Changes
On January 3, 2025 at 12:25:47 AM UTC, admin:
-
Changed value of field
doi_status
toTrue
in Interactive Simulations of Backdoors in Neural Networks -
Changed value of field
doi_date_published
to2025-01-03
in Interactive Simulations of Backdoors in Neural Networks -
Added resource Original Metadata to Interactive Simulations of Backdoors in Neural Networks
f | 1 | { | f | 1 | { |
2 | "access_rights": "", | 2 | "access_rights": "", | ||
3 | "author": "Peter Bajcsy", | 3 | "author": "Peter Bajcsy", | ||
4 | "author_email": "", | 4 | "author_email": "", | ||
5 | "citation": [], | 5 | "citation": [], | ||
6 | "creator_user_id": "17755db4-395a-4b3b-ac09-e8e3484ca700", | 6 | "creator_user_id": "17755db4-395a-4b3b-ac09-e8e3484ca700", | ||
7 | "defined_in": "https://doi.org/10.48550/arXiv.2405.13217", | 7 | "defined_in": "https://doi.org/10.48550/arXiv.2405.13217", | ||
8 | "doi": "10.57702/3rtxxahf", | 8 | "doi": "10.57702/3rtxxahf", | ||
n | 9 | "doi_date_published": null, | n | 9 | "doi_date_published": "2025-01-03", |
10 | "doi_publisher": "TIB", | 10 | "doi_publisher": "TIB", | ||
n | 11 | "doi_status": false, | n | 11 | "doi_status": true, |
12 | "domain": "https://service.tib.eu/ldmservice", | 12 | "domain": "https://service.tib.eu/ldmservice", | ||
13 | "extra_authors": [ | 13 | "extra_authors": [ | ||
14 | { | 14 | { | ||
15 | "extra_author": "Maxime Bros", | 15 | "extra_author": "Maxime Bros", | ||
16 | "orcid": "" | 16 | "orcid": "" | ||
17 | } | 17 | } | ||
18 | ], | 18 | ], | ||
19 | "groups": [ | 19 | "groups": [ | ||
20 | { | 20 | { | ||
21 | "description": "", | 21 | "description": "", | ||
22 | "display_name": "Artificial Intelligence", | 22 | "display_name": "Artificial Intelligence", | ||
23 | "id": "f0f22685-00f1-41f4-b006-ac1b68350d6e", | 23 | "id": "f0f22685-00f1-41f4-b006-ac1b68350d6e", | ||
24 | "image_display_url": "", | 24 | "image_display_url": "", | ||
25 | "name": "artificial-intelligence", | 25 | "name": "artificial-intelligence", | ||
26 | "title": "Artificial Intelligence" | 26 | "title": "Artificial Intelligence" | ||
27 | }, | 27 | }, | ||
28 | { | 28 | { | ||
29 | "description": "", | 29 | "description": "", | ||
30 | "display_name": "Neural Networks", | 30 | "display_name": "Neural Networks", | ||
31 | "id": "c9ee57da-3813-4bee-94f4-4a66273cf23f", | 31 | "id": "c9ee57da-3813-4bee-94f4-4a66273cf23f", | ||
32 | "image_display_url": "", | 32 | "image_display_url": "", | ||
33 | "name": "neural-networks", | 33 | "name": "neural-networks", | ||
34 | "title": "Neural Networks" | 34 | "title": "Neural Networks" | ||
35 | } | 35 | } | ||
36 | ], | 36 | ], | ||
37 | "id": "209bd885-72c8-47c5-86bc-14a5d7f2af66", | 37 | "id": "209bd885-72c8-47c5-86bc-14a5d7f2af66", | ||
38 | "isopen": false, | 38 | "isopen": false, | ||
39 | "landing_page": "https://pages.nist.gov/nn-calculator", | 39 | "landing_page": "https://pages.nist.gov/nn-calculator", | ||
40 | "license_title": null, | 40 | "license_title": null, | ||
41 | "link_orkg": "", | 41 | "link_orkg": "", | ||
42 | "metadata_created": "2025-01-03T00:25:45.531854", | 42 | "metadata_created": "2025-01-03T00:25:45.531854", | ||
n | 43 | "metadata_modified": "2025-01-03T00:25:45.531861", | n | 43 | "metadata_modified": "2025-01-03T00:25:46.408792", |
44 | "name": "interactive-simulations-of-backdoors-in-neural-networks", | 44 | "name": "interactive-simulations-of-backdoors-in-neural-networks", | ||
45 | "notes": "This work addresses the problem of planting and defending | 45 | "notes": "This work addresses the problem of planting and defending | ||
46 | cryptographic-based backdoors in artificial intelligence (AI) models. | 46 | cryptographic-based backdoors in artificial intelligence (AI) models. | ||
47 | The motivation comes from our lack of understanding and the | 47 | The motivation comes from our lack of understanding and the | ||
48 | implications of using cryptographic techniques for planting | 48 | implications of using cryptographic techniques for planting | ||
49 | undetectable backdoors under theoretical assumptions in the large AI | 49 | undetectable backdoors under theoretical assumptions in the large AI | ||
50 | model systems deployed in practice. Our approach is based on designing | 50 | model systems deployed in practice. Our approach is based on designing | ||
51 | a web-based simulation playground that enables planting, activating, | 51 | a web-based simulation playground that enables planting, activating, | ||
52 | and defending cryptographic backdoors in neural networks (NN). | 52 | and defending cryptographic backdoors in neural networks (NN). | ||
53 | Simulations of planting and activating backdoors are enabled for two | 53 | Simulations of planting and activating backdoors are enabled for two | ||
54 | scenarios: in the extension of NN model architecture to support | 54 | scenarios: in the extension of NN model architecture to support | ||
55 | digital signature verification and in the modified architectural block | 55 | digital signature verification and in the modified architectural block | ||
56 | for non-linear operators. Simulations of backdoor defense against | 56 | for non-linear operators. Simulations of backdoor defense against | ||
57 | backdoors are available based on proximity analysis and provide a | 57 | backdoors are available based on proximity analysis and provide a | ||
58 | playground for a game of planting and defending against backdoors. The | 58 | playground for a game of planting and defending against backdoors. The | ||
59 | simulations are available at https://pages.nist.gov/nn-calculator", | 59 | simulations are available at https://pages.nist.gov/nn-calculator", | ||
n | 60 | "num_resources": 0, | n | 60 | "num_resources": 1, |
61 | "num_tags": 4, | 61 | "num_tags": 4, | ||
62 | "organization": { | 62 | "organization": { | ||
63 | "approval_status": "approved", | 63 | "approval_status": "approved", | ||
64 | "created": "2024-11-25T12:11:38.292601", | 64 | "created": "2024-11-25T12:11:38.292601", | ||
65 | "description": "", | 65 | "description": "", | ||
66 | "id": "079d46db-32df-4b48-91f3-0a8bc8f69559", | 66 | "id": "079d46db-32df-4b48-91f3-0a8bc8f69559", | ||
67 | "image_url": "", | 67 | "image_url": "", | ||
68 | "is_organization": true, | 68 | "is_organization": true, | ||
69 | "name": "no-organization", | 69 | "name": "no-organization", | ||
70 | "state": "active", | 70 | "state": "active", | ||
71 | "title": "No Organization", | 71 | "title": "No Organization", | ||
72 | "type": "organization" | 72 | "type": "organization" | ||
73 | }, | 73 | }, | ||
74 | "owner_org": "079d46db-32df-4b48-91f3-0a8bc8f69559", | 74 | "owner_org": "079d46db-32df-4b48-91f3-0a8bc8f69559", | ||
75 | "private": false, | 75 | "private": false, | ||
76 | "relationships_as_object": [], | 76 | "relationships_as_object": [], | ||
77 | "relationships_as_subject": [], | 77 | "relationships_as_subject": [], | ||
t | 78 | "resources": [], | t | 78 | "resources": [ |
79 | { | ||||
80 | "cache_last_updated": null, | ||||
81 | "cache_url": null, | ||||
82 | "created": "2025-01-03T00:16:33", | ||||
83 | "data": [ | ||||
84 | "dcterms:title", | ||||
85 | "dcterms:accessRights", | ||||
86 | "dcterms:creator", | ||||
87 | "dcterms:description", | ||||
88 | "dcterms:issued", | ||||
89 | "dcterms:language", | ||||
90 | "dcterms:identifier", | ||||
91 | "dcat:theme", | ||||
92 | "dcterms:type", | ||||
93 | "dcat:keyword", | ||||
94 | "dcat:landingPage", | ||||
95 | "dcterms:hasVersion", | ||||
96 | "dcterms:format", | ||||
97 | "mls:task", | ||||
98 | "datacite:isDescribedBy" | ||||
99 | ], | ||||
100 | "description": "The json representation of the dataset with its | ||||
101 | distributions based on DCAT.", | ||||
102 | "format": "JSON", | ||||
103 | "hash": "", | ||||
104 | "id": "5f65719d-b011-4dcb-b175-aa1f38f5a3db", | ||||
105 | "last_modified": "2025-01-03T00:25:46.401526", | ||||
106 | "metadata_modified": "2025-01-03T00:25:46.411718", | ||||
107 | "mimetype": "application/json", | ||||
108 | "mimetype_inner": null, | ||||
109 | "name": "Original Metadata", | ||||
110 | "package_id": "209bd885-72c8-47c5-86bc-14a5d7f2af66", | ||||
111 | "position": 0, | ||||
112 | "resource_type": null, | ||||
113 | "size": 1713, | ||||
114 | "state": "active", | ||||
115 | "url": | ||||
116 | resource/5f65719d-b011-4dcb-b175-aa1f38f5a3db/download/metadata.json", | ||||
117 | "url_type": "upload" | ||||
118 | } | ||||
119 | ], | ||||
79 | "services_used_list": "", | 120 | "services_used_list": "", | ||
80 | "state": "active", | 121 | "state": "active", | ||
81 | "tags": [ | 122 | "tags": [ | ||
82 | { | 123 | { | ||
83 | "display_name": "Artificial Intelligence", | 124 | "display_name": "Artificial Intelligence", | ||
84 | "id": "d22f9a3d-05f2-413d-ae9a-156d84b4284e", | 125 | "id": "d22f9a3d-05f2-413d-ae9a-156d84b4284e", | ||
85 | "name": "Artificial Intelligence", | 126 | "name": "Artificial Intelligence", | ||
86 | "state": "active", | 127 | "state": "active", | ||
87 | "vocabulary_id": null | 128 | "vocabulary_id": null | ||
88 | }, | 129 | }, | ||
89 | { | 130 | { | ||
90 | "display_name": "Backdoors", | 131 | "display_name": "Backdoors", | ||
91 | "id": "c59119c2-cf6e-4f8d-bc1c-ac58bc4c44dc", | 132 | "id": "c59119c2-cf6e-4f8d-bc1c-ac58bc4c44dc", | ||
92 | "name": "Backdoors", | 133 | "name": "Backdoors", | ||
93 | "state": "active", | 134 | "state": "active", | ||
94 | "vocabulary_id": null | 135 | "vocabulary_id": null | ||
95 | }, | 136 | }, | ||
96 | { | 137 | { | ||
97 | "display_name": "Cryptographic Techniques", | 138 | "display_name": "Cryptographic Techniques", | ||
98 | "id": "3aa51659-1a69-4c44-8fb8-4cc708920e32", | 139 | "id": "3aa51659-1a69-4c44-8fb8-4cc708920e32", | ||
99 | "name": "Cryptographic Techniques", | 140 | "name": "Cryptographic Techniques", | ||
100 | "state": "active", | 141 | "state": "active", | ||
101 | "vocabulary_id": null | 142 | "vocabulary_id": null | ||
102 | }, | 143 | }, | ||
103 | { | 144 | { | ||
104 | "display_name": "Neural Networks", | 145 | "display_name": "Neural Networks", | ||
105 | "id": "b8e60d98-1c66-40d1-b944-74216c2bd378", | 146 | "id": "b8e60d98-1c66-40d1-b944-74216c2bd378", | ||
106 | "name": "Neural Networks", | 147 | "name": "Neural Networks", | ||
107 | "state": "active", | 148 | "state": "active", | ||
108 | "vocabulary_id": null | 149 | "vocabulary_id": null | ||
109 | } | 150 | } | ||
110 | ], | 151 | ], | ||
111 | "title": "Interactive Simulations of Backdoors in Neural Networks", | 152 | "title": "Interactive Simulations of Backdoors in Neural Networks", | ||
112 | "type": "dataset", | 153 | "type": "dataset", | ||
113 | "version": "" | 154 | "version": "" | ||
114 | } | 155 | } |