Category Ranking

98%

Total Visits

921

Avg Visit Duration

2 minutes

Citations

20

Article Abstract

Recent advancements in deep learning-based compression techniques have demonstrated remarkable performance surpassing traditional methods. Nevertheless, deep neural networks have been observed to be vulnerable to backdoor attacks, where an added pre-defined trigger pattern can induce the malicious behavior of the models. In this paper, we propose a novel approach to launch a backdoor attack with multiple triggers against learned image compression models. Drawing inspiration from the widely used discrete cosine transform (DCT) in existing compression codecs and standards, we propose a frequency-based trigger injection model that adds triggers in the DCT domain. In particular, we design several attack objectives that are adapted for a series of diverse scenarios, including: 1) attacking compression quality in terms of bit-rate and reconstruction quality; 2) attacking task-driven measures, such as face recognition and semantic segmentation in downstream applications. To facilitate more efficient training, we develop a dynamic loss function that dynamically balances the impact of different loss terms with fewer hyper-parameters, which also results in more effective optimization of the attack objectives with improved performance. Furthermore, we consider several advanced scenarios. We evaluate the resistance of the proposed backdoor attack to the defensive pre-processing methods and then propose a two-stage training schedule along with the design of robust frequency selection to further improve resistance. To strengthen both the cross-model and cross-domain transferability on attacking downstream CV tasks, we propose to shift the classification boundary in the attack loss during training. Extensive experiments also demonstrate that by employing our trained trigger injection models and making slight modifications to the encoder parameters of the compression model, our proposed attack can successfully inject multiple backdoors accompanied by their corresponding triggers into a single image compression model.

Download full-text PDF

Source
http://dx.doi.org/10.1109/TPAMI.2024.3507873DOI Listing

Publication Analysis

Top Keywords

image compression
12
backdoor attacks
8
backdoor attack
8
trigger injection
8
attack objectives
8
compression model
8
compression
7
attack
6
robust transferable
4
backdoor
4

Similar Publications

The integration of mobile health (mHealth) technologies is transforming neurosurgery. Despite its potential, many uses remain unrealized due to the unique challenges and complexity of developing mHealth technology. While neurosurgeons bring invaluable clinical expertise and an understanding of patient needs, the technical intricacies of application development often require collaboration with developers and computer scientists, a process that can feel unfamiliar and difficult to navigate.

View Article and Find Full Text PDF

Acute extremity compartment syndrome (CS) is a serious medical complication triggered by factors such as trauma, vascular injury, or prolonged compression, resulting in elevated intracompartmental pressure (ICP) and tissue ischemia. Diagnosis remains challenging, mainly relying on the subjective evaluation of clinical symptoms. Different animal models have been used to study pathophysiology and evaluate diagnostic and therapeutic approaches.

View Article and Find Full Text PDF

A spatial-frequency hybrid restoration network for JPEG compressed image deblurring.

Neural Netw

September 2025

organization=Chongqing Key Laboratory of Computer Network and Communication Technology, School of Computer Science and Technology (National Exemplary Software School), Chongqing University of Posts and Telecommunications, city=Chongqing, postcode=400065, country=China. Electronic address: tianh519@1

Image deblurring and compression-artifact removal are both ill-posed inverse problems in low-level vision tasks. So far, although numerous image deblurring and compression-artifact removal methods have been proposed respectively, the research for explicit handling blur and compression-artifact coexisting degradation image (BCDI) is rare. In the BCDI, image contents will be damaged more seriously, especially for edges and texture details.

View Article and Find Full Text PDF

Background: Postoperative swelling is a common complication after total knee arthroplasty (TKA), associated with pain, limited mobility, and delayed recovery. This study aimed to systematically review the literature on interventions that reduce postoperative swelling, categorized into preoperative, intraoperative, and postoperative phases.

Methods: A Preferred Reporting Items for Systematic Reviews and Meta-Analyses-compliant search of PubMed, Medline, Embase, and Cochrane databases was performed for clinical studies evaluating interventions to reduce swelling after primary TKA.

View Article and Find Full Text PDF

Strain sensors have received considerable attention in personal healthcare due to their ability to monitor real-time human movement. However, the lack of chemical sensing capabilities in existing strain sensors limits their utility for continuous biometric monitoring. Although the development of dual wearable sensors capable of simultaneously monitoring human motion and biometric data presents significant challenges, the ability to fabricate these sensors with geometries tailored to individual users is highly desirable.

View Article and Find Full Text PDF