{"id":"https://openalex.org/W4387075395","doi":"https://doi.org/10.48550/arxiv.2309.13579","title":"Seeing Is Not Always Believing: Invisible Collision Attack and Defence on Pre-Trained Models","display_name":"Seeing Is Not Always Believing: Invisible Collision Attack and Defence on Pre-Trained Models","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4387075395","doi":"https://doi.org/10.48550/arxiv.2309.13579"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/2309.13579","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false},"type":"preprint","type_crossref":"posted-content","indexed_in":["arxiv","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/abs/2309.13579","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102560390","display_name":"Minghang Deng","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Deng, Minghang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102012571","display_name":"Zhong Zhang","orcid":"https://orcid.org/0000-0002-4911-6173"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhang, Zhong","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5088843448","display_name":"Junming Shao","orcid":"https://orcid.org/0000-0002-1183-2991"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shao, Junming","raw_affiliation_strings":[],"affiliations":[]}],"institution_assertions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":67},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9975,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9975,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9509,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.4722656},{"id":"https://openalex.org/keywords/prefix","display_name":"Prefix","score":0.4627329}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.79346097},{"id":"https://openalex.org/C121704057","wikidata":"https://www.wikidata.org/wiki/Q352070","display_name":"Collision","level":2,"score":0.5015001},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48361245},{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.4722656},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.46950388},{"id":"https://openalex.org/C141603448","wikidata":"https://www.wikidata.org/wiki/Q134830","display_name":"Prefix","level":2,"score":0.4627329},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.44921213},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.40330705},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.34776205},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08548388},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/2309.13579","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"http://arxiv.org/abs/2309.13579","pdf_url":"http://arxiv.org/pdf/2309.13579","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false},{"is_oa":false,"landing_page_url":"https://api.datacite.org/dois/10.48550/arxiv.2309.13579","pdf_url":null,"source":{"id":"https://openalex.org/S4393179698","display_name":"DataCite API","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210145204","host_organization_name":"DataCite","host_organization_lineage":["https://openalex.org/I4210145204"],"host_organization_lineage_names":["DataCite"],"type":"metadata"},"license":null,"license_id":null,"version":null}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/2309.13579","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false},"sustainable_development_goals":[{"score":0.65,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4386185023","https://openalex.org/W4386080799","https://openalex.org/W4382469137","https://openalex.org/W4320031223","https://openalex.org/W4317672133","https://openalex.org/W4309417370","https://openalex.org/W4292107232","https://openalex.org/W4281902577","https://openalex.org/W4200629851","https://openalex.org/W3009072493"],"abstract_inverted_index":{"Large-scale":[0],"pre-trained":[1],"models":[2,118,134,201],"(PTMs)":[3],"such":[4],"as":[5],"BERT":[6],"and":[7,31,162,177,190,196,202],"GPT":[8],"have":[9,46],"achieved":[10],"great":[11],"success":[12],"in":[13,89],"diverse":[14],"fields.":[15],"The":[16,110],"typical":[17],"paradigm":[18],"is":[19,87,113,159],"to":[20,114,141,144],"pre-train":[21],"a":[22,97,167,179],"big":[23],"deep":[24,153],"learning":[25,154],"model":[26,35],"on":[27,36,104,138,152,199],"large-scale":[28],"data":[29,39,65,203],"sets,":[30],"then":[32],"fine-tune":[33],"the":[34,71,74,77,83,120,126,131,146,173,188],"small":[37],"task-specific":[38],"sets":[40],"for":[41,100,171,182],"downstream":[42],"tasks.":[43],"Although":[44],"PTMs":[45,105],"rapidly":[47],"progressed":[48],"with":[49,106,119],"wide":[50],"real-world":[51,90],"applications,":[52],"they":[53],"also":[54],"pose":[55],"significant":[56],"risks":[57],"of":[58,79,192],"potential":[59],"attacks.":[60],"Existing":[61],"backdoor":[62],"attacks":[63,151],"or":[64,81],"poisoning":[66],"methods":[67],"often":[68],"build":[69],"up":[70],"assumption":[72],"that":[73],"attacker":[75],"invades":[76],"computers":[78],"victims":[80,143],"accesses":[82],"target":[84],"data,":[85],"which":[86],"challenging":[88],"scenarios.":[91],"In":[92],"this":[93,156],"paper,":[94],"we":[95,165],"propose":[96,166],"novel":[98],"framework":[99],"an":[101],"invisible":[102],"attack":[103,158,195],"enhanced":[107],"MD5":[108,122,127,174],"collision.":[109,129],"key":[111],"idea":[112],"generate":[115],"two":[116,132],"equal-size":[117],"same":[121],"checksum":[123],"by":[124],"leveraging":[125],"chosen-prefix":[128,175],"Afterwards,":[130],"``same\"":[133],"will":[135],"be":[136],"deployed":[137],"public":[139],"websites":[140],"induce":[142],"download":[145],"poisoned":[147],"model.":[148],"Unlike":[149],"conventional":[150],"models,":[155],"new":[157],"flexible,":[160],"covert,":[161],"model-independent.":[163],"Additionally,":[164],"simple":[168],"defensive":[169,197],"strategy":[170],"recognizing":[172],"collision":[176],"provide":[178],"theoretical":[180],"justification":[181],"its":[183],"feasibility.":[184],"We":[185],"extensively":[186],"validate":[187],"effectiveness":[189],"stealthiness":[191],"our":[193],"proposed":[194],"method":[198],"different":[200],"sets.":[204]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4387075395","counts_by_year":[],"updated_date":"2025-01-02T01:16:08.440434","created_date":"2023-09-27"}