Transforming off-the-shelf deep neural network (DNN) models into dynamic multi-exit architectures can achieve inference and transmission efficiency by fragmenting and distributing a large DNN model in edge computing scenarios (e.g., edge devices and cloud servers). In this paper, we propose a novel backdoor attack specifically on the dynamic multi-exit DNN models. Particularly, we inject a backdoor by poisoning one DNN model's shallow hidden layers targeting not this vanilla DNN model but only its dynamically deployed multi-exit architectures. Our backdoored vanilla model behaves normally on performance and cannot be activated even with the correct trigger. However, the backdoor will be activated when the victims acquire this model and transform it into a dynamic multi-exit architecture at their deployment. We conduct extensive experiments to prove the effectiveness of our attack on three structures (ResNet-56, VGG-16, and MobileNet) with four datasets (CIFAR-10, SVHN, GTSRB, and Tiny-ImageNet) and our backdoor is stealthy to evade multiple state-of-the-art backdoor detection or removal methods.
翻译:将现成的深心神经网络(DNN)模型转化为动态多输出结构,可以在边缘计算情景(例如边缘装置和云服务器)中分割和分发大型DNN模型,从而实现推断和传输效率。在本文中,我们提议专门对动态多输出DNN模型进行新的后门攻击。特别是,我们通过毒害一个DNN模型的浅隐性层,而不是针对Vanilla DNN模型,而只是其动态部署的多输出结构。我们的后门香草模型在性能上表现正常,即使在正确的触发器下也无法激活。然而,当受害者获得该模型时,后门将启动,并在部署后门时将其转化为动态多输出结构。我们进行了广泛的实验,以证明我们用四个数据集(CIFAR-10、SVHN、GTRB和Ty-ImageNet)对三个结构(ResNet-56、VG-16和MiveNet)进行攻击的有效性,我们用四个数据集(CIFAR-10、SVHN、GTRB和TRB和T-Iy-ImageNet)和后门的后门是隐性躲避多状态探测或转移方法。