Skip to main content

Showing 1–3 of 3 results for author: Kiourti, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2211.01808  [pdf, ps, other

    cs.CR cs.LG

    Dormant Neural Trojans

    Authors: Feisi Fu, Panagiota Kiourti, Wenchao Li

    Abstract: We present a novel methodology for neural network backdoor attacks. Unlike existing training-time attacks where the Trojaned network would respond to the Trojan trigger after training, our approach inserts a Trojan that will remain dormant until it is activated. The activation is realized through a specific perturbation to the network's weight parameters only known to the attacker. Our analysis an… ▽ More

    Submitted 2 November, 2022; originally announced November 2022.

  2. arXiv:2103.15918  [pdf, other

    cs.CR cs.CV stat.ML

    MISA: Online Defense of Trojaned Models using Misattributions

    Authors: Panagiota Kiourti, Wenchao Li, Anirban Roy, Karan Sikka, Susmit Jha

    Abstract: Recent studies have shown that neural networks are vulnerable to Trojan attacks, where a network is trained to respond to specially crafted trigger patterns in the inputs in specific and potentially malicious ways. This paper proposes MISA, a new online approach to detect Trojan triggers for neural networks at inference time. Our approach is based on a novel notion called misattributions, which ca… ▽ More

    Submitted 23 September, 2021; v1 submitted 29 March, 2021; originally announced March 2021.

  3. arXiv:1903.06638  [pdf, other

    cs.CR cs.LG stat.ML

    TrojDRL: Trojan Attacks on Deep Reinforcement Learning Agents

    Authors: Panagiota Kiourti, Kacper Wardega, Susmit Jha, Wenchao Li

    Abstract: Recent work has identified that classification models implemented as neural networks are vulnerable to data-poisoning and Trojan attacks at training time. In this work, we show that these training-time vulnerabilities extend to deep reinforcement learning (DRL) agents and can be exploited by an adversary with access to the training process. In particular, we focus on Trojan attacks that augment th… ▽ More

    Submitted 28 February, 2019; originally announced March 2019.