当前位置:网站首页>Embedding malware into neural networks
Embedding malware into neural networks
2022-07-02 07:52:00 【MezereonXP】
Embed malware into Neural Networks
This introduction is entitled “EvilModel: Hiding Malware Inside of Neural Network Models ” The article .
This article mainly describes an implicit method of spreading malware , By modifying the weight of the neural network to achieve the spread of malware .

Essentially , Is to select some of the models “ redundancy ” The layer , Replace the weights of the neurons , For each weight , Replace its last 3 Bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit bit 3 A bit , And then realize the implicit transmission of malware .
Mentioned here redundancy , Actually, it passed the test , Check the impact on accuracy , Choose those layers that have little impact on the accuracy .

As shown in the figure above , The horizontal axis is the number of replacement neurons , The vertical axis is the accuracy of the modified model .
Here are some observations :
- As the number of modified neurons increases , The more accuracy is affected .
- Neurons closer to the input layer , It is more suitable for embedding malware , Less impact
Because the modification of neural network weight will reduce its original accuracy , So the author also explored the effect of heavy training , As shown in the figure below :

among ,BR Means before retraining (Before),AR It means after heavy training (After)
You can see , Didn't bring BN (BatchNorm) Layer network , Accuracy cannot be restored through retraining , With BN The accuracy of layer can be restored by retraining .
边栏推荐
- Calculate the difference in days, months, and years between two dates in PHP
- 常见CNN网络创新点
- 【学习笔记】Matlab自编高斯平滑器+Sobel算子求导
- A slide with two tables will help you quickly understand the target detection
- 程序的执行
- [CVPR‘22 Oral2] TAN: Temporal Alignment Networks for Long-term Video
- Point cloud data understanding (step 3 of pointnet Implementation)
- 【Random Erasing】《Random Erasing Data Augmentation》
- open3d学习笔记二【文件读写】
- Record of problems in the construction process of IOD and detectron2
猜你喜欢

【BiSeNet】《BiSeNet:Bilateral Segmentation Network for Real-time Semantic Segmentation》

jetson nano安装tensorflow踩坑记录(scipy1.4.1)

【学习笔记】Matlab自编高斯平滑器+Sobel算子求导

How do vision transformer work?【论文解读】

【AutoAugment】《AutoAugment:Learning Augmentation Policies from Data》

Implementation of yolov5 single image detection based on pytorch

Using compose to realize visible scrollbar

TimeCLR: A self-supervised contrastive learning framework for univariate time series representation

超时停靠视频生成
![[mixup] mixup: Beyond Imperial Risk Minimization](/img/14/8d6a76b79a2317fa619e6b7bf87f88.png)
[mixup] mixup: Beyond Imperial Risk Minimization
随机推荐
Faster-ILOD、maskrcnn_ Benchmark trains its own VOC data set and problem summary
【DIoU】《Distance-IoU Loss:Faster and Better Learning for Bounding Box Regression》
【TCDCN】《Facial landmark detection by deep multi-task learning》
mmdetection训练自己的数据集--CVAT标注文件导出coco格式及相关操作
【Hide-and-Seek】《Hide-and-Seek: A Data Augmentation Technique for Weakly-Supervised Localization xxx》
【Random Erasing】《Random Erasing Data Augmentation》
A slide with two tables will help you quickly understand the target detection
常见CNN网络创新点
用MLP代替掉Self-Attention
Generate random 6-bit invitation code in PHP
EKLAVYA -- 利用神经网络推断二进制文件中函数的参数
【Random Erasing】《Random Erasing Data Augmentation》
PointNet原理证明与理解
Yolov3 trains its own data set (mmdetection)
Determine whether the version number is continuous in PHP
【Cascade FPD】《Deep Convolutional Network Cascade for Facial Point Detection》
Drawing mechanism of view (II)
Feature Engineering: summary of common feature transformation methods
Use Baidu network disk to upload data to the server
【雙目視覺】雙目矯正