Defeating misclassification attacks against transfer learning

Bang Wu, Shuo Wang, Xingliang Yuan, Cong Wang, Carsten Rudolph, Xiangwen Yang

Research output: Contribution to journalArticleResearchpeer-review

3 Citations (Scopus)

Abstract

Transfer learning is prevalent as a technique to efficiently generate new models (Student models) based on the knowledge transferred from a pre-trained model (Teacher model). However, Teacher models are often publicly available for sharing and reuse, which inevitably introduces vulnerability to trigger severe attacks against transfer learning systems. In this paper, we take a first step towards mitigating one of the most advanced misclassification attacks in transfer learning. We design a distilled \emph{differentiator} via activation-based network pruning to enervate the attack transferability while retaining accuracy. We adopt an ensemble structure from variant differentiators to improve the defence robustness. To avoid the bloated ensemble size during inference, we propose two-phase defence, in which inference from the Student model is firstly performed to narrow down the candidate differentiators to be assembled, and later only a small, fixed number of them can be chosen to validate clean or reject adversarial inputs effectively. Our comprehensive evaluations on both large and small image recognition tasks confirm that the Student models with our defence of only 5 differentiators immune over 90\% the adversarial inputs with accuracy loss less than 10\%. Our comparison also demonstrates that our design outperforms prior problematic defences.

Original languageEnglish
Pages (from-to)886-901
Number of pages16
JournalIEEE Transactions on Dependable and Secure Computing
Volume20
Issue number2
DOIs
Publication statusPublished - 1 Mar 2023

Keywords

  • Computational modeling
  • Data models
  • Deep neural network
  • Defence against adversarial examples
  • Mathematical models
  • Perturbation methods
  • Pre-trained model
  • Task analysis
  • Training
  • Transfer learning

Cite this