Backdoor Pony: Evaluating backdoor attacks and defenses in different domains

Arthur Mercier*, Nikita Smolin, Oliver Sihlovec, Stefanos Koffas, Stjepan Picek

*Corresponding author for this work

Research output: Contribution to journalArticleScientificpeer-review

94 Downloads (Pure)

Abstract

Outsourced training and crowdsourced datasets lead to a new threat for deep learning models: the backdoor attack. In this attack, the adversary inserts a secret functionality in a model, activated through malicious inputs. Backdoor attacks represent an active research area due to diverse settings where they represent a real threat. Still, there is no framework to evaluate existing attacks and defenses in different domains. Only a few toolboxes have been implemented, but most of them focus on computer vision and are difficult to use. To bridge this gap, we implement Backdoor Pony, a framework for evaluating attacks and defenses in different domains through a user-friendly GUI.

Original languageEnglish
Article number101387
Number of pages8
JournalSoftwareX
Volume22
DOIs
Publication statusPublished - 2023

Keywords

  • Backdoor attacks
  • Backdoor defenses
  • Framework
  • Neural networks

Fingerprint

Dive into the research topics of 'Backdoor Pony: Evaluating backdoor attacks and defenses in different domains'. Together they form a unique fingerprint.

Cite this