_sort Qingyin TAN
collection DOAJ
description According to existing neural network backdoor attack research works, the concept of neural network backdoor attack is first introduced.Secondly, the research status of neural network backdoor attack is explained from three aspects: research development, summary of typical work and classification.Then, some typical backdoor attack strategies are analyzed in detail.Finally, the research status is summarized and the future research directions are discussed.
format Article
id doaj-art-a797ab9aff8b4387b1a67d7f799a4c7a
institution Kabale University
issn 2096-109X
language English
publishDate 2021-06-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-a797ab9aff8b4387b1a67d7f799a4c7a2025-01-15T03:14:45ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2021-06-017465859563323Survey on backdoor attacks targeted on neural networkQingyin TANYingming ZENGYe HANYijing LIUZheli LIUAccording to existing neural network backdoor attack research works, the concept of neural network backdoor attack is first introduced.Secondly, the research status of neural network backdoor attack is explained from three aspects: research development, summary of typical work and classification.Then, some typical backdoor attack strategies are analyzed in detail.Finally, the research status is summarized and the future research directions are discussed.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021053artificial intelligence securitydeep learningneural networksneural network backdoor
spellingShingle Qingyin TAN
Yingming ZENG
Ye HAN
Yijing LIU
Zheli LIU
Survey on backdoor attacks targeted on neural network
网络与信息安全学报
artificial intelligence security
deep learning
neural networks
neural network backdoor
title Survey on backdoor attacks targeted on neural network
title_full Survey on backdoor attacks targeted on neural network
title_fullStr Survey on backdoor attacks targeted on neural network
title_full_unstemmed Survey on backdoor attacks targeted on neural network
title_short Survey on backdoor attacks targeted on neural network
title_sort survey on backdoor attacks targeted on neural network
topic artificial intelligence security
deep learning
neural networks
neural network backdoor
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021053
work_keys_str_mv AT qingyintan surveyonbackdoorattackstargetedonneuralnetwork
AT yingmingzeng surveyonbackdoorattackstargetedonneuralnetwork
AT yehan surveyonbackdoorattackstargetedonneuralnetwork
AT yijingliu surveyonbackdoorattackstargetedonneuralnetwork
AT zheliliu surveyonbackdoorattackstargetedonneuralnetwork