Deep neural networks (DNNs) are vulnerable to the \emph{backdoor attack}, which intends to embed hidden backdoors in DNNs by poisoning training data. The attacked model behaves normally on benign samples, whereas its prediction will be changed to a particular target label if hidden backdoors are activated. So far, backdoor research has mostly been conducted towards classification tasks. In this paper, we reveal that this threat could also happen in semantic segmentation, which may further endanger many mission-critical applications ($e.g.$, autonomous driving). Except for extending the existing attack paradigm to maliciously manipulate the segmentation models from the image-level, we propose a novel attack paradigm, the \emph{fine-grained attack}, where we treat the target label ($i.e.$, annotation) from the object-level instead of the image-level to achieve more sophisticated manipulation. In the annotation of poisoned samples generated by the fine-grained attack, only pixels of specific objects will be labeled with the attacker-specified target class while others are still with their ground-truth ones. Experiments show that the proposed methods can successfully attack semantic segmentation models by poisoning only a small proportion of training data. Our method not only provides a new perspective for designing novel attacks but also serves as a strong baseline for improving the robustness of semantic segmentation methods.
翻译:深心神经网络 (DNNS) 容易受到 emph{ back door attack} 的隐蔽后门攻击, 后者打算通过中毒培训数据将隐藏的后门嵌入 DNNT 。 被攻击的模型通常在良性样本中表现正常, 而如果隐藏的后门被激活, 则其预测将改变为特定的目标标签 。 到目前为止, 后门研究主要针对分类任务 。 在本文中, 我们发现, 这种威胁还可能发生在语义分割中, 这可能进一步危及许多任务关键应用程序( $. g.$, 自主驱动 ) 。 除了将现有的攻击模式扩展至恶意操纵 DNNP 的分割模型之外, 我们提议了一个新型攻击模式, 即\emph{ fine- gained attack great 攻击模式, 我们从目标层面而不是图像层面来处理目标标签 ($. $. $.$, a not not not not not not not not not develriction) ad deview gration gration grational gration gration gration as.