Don’t FREAK out: a frequency-inspired approach to detecting backdoor poisoned samples in DNNs

In this paper we investigate the frequency sensitivity of Deep Neural Networks (DNNs) when presented with clean samples versus poisoned samples. Our analysis shows significant disparities in frequency sensitivity between these two types of samples. Building on these findings, we propose FREAK, a fre...

Full description

Bibliographic Details
Main Authors: Hammoud, HAAK, Bibi, A, Torr, PHS, Ghanem, B
Format: Conference item
Language:English
Published: IEEE 2023
_version_ 1811139464898019328
author Hammoud, HAAK
Bibi, A
Torr, PHS
Ghanem, B
author_facet Hammoud, HAAK
Bibi, A
Torr, PHS
Ghanem, B
author_sort Hammoud, HAAK
collection OXFORD
description In this paper we investigate the frequency sensitivity of Deep Neural Networks (DNNs) when presented with clean samples versus poisoned samples. Our analysis shows significant disparities in frequency sensitivity between these two types of samples. Building on these findings, we propose FREAK, a frequency-based poisoned sample detection algorithm that is simple yet effective. Our experimental results demonstrate the efficacy of FREAK not only against frequency backdoor attacks but also against some spatial attacks. Our work is just the first step in leveraging these insights. We believe that our analysis and proposed defense mechanism will provide a foundation for future research and development of backdoor defenses.
first_indexed 2024-09-25T04:06:31Z
format Conference item
id oxford-uuid:1ac3310c-e51c-4833-bee6-acba9ed5f359
institution University of Oxford
language English
last_indexed 2024-09-25T04:06:31Z
publishDate 2023
publisher IEEE
record_format dspace
spelling oxford-uuid:1ac3310c-e51c-4833-bee6-acba9ed5f3592024-05-30T11:47:12ZDon’t FREAK out: a frequency-inspired approach to detecting backdoor poisoned samples in DNNsConference itemhttp://purl.org/coar/resource_type/c_5794uuid:1ac3310c-e51c-4833-bee6-acba9ed5f359EnglishSymplectic ElementsIEEE2023Hammoud, HAAKBibi, ATorr, PHSGhanem, BIn this paper we investigate the frequency sensitivity of Deep Neural Networks (DNNs) when presented with clean samples versus poisoned samples. Our analysis shows significant disparities in frequency sensitivity between these two types of samples. Building on these findings, we propose FREAK, a frequency-based poisoned sample detection algorithm that is simple yet effective. Our experimental results demonstrate the efficacy of FREAK not only against frequency backdoor attacks but also against some spatial attacks. Our work is just the first step in leveraging these insights. We believe that our analysis and proposed defense mechanism will provide a foundation for future research and development of backdoor defenses.
spellingShingle Hammoud, HAAK
Bibi, A
Torr, PHS
Ghanem, B
Don’t FREAK out: a frequency-inspired approach to detecting backdoor poisoned samples in DNNs
title Don’t FREAK out: a frequency-inspired approach to detecting backdoor poisoned samples in DNNs
title_full Don’t FREAK out: a frequency-inspired approach to detecting backdoor poisoned samples in DNNs
title_fullStr Don’t FREAK out: a frequency-inspired approach to detecting backdoor poisoned samples in DNNs
title_full_unstemmed Don’t FREAK out: a frequency-inspired approach to detecting backdoor poisoned samples in DNNs
title_short Don’t FREAK out: a frequency-inspired approach to detecting backdoor poisoned samples in DNNs
title_sort don t freak out a frequency inspired approach to detecting backdoor poisoned samples in dnns
work_keys_str_mv AT hammoudhaak dontfreakoutafrequencyinspiredapproachtodetectingbackdoorpoisonedsamplesindnns
AT bibia dontfreakoutafrequencyinspiredapproachtodetectingbackdoorpoisonedsamplesindnns
AT torrphs dontfreakoutafrequencyinspiredapproachtodetectingbackdoorpoisonedsamplesindnns
AT ghanemb dontfreakoutafrequencyinspiredapproachtodetectingbackdoorpoisonedsamplesindnns