Javascript must be enabled to continue!
Sub-Band Backdoor Attack in Remote Sensing Imagery
View through CrossRef
Remote sensing datasets usually have a wide range of spatial and spectral resolutions. They provide unique advantages in surveillance systems, and many government organizations use remote sensing multispectral imagery to monitor security-critical infrastructures or targets. Artificial Intelligence (AI) has advanced rapidly in recent years and has been widely applied to remote image analysis, achieving state-of-the-art (SOTA) performance. However, AI models are vulnerable and can be easily deceived or poisoned. A malicious user may poison an AI model by creating a stealthy backdoor. A backdoored AI model performs well on clean data but behaves abnormally when a planted trigger appears in the data. Backdoor attacks have been extensively studied in machine learning-based computer vision applications with natural images. However, much less research has been conducted on remote sensing imagery, which typically consists of many more bands in addition to the red, green, and blue bands found in natural images. In this paper, we first extensively studied a popular backdoor attack, BadNets, applied to a remote sensing dataset, where the trigger was planted in all of the bands in the data. Our results showed that SOTA defense mechanisms, including Neural Cleanse, TABOR, Activation Clustering, Fine-Pruning, GangSweep, Strip, DeepInspect, and Pixel Backdoor, had difficulties detecting and mitigating the backdoor attack. We then proposed an explainable AI-guided backdoor attack specifically for remote sensing imagery by placing triggers in the image sub-bands. Our proposed attack model even poses stronger challenges to these SOTA defense mechanisms, and no method was able to defend it. These results send an alarming message about the catastrophic effects the backdoor attacks may have on satellite imagery.
Title: Sub-Band Backdoor Attack in Remote Sensing Imagery
Description:
Remote sensing datasets usually have a wide range of spatial and spectral resolutions.
They provide unique advantages in surveillance systems, and many government organizations use remote sensing multispectral imagery to monitor security-critical infrastructures or targets.
Artificial Intelligence (AI) has advanced rapidly in recent years and has been widely applied to remote image analysis, achieving state-of-the-art (SOTA) performance.
However, AI models are vulnerable and can be easily deceived or poisoned.
A malicious user may poison an AI model by creating a stealthy backdoor.
A backdoored AI model performs well on clean data but behaves abnormally when a planted trigger appears in the data.
Backdoor attacks have been extensively studied in machine learning-based computer vision applications with natural images.
However, much less research has been conducted on remote sensing imagery, which typically consists of many more bands in addition to the red, green, and blue bands found in natural images.
In this paper, we first extensively studied a popular backdoor attack, BadNets, applied to a remote sensing dataset, where the trigger was planted in all of the bands in the data.
Our results showed that SOTA defense mechanisms, including Neural Cleanse, TABOR, Activation Clustering, Fine-Pruning, GangSweep, Strip, DeepInspect, and Pixel Backdoor, had difficulties detecting and mitigating the backdoor attack.
We then proposed an explainable AI-guided backdoor attack specifically for remote sensing imagery by placing triggers in the image sub-bands.
Our proposed attack model even poses stronger challenges to these SOTA defense mechanisms, and no method was able to defend it.
These results send an alarming message about the catastrophic effects the backdoor attacks may have on satellite imagery.
Related Results
IBD: An Interpretable Backdoor-Detection Method via Multivariate Interactions
IBD: An Interpretable Backdoor-Detection Method via Multivariate Interactions
Recent work has shown that deep neural networks are vulnerable to backdoor attacks. In comparison with the success of backdoor-attack methods, existing backdoor-defense methods fac...
A Stealthy Backdoor Attack for Code Models
A Stealthy Backdoor Attack for Code Models
Abstract
Recent studies have shown that code models are susceptible to backdoor attacks. When injected with a backdoor, the victim code model can function normally on benig...
IMAGERY IN JULIANNE MACLEAN’S THE COLOR OF HEAVEN
IMAGERY IN JULIANNE MACLEAN’S THE COLOR OF HEAVEN
Imagery is a mental picture imagined by a reader. This research discusses imagery that existed in Julianne MacLean's novel The Color of Heaven. The Color of Heaven is a novel that ...
Deteksi dan Mitigasi Serangan Backdoor Menggunakan Python Watchdog
Deteksi dan Mitigasi Serangan Backdoor Menggunakan Python Watchdog
The number of cyber attacks is increasing. This happens thoroughly, both at the international and national levels. Technology, techniques, and methods of carrying out cyber attacks...
Financial Performance Analysis of Backdoor Listed Companies
Financial Performance Analysis of Backdoor Listed Companies
IPO listing threshold requirements are high, many enterprises have chosen to backdoor listing due to the restrictions of objective factors. In order to study the impact of backdoor...
Spin-wave band gaps created by rotating square rods in triangular lattice magnonic crystals
Spin-wave band gaps created by rotating square rods in triangular lattice magnonic crystals
Recently, magnonic crystals which are the magnetic counterparts of photonic crystals or phononic crystals are becoming a hot area of research. In this paper, band structure of two-...
Frequency Domain Backdoor Attacks for Visual Object Tracking
Frequency Domain Backdoor Attacks for Visual Object Tracking
Visual object tracking(VOT)is a key topic in computer vision tasks. It serves as an essential component of various advanced problems in the field, such as motion analysis, event de...
The Phenomenology of Offline Perception: Multisensory Profiles of Voluntary Mental Imagery and Dream Imagery
The Phenomenology of Offline Perception: Multisensory Profiles of Voluntary Mental Imagery and Dream Imagery
Both voluntary mental imagery and dream imagery involve multisensory representations without externally present stimuli that can be categorized as offline perceptions. Due to commo...

