论文标题
DeepTaster:基于对抗扰动的指纹识别,以识别深神经网络中的专有数据集的使用
DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks
论文作者
论文摘要
培训深度神经网络(DNNS)需要大量的数据集和强大的计算资源,这导致某些所有者未经许可就限制了重新分配。将机密数据嵌入DNN中的水印技术已被用来保护所有权,但是这些技术可以降低模型性能,并且容易受到水印去除攻击的影响。最近,引入了Deephuggh作为衡量犯罪嫌疑人与受害者模式之间相似性的替代方法。虽然Deephuggh在解决水印的缺点方面表现出了希望,但它主要解决了可疑模型复制受害者建筑的情况。在这项研究中,我们介绍了一种新型的DNN指纹技术DeepTaster,以解决受害者数据非法用于构建可疑模型的方案。 DeepTaster可以有效地识别此类DNN模型盗窃攻击,即使犯罪嫌疑人的建筑与受害者的构建偏离。为了实现这一目标,DeepTaster生成带有扰动的对抗图像,将它们转换为傅立叶频域,并使用这些转换后的图像来识别可疑模型中使用的数据集。基本的前提是,对抗图像可以捕获使用特定数据集构建的DNN的独特特征。为了证明DeepTaster的有效性,我们通过评估了三个模型架构(RESNET18,VGG16和DENSENET161)的三个数据集(CIFAR10,MNIST和TININE-IMAGENET)的检测准确性来评估DeepTaster的有效性。我们在各种攻击方案下进行了实验,包括转移学习,修剪,微调和数据增强。具体来说,在多架构攻击方案中,DeepTaster能够识别所有数据集中所有被盗的案例,而Deephugge未能检测到任何案例。
Training deep neural networks (DNNs) requires large datasets and powerful computing resources, which has led some owners to restrict redistribution without permission. Watermarking techniques that embed confidential data into DNNs have been used to protect ownership, but these can degrade model performance and are vulnerable to watermark removal attacks. Recently, DeepJudge was introduced as an alternative approach to measuring the similarity between a suspect and a victim model. While DeepJudge shows promise in addressing the shortcomings of watermarking, it primarily addresses situations where the suspect model copies the victim's architecture. In this study, we introduce DeepTaster, a novel DNN fingerprinting technique, to address scenarios where a victim's data is unlawfully used to build a suspect model. DeepTaster can effectively identify such DNN model theft attacks, even when the suspect model's architecture deviates from the victim's. To accomplish this, DeepTaster generates adversarial images with perturbations, transforms them into the Fourier frequency domain, and uses these transformed images to identify the dataset used in a suspect model. The underlying premise is that adversarial images can capture the unique characteristics of DNNs built with a specific dataset. To demonstrate the effectiveness of DeepTaster, we evaluated the effectiveness of DeepTaster by assessing its detection accuracy on three datasets (CIFAR10, MNIST, and Tiny-ImageNet) across three model architectures (ResNet18, VGG16, and DenseNet161). We conducted experiments under various attack scenarios, including transfer learning, pruning, fine-tuning, and data augmentation. Specifically, in the Multi-Architecture Attack scenario, DeepTaster was able to identify all the stolen cases across all datasets, while DeepJudge failed to detect any of the cases.