We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

cs.LG

Change to browse by:

References & Citations

DBLP - CS Bibliography

Bookmark

(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo

Computer Science > Machine Learning

Title: Identifying a Training-Set Attack's Target Using Renormalized Influence Estimation

Abstract: Targeted training-set attacks inject malicious instances into the training set to cause a trained model to mislabel one or more specific test instances. This work proposes the task of target identification, which determines whether a specific test instance is the target of a training-set attack. Target identification can be combined with adversarial-instance identification to find (and remove) the attack instances, mitigating the attack with minimal impact on other predictions. Rather than focusing on a single attack method or data modality, we build on influence estimation, which quantifies each training instance's contribution to a model's prediction. We show that existing influence estimators' poor practical performance often derives from their over-reliance on training instances and iterations with large losses. Our renormalized influence estimators fix this weakness; they far outperform the original estimators at identifying influential groups of training examples in both adversarial and non-adversarial settings, even finding up to 100% of adversarial training instances with no clean-data false positives. Target identification then simplifies to detecting test instances with anomalous influence values. We demonstrate our method's effectiveness on backdoor and poisoning attacks across various data domains, including text, vision, and speech, as well as against a gray-box, adaptive attacker that specifically optimizes the adversarial instances to evade our method. Our source code is available at this https URL
Comments: Accepted at CCS'2022 -- Extended version including the supplementary material
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
DOI: 10.1145/3548606.3559335
Cite as: arXiv:2201.10055 [cs.LG]
  (or arXiv:2201.10055v2 [cs.LG] for this version)

Submission history

From: Zayd Hammoudeh [view email]
[v1] Tue, 25 Jan 2022 02:36:34 GMT (676kb,D)
[v2] Mon, 5 Sep 2022 11:25:03 GMT (711kb,D)

Link back to: arXiv, form interface, contact.