Loading Now

Summary of Backdoor in Seconds: Unlocking Vulnerabilities in Large Pre-trained Models Via Model Editing, by Dongliang Guo et al.


Backdoor in Seconds: Unlocking Vulnerabilities in Large Pre-trained Models via Model Editing

by Dongliang Guo, Mengxuan Hu, Zihan Guan, Junfeng Guo, Thomas Hartvigsen, Sheng Li

First submitted to arxiv on: 23 Oct 2024

Categories

  • Main: Artificial Intelligence (cs.AI)
  • Secondary: None

     Abstract of paper      PDF of paper


GrooveSquid.com Paper Summaries

GrooveSquid.com’s goal is to make artificial intelligence research accessible by summarizing AI papers in simpler terms. Each summary below covers the same AI paper, written at different levels of difficulty. The medium difficulty and low difficulty versions are original summaries written by GrooveSquid.com, while the high difficulty version is the paper’s original abstract. Feel free to learn from the version that suits you best!

Summary difficulty Written by Summary
High Paper authors High Difficulty Summary
Read the original abstract here
Medium GrooveSquid.com (original content) Medium Difficulty Summary
In this research paper, a type of adversarial attack called backdoor attacks is explored as a potential threat to machine learning models, particularly large pre-trained models like ViT. The authors investigate the challenges of performing these attacks on large pre-trained models and introduce an efficient method for doing so, EDT (Efficient, Data-free, Training-free). The method injects a lightweight codebook into the backdoor of the model, replacing the embedding of poisoned images with target images without requiring access to the training dataset or victim model. The authors demonstrate the effectiveness of their approach across various pre-trained models and downstream tasks such as image classification, captioning, and generation.
Low GrooveSquid.com (original content) Low Difficulty Summary
This paper is about making sure that powerful machine learning models can’t be tricked into doing something bad. Imagine someone trying to poison a big, successful AI model by adding fake information to its training data. The authors show that this kind of attack is possible and develop a way to do it without needing access to the AI’s training data or the original images. They test their method on different AI models and tasks, like recognizing objects in pictures or generating new images, and find that it works well.

Keywords

» Artificial intelligence  » Embedding  » Image classification  » Machine learning  » Vit