Visible to the public Towards Poisoning of Deep Learning Algorithms with Back-Gradient Optimization

TitleTowards Poisoning of Deep Learning Algorithms with Back-Gradient Optimization
Publication TypeConference Paper
Year of Publication2017
AuthorsMuñoz-González, Luis, Biggio, Battista, Demontis, Ambra, Paudice, Andrea, Wongrassamee, Vasin, Lupu, Emil C., Roli, Fabio
Conference NameProceedings of the 10th ACM Workshop on Artificial Intelligence and Security
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-5202-4
Keywordsadversarial examples, Adversarial Machine Learning, AI Poisoning, Deep Learning, Human Behavior, Metrics, pubcrawl, resilience, Resiliency, Scalability, spam detection, threat mitigation, training data poisoning
Abstract

A number of online services nowadays rely upon machine learning to extract valuable information from data collected in the wild. This exposes learning algorithms to the threat of data poisoning, i.e., a coordinate attack in which a fraction of the training data is controlled by the attacker and manipulated to subvert the learning process. To date, these attacks have been devised only against a limited class of binary learning algorithms, due to the inherent complexity of the gradient-based procedure used to optimize the poisoning points (a.k.a. adversarial training examples). In this work, we first extend the definition of poisoning attacks to multiclass problems. We then propose a novel poisoning algorithm based on the idea of back-gradient optimization, i.e., to compute the gradient of interest through automatic differentiation, while also reversing the learning procedure to drastically reduce the attack complexity. Compared to current poisoning strategies, our approach is able to target a wider class of learning algorithms, trained with gradient-based procedures, including neural networks and deep learning architectures. We empirically evaluate its effectiveness on several application examples, including spam filtering, malware detection, and handwritten digit recognition. We finally show that, similarly to adversarial test examples, adversarial training examples can also be transferred across different learning algorithms.

URLhttps://dl.acm.org/citation.cfm?doid=3128572.3140451
DOI10.1145/3128572.3140451
Citation Keymunoz-gonzalez_towards_2017