Qr code
CN
姚羽

Professor

Supervisor of Doctorate Candidates

Supervisor of Master's Candidates


E-Mail:

Administrative Position:复杂网络系统安全保障技术教育部工程研究中心主任

Education Level:With Certificate of Graduation for Doctorate Study

Gender:Male

Contact Information:yaoyu@mail.neu.edu.cn

Degree:博士

Alma Mater:东北大学

Discipline:Computer Applications Technology
Computer Software and Theory
Computer Architecture

Academic Honor:

2013   Excellent talents of the Ministry of education in the new century

Click:Times

The Last Update Time: ..

Current position: Home >> Scientific Research >> Paper Publications
Precise Defense Approach Against Small-Scale Backdoor Attacks in Industrial Internet of Things

Hits:

Journal:IEEE Internet of Things Journal

Impact Factor:8.2

Abstract:With the exceptional ability of deep learning to extract high-dimensional structures from massive datasets, its application in the Industrial Internet of Things (IIoT) has become increasingly prevalent. However, the inherent security vulnerabilities of deep learning pose a significant threat to IIoT systems, particularly in the form of backdoor attacks. Current defense methods are primarily designed for image processing tasks, and due to the uniqueness of industrial environments, their effectiveness is significantly reduced because of the lack of precision when applied directly to the IIoT applications. To address these challenges, this paper proposes a trigger detection method tailored for industrial environments, capable of precisely calculating the values of triggers during the detection process. Building on this, we introduce a saliency map-based trigger pruning method to further refine the triggers. Finally, utilizing these refined triggers, we perform trigger recovery to complete the backdoor defense against the IIoT model. Furthermore, by integrating these approaches, we construct a comprehensive detection-pruning-recovery defense framework against backdoor attacks in industrial settings. Experimental results across multiple industrial scenarios demonstrate that our method enhances the robustness of industrial applications against backdoor attacks, outperforming existing defense mechanisms.

Key Words:Backdoor attack, backdoor defense, Industrial Internet of Things (IIoT)

Indexed by:SCI JCR Q1

Note:https://ieeexplore.ieee.org/abstract/document/10753426

Discipline:Engineering

Document Type:JCR 一区

First-Level Discipline:Computer Science and Technology

Translation or Not:no