Chinese Journal of Network and Information Security ›› 2023, Vol. 9 ›› Issue (4): 90-103.doi: 10.11959/j.issn.2096-109x.2023056
• Papers • Previous Articles
Degang WANG, Yi SUN, Chuanxin ZHOU, Qi GAO, Fan YANG
Revised:
2022-05-30
Online:
2023-08-01
Published:
2023-08-01
CLC Number:
Degang WANG, Yi SUN, Chuanxin ZHOU, Qi GAO, Fan YANG. Malicious code within model detection method based on model similarity[J]. Chinese Journal of Network and Information Security, 2023, 9(4): 90-103.
[1] | MCMAHAN B , MOORE E , RAMAGE D ,et al. Communication-efficient learning of deep networks from decentralized data[C]// Artificial Intelligence and Statistics (AISTATS). 2017: 1273-1282. |
[2] | FREDRIKSON M , JHA S , RISTENPART T . Model inversion attacks that exploit confidence information and basic countermeasures[C]// Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS). 2015: 1322-1333. |
[3] | HITAJ B , ATENIESE G , PEREZ-CRUZ F . Deep models under the GAN:information leakage from collaborative deep learning[C]// Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS). 2017: 603-618. |
[4] | SHOKRI R , STRONATI M , SONG C ,et al. Membership inference attacks against machine learning models[C]// 2017 IEEE Symposium on Security and Privacy (S&P). 2017: 3-18. |
[5] | TRAMèR F , ZHANG F , JUELS A ,et al. Stealing machine learning models via prediction {APIs}[C]// 25th USENIX Security Symposium (USENIX Security 16). 2016: 601-618. |
[6] | GU T , DOLAN-GAVITT B , GARG S . Badnets:identifying vulnerabilities in the machine learning model supply chain[J]. arXiv Preprint arXiv:1708.06733, 2017. |
[7] | JI Y , ZHANG X , WANG T . Backdoor attacks against learning systems[C]// 2017 IEEE Conference on Communications and Network Security. 2017: 1-9. |
[8] | BAGDASARYAN E , VEIT A , HUA Y ,et al. How to backdoor federated learning[C]// International Conference on Artificial Intelligence and Statistics (AISTATS 2020). 2020: 2938-2948. |
[9] | JI Y , ZHANG X , JI S ,et al. Model-reuse attacks on deep learning systems[C]// Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS 2018). 2018: 349-363. |
[10] | YAO Y , LI H , ZHENG H ,et al. Regula sub-rosa:latent backdoor attacks on deep neural networks[J]. arXiv Preprint arXiv:1905.10447, 2019. |
[11] | YAO Y , LI H , ZHENG H ,et al. Latent backdoor attacks on deep neural networks[C]// Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS 2019). 2019: 2041-2055. |
[12] | BHAGOJI A N , CHAKRABORTY S , MITTAL P ,et al. Analyzing federated learning through an adversarial lens[C]// International Conference on Machine Learning (ICML). 2019: 634-643. |
[13] | CARLINI N , LIU C , ERLINGSSON ú ,et al. The secret sharer:evaluating and testing unintended memorization in neural networks[C]// 28th USENIX Security Symposium (USENIX Security 19). 2019: 267-284. |
[14] | LIU T , LIU Z , LIU Q ,et al. StegoNet:turn deep neural network into a stegomalware[C]// Annual Computer Security Applications Conference (ACSAC'20). 2020: 928-938. |
[15] | WANG Z , LIU C , CUI X . EvilModel:hiding malware inside of neural network models[C]// 2021 IEEE Symposium on Computers and Communications (ISCC). 2021: 1-7. |
[16] | WANG D G , SUN Y , ZHOU C X . A covert communication method based on gradient model[C]// 2021 IEEE 6th International Conference on Signal and Image Processing (ICSIP). 2021: 926-930. |
[17] | 周传鑫, 孙奕, 汪德刚 ,等. 联邦学习研究综述[J]. 网络与信息安全学报, 2021,7(5): 77-92. |
ZHOU C X , SUN Y , WANG D G ,et al. Survey of federated learning research[J]. Chinese Journal of Network and Information Security, 2021,7(5): 77-92. | |
[18] | LYU L , YU H , ZHAO J ,et al. Threats to federated learning[M]// Federated Learning. Berlin: Springer, 2020: 3-16. |
[19] | PROVOS N , HONEYMAN P . Hide and seek:an introduction to steganography[J]. IEEE Security & Privacy, 2003,1(3): 32-44. |
[20] | CHAN C K , CHENG L M . Hiding data in images by simple LSB substitution[J]. Pattern Recognition, 2004,37(3): 469-474. |
[21] | KAHAN W . IEEE standard 754 for binary floating-point arithmetic[J]. Lecture Notes on the Status of IEEE, 1996:11. |
[22] | FRIDRICH J , GOLJAN M , DU R . Reliable detection of LSB steganography in color and grayscale images[C]// Proceedings of the 2001 Workshop on Multimedia and Security:New Challenges (MM&Sec). 2001: 27-30. |
[23] | InQuest malware-samples[EB]. 2022. |
[24] | 范铭, 刘烃, 刘均 ,等. 安卓恶意软件检测方法综述[J]. 中国科学:信息科学, 2020,50(8): 1148-1177. |
FAN M , LIU T , LIU J ,et al. Android malware detection:a survey[J]. Scientia Sinica Informationis, 2020,50(8): 1148-1177. |
[1] | Shiyu HUANG, Feng YE, Tianqiang HUANG, Wei LI, Liqing HUANG, Haifeng LUO. Survey on adversarial attacks and defense of face forgery and detection [J]. Chinese Journal of Network and Information Security, 2023, 9(4): 1-15. |
[2] | Yue YU, Xianzheng LIN, Weihai LI, Nenghai YU. Privacy-preserving data compression scheme for k-anonymity model based on Huffman coding [J]. Chinese Journal of Network and Information Security, 2023, 9(4): 64-73. |
[3] | Tianpeng YE, Xiang LIN, Jianhua LI, Xuankai ZHANG, Liwen XU. Personalized lightweight distributed network intrusion detection system in fog computing [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 28-37. |
[4] | Guanyun FENG, Cai FU, Jianqiang LYU, Lansheng HAN. Insider threat detection based on operational attention and data augmentation [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 102-112. |
[5] | Feng YU, Qingxin LIN, Hui LIN, Xiaoding WANG. Privacy-enhanced federated learning scheme based on generative adversarial networks [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 113-122. |
[6] | Chuntao ZHU, Chengxi YIN, Bolin ZHANG, Qilin YIN, Wei LU. Forgery face detection method based on multi-domain temporal features mining [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 123-134. |
[7] | Jinyin CHEN, Rongchang LI, Guohan HUANG, Tao LIU, Haibin ZHENG, Yao CHENG. Survey on vertical federated learning: algorithm, privacy and security [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 1-20. |
[8] | Zhao CAI, Tao JING, Shuang REN. Survey on Ethereum phishing detection technology [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 21-32. |
[9] | Xiangdong HU, Lingling TANG. Method on intrusion detection for industrial internet based on light gradient boosting machine [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 46-55. |
[10] | Xin SHI, Yunfei GUO, Yawen WANG, Xiaoli SUN, Hao LIANG. Physical-social attributes integrated Sybil detection for Tor bridge distribution [J]. Chinese Journal of Network and Information Security, 2023, 9(1): 103-114. |
[11] | ANTONG P, Wen CHEN, Lifa WU. IoT intrusion detection method for unbalanced samples [J]. Chinese Journal of Network and Information Security, 2023, 9(1): 130-139. |
[12] | Long DAI, Jing ZHANG, Xuefeng FAN, Xiaoyi ZHOU. NLP neural network copyright protection based on black box watermark [J]. Chinese Journal of Network and Information Security, 2023, 9(1): 140-149. |
[13] | Wenxuan WU, Wenbo ZHOU, Weiming ZHANG, Nenghai YU. Deepfake detection method based on patch-wise lighting inconsistency [J]. Chinese Journal of Network and Information Security, 2023, 9(1): 167-177. |
[14] | Rongna XIE, Zhuhong MA, Zongyu LI, Ye TIAN. Encrypted traffic classification method based on convolutional neural network [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 84-91. |
[15] | Dengyong ZHANG, Huang WEN, Feng LI, Peng CAO, Lingyun XIANG, Gaobo YANG, Xiangling DING. Image inpainting forensics method based on dual branch network [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 110-122. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|