Skip to main content

Showing 1–10 of 10 results for author: Doan, B G

.
  1. arXiv:2408.12122  [pdf, other

    cs.CR

    On the Credibility of Backdoor Attacks Against Object Detectors in the Physical World

    Authors: Bao Gia Doan, Dang Quang Nguyen, Callum Lindquist, Paul Montague, Tamas Abraham, Olivier De Vel, Seyit Camtepe, Salil S. Kanhere, Ehsan Abbasnejad, Damith C. Ranasinghe

    Abstract: Object detectors are vulnerable to backdoor attacks. In contrast to classifiers, detectors possess unique characteristics, architecturally and in task execution; often operating in challenging conditions, for instance, detecting traffic signs in autonomous cars. But, our knowledge dominates attacks against classifiers and tests in the "digital domain". To address this critical gap, we conducted… ▽ More

    Submitted 30 October, 2024; v1 submitted 22 August, 2024; originally announced August 2024.

    Comments: Accepted to appear at the 40th Annual Computer Security Applications Conference (ACSAC 2024). Code and dataset are available at https://backdoordetectors.github.io/

  2. arXiv:2407.20891  [pdf, other

    cs.LG cs.AI cs.CV

    Bayesian Low-Rank LeArning (Bella): A Practical Approach to Bayesian Neural Networks

    Authors: Bao Gia Doan, Afshar Shamsi, Xiao-Yu Guo, Arash Mohammadi, Hamid Alinejad-Rokny, Dino Sejdinovic, Damien Teney, Damith C. Ranasinghe, Ehsan Abbasnejad

    Abstract: Computational complexity of Bayesian learning is impeding its adoption in practical, large-scale tasks. Despite demonstrations of significant merits such as improved robustness and resilience to unseen or out-of-distribution inputs over their non- Bayesian counterparts, their practical use has faded to near insignificance. In this study, we introduce an innovative framework to mitigate the computa… ▽ More

    Submitted 18 February, 2025; v1 submitted 30 July, 2024; originally announced July 2024.

    Comments: This paper is accepted in AAAI'25", and the code is available at https://bnn-bella.github.io/BNN-Bella/

  3. arXiv:2403.18309  [pdf, other

    cs.CR

    Bayesian Learned Models Can Detect Adversarial Malware For Free

    Authors: Bao Gia Doan, Dang Quang Nguyen, Paul Montague, Tamas Abraham, Olivier De Vel, Seyit Camtepe, Salil S. Kanhere, Ehsan Abbasnejad, Damith C. Ranasinghe

    Abstract: The vulnerability of machine learning-based malware detectors to adversarial attacks has prompted the need for robust solutions. Adversarial training is an effective method but is computationally expensive to scale up to large datasets and comes at the cost of sacrificing model performance for robustness. We hypothesize that adversarial malware exploits the low-confidence regions of models and can… ▽ More

    Submitted 27 March, 2024; originally announced March 2024.

    Comments: Accepted to the 29th European Symposium on Research in Computer Security (ESORICS) 2024 Conference

  4. arXiv:2301.12680  [pdf, other

    cs.CR

    Feature-Space Bayesian Adversarial Learning Improved Malware Detector Robustness

    Authors: Bao Gia Doan, Shuiqiao Yang, Paul Montague, Olivier De Vel, Tamas Abraham, Seyit Camtepe, Salil S. Kanhere, Ehsan Abbasnejad, Damith C. Ranasinghe

    Abstract: We present a new algorithm to train a robust malware detector. Modern malware detectors rely on machine learning algorithms. Now, the adversarial objective is to devise alterations to the malware code to decrease the chance of being detected whilst preserving the functionality and realism of the malware. Adversarial learning is effective in improving robustness but generating functional and realis… ▽ More

    Submitted 30 January, 2023; originally announced January 2023.

    Comments: Accepted to AAAI 2023 conference

  5. arXiv:2212.02003  [pdf, other

    cs.LG cs.CR cs.CV

    Bayesian Learning with Information Gain Provably Bounds Risk for a Robust Adversarial Defense

    Authors: Bao Gia Doan, Ehsan Abbasnejad, Javen Qinfeng Shi, Damith C. Ranasinghe

    Abstract: We present a new algorithm to learn a deep neural network model robust against adversarial attacks. Previous algorithms demonstrate an adversarially trained Bayesian Neural Network (BNN) provides improved robustness. We recognize the adversarial learning approach for approximating the multi-modal posterior distribution of a Bayesian model can lead to mode collapse; consequently, the model's achiev… ▽ More

    Submitted 1 December, 2023; v1 submitted 4 December, 2022; originally announced December 2022.

    Comments: Published at ICML 2022. Code is available at https://github.com/baogiadoan/IG-BNN

    Journal ref: Proceedings of the 39th International Conference on Machine Learning, PMLR 162:5309-5323, 2022

  6. arXiv:2207.00425  [pdf, other

    cs.CR cs.AI cs.LG

    Transferable Graph Backdoor Attack

    Authors: Shuiqiao Yang, Bao Gia Doan, Paul Montague, Olivier De Vel, Tamas Abraham, Seyit Camtepe, Damith C. Ranasinghe, Salil S. Kanhere

    Abstract: Graph Neural Networks (GNNs) have achieved tremendous success in many graph mining tasks benefitting from the message passing strategy that fuses the local structure and node features for better graph representation learning. Despite the success of GNNs, and similar to other types of deep neural networks, GNNs are found to be vulnerable to unnoticeable perturbations on both graph structure and nod… ▽ More

    Submitted 4 July, 2022; v1 submitted 21 June, 2022; originally announced July 2022.

    Comments: Accepted by the 25th International Symposium on Research in Attacks, Intrusions, and Defenses

  7. arXiv:2111.09999  [pdf, other

    cs.CV cs.CR

    TnT Attacks! Universal Naturalistic Adversarial Patches Against Deep Neural Network Systems

    Authors: Bao Gia Doan, Minhui Xue, Shiqing Ma, Ehsan Abbasnejad, Damith C. Ranasinghe

    Abstract: Deep neural networks are vulnerable to attacks from adversarial inputs and, more recently, Trojans to misguide or hijack the model's decision. We expose the existence of an intriguing class of spatially bounded, physically realizable, adversarial examples -- Universal NaTuralistic adversarial paTches -- we call TnTs, by exploring the superset of the spatially bounded adversarial example space and… ▽ More

    Submitted 25 July, 2022; v1 submitted 18 November, 2021; originally announced November 2021.

    Comments: Accepted for publication in the IEEE Transactions on Information Forensics & Security (TIFS)

  8. arXiv:2007.10760  [pdf, other

    cs.CR cs.CV cs.LG

    Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review

    Authors: Yansong Gao, Bao Gia Doan, Zhi Zhang, Siqi Ma, Jiliang Zhang, Anmin Fu, Surya Nepal, Hyoungshick Kim

    Abstract: This work provides the community with a timely comprehensive review of backdoor attacks and countermeasures on deep learning. According to the attacker's capability and affected stage of the machine learning pipeline, the attack surfaces are recognized to be wide and then formalized into six categorizations: code poisoning, outsourcing, pretrained, data collection, collaborative learning and post-… ▽ More

    Submitted 2 August, 2020; v1 submitted 21 July, 2020; originally announced July 2020.

    Comments: 29 pages, 9 figures, 2 tables

  9. arXiv:1911.10312  [pdf, other

    cs.CR

    Design and Evaluation of a Multi-Domain Trojan Detection Method on Deep Neural Networks

    Authors: Yansong Gao, Yeonjae Kim, Bao Gia Doan, Zhi Zhang, Gongxuan Zhang, Surya Nepal, Damith C. Ranasinghe, Hyoungshick Kim

    Abstract: This work corroborates a run-time Trojan detection method exploiting STRong Intentional Perturbation of inputs, is a multi-domain Trojan detection defence across Vision, Text and Audio domains---thus termed as STRIP-ViTA. Specifically, STRIP-ViTA is the first confirmed Trojan detection method that is demonstratively independent of both the task domain and model architectures. We have extensively e… ▽ More

    Submitted 22 November, 2019; originally announced November 2019.

    Comments: 14 pages

  10. Februus: Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems

    Authors: Bao Gia Doan, Ehsan Abbasnejad, Damith C. Ranasinghe

    Abstract: We propose Februus; a new idea to neutralize highly potent and insidious Trojan attacks on Deep Neural Network (DNN) systems at run-time. In Trojan attacks, an adversary activates a backdoor crafted in a deep neural network model using a secret trigger, a Trojan, applied to any input to alter the model's decision to a target prediction---a target determined by and only known to the attacker. Febru… ▽ More

    Submitted 28 September, 2020; v1 submitted 9 August, 2019; originally announced August 2019.

    Comments: 16 pages, to appear in the 36th Annual Computer Security Applications Conference (ACSAC 2020)

    Journal ref: In the 36th Annual Computer Security Applications Conference (ACSAC 2020)