Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Poisoning attack toward visual classification model
Jie LIANG, Xiaoyan HAO, Yongle CHEN
Journal of Computer Applications    2023, 43 (2): 467-473.   DOI: 10.11772/j.issn.1001-9081.2021122068
Abstract883)   HTML21)    PDF (3264KB)(279)       Save

In data poisoning attacks, backdoor attackers manipulate the distribution of training data by inserting the samples with hidden triggers into the training set to make the test samples misclassified so as to change model behavior and reduce model performance. However, the drawback of the existing triggers is the sample independence, that is, no matter what trigger mode is adopted, different poisoned samples contain the same triggers. Therefore, by combining image steganography and Deep Convolutional Generative Adversarial Network (DCGAN), an attack method based on sample was put forward to generate image texture feature maps according to the gray level co-occurrence matrix, embed target label character into the texture feature maps as a trigger by using the image steganography technology, and combine texture feature maps with trigger and clean samples into poisoned samples. Then, a large number of fake pictures with trigger were generated through DCGAN. In the training set samples, the original poisoned samples and the fake pictures generated by DCGAN were mixed together to finally achieve the effect that after the poisoner injecting a small number of poisoned samples, the attack rate was high and the effectiveness, sustainability and concealment of the trigger were ensured. Experimental results show that this method avoids the disadvantages of sample independence and has the model accuracy reached 93.78%. When the proportion of poisoned samples is 30%, data preprocessing, pruning defense and AUROR defense have the least influence on the success rate of attack, and the success rate of attack can reach about 56%.

Table and Figures | Reference | Related Articles | Metrics
Feedback load balancing algorithm based on B+ tree fast tuning
WANG Zheng-xia LIU Xiao-jie LIANG Gang
Journal of Computer Applications    2011, 31 (03): 609-612.   DOI: 10.3724/SP.J.1087.2011.00609
Abstract1523)      PDF (601KB)(1130)       Save
With the rapid development of Internet bandwidth, the parallel processing technique can greatly improve the performance of network intrusion detection system. Network Intrusion Detection System (NIDS) in parallel environment requires complete connection while balancing the traffic load. That is, packets belonging to one session should go to the same processing node. Based on the stability and balance characteristics of B+ tree, this paper proposed a feedback load balancing algorithm based on B+ tree fast tuning. B+ tree has characteristics of high search efficiency and stability. This algorithm tuned the B+ tree structure and remapped flow table when unbalanced. The simulation results show that this algorithm is able to balance the connection density of B+ tree, achieves a really satisfactory balance of the sensors' load and reduces the packet loss rate.
Related Articles | Metrics