{"id":"https://openalex.org/W3009216305","doi":"https://doi.org/10.1145/3378936.3378938","title":"FriendNet Backdoor","display_name":"FriendNet Backdoor","publication_year":2020,"publication_date":"2020-01-12","ids":{"openalex":"https://openalex.org/W3009216305","doi":"https://doi.org/10.1145/3378936.3378938","mag":"3009216305"},"language":"en","primary_location":{"id":"doi:10.1145/3378936.3378938","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3378936.3378938","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd International Conference on Software Engineering and Information Management","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040423887","display_name":"Hyun Kwon","orcid":"https://orcid.org/0000-0003-1169-9892"},"institutions":[{"id":"https://openalex.org/I157485424","display_name":"Korea Advanced Institute of Science and Technology","ror":"https://ror.org/05apxxy63","country_code":"KR","type":"education","lineage":["https://openalex.org/I157485424"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Hyun Kwon","raw_affiliation_strings":["Korea Advanced Institute of Science and Technology, School of Computing, Daejeon, South Korea"],"affiliations":[{"raw_affiliation_string":"Korea Advanced Institute of Science and Technology, School of Computing, Daejeon, South Korea","institution_ids":["https://openalex.org/I157485424"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101921593","display_name":"Hyunsoo Yoon","orcid":"https://orcid.org/0000-0002-2671-6491"},"institutions":[{"id":"https://openalex.org/I157485424","display_name":"Korea Advanced Institute of Science and Technology","ror":"https://ror.org/05apxxy63","country_code":"KR","type":"education","lineage":["https://openalex.org/I157485424"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Hyunsoo Yoon","raw_affiliation_strings":["Korea Advanced Institute of Science and Technology, School of Computing, Daejeon, South Korea"],"affiliations":[{"raw_affiliation_string":"Korea Advanced Institute of Science and Technology, School of Computing, Daejeon, South Korea","institution_ids":["https://openalex.org/I157485424"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037312953","display_name":"Ki-Woong Park","orcid":"https://orcid.org/0000-0002-3377-223X"},"institutions":[{"id":"https://openalex.org/I28777354","display_name":"Sejong University","ror":"https://ror.org/00aft1q37","country_code":"KR","type":"education","lineage":["https://openalex.org/I28777354"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Ki-Woong Park","raw_affiliation_strings":["Sejong University, Computer &amp; Information Security, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Sejong University, Computer &amp; Information Security, Seoul, South Korea","institution_ids":["https://openalex.org/I28777354"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5040423887"],"corresponding_institution_ids":["https://openalex.org/I157485424"],"apc_list":null,"apc_paid":null,"fwci":0.6628,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.7486829,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"16","issue":null,"first_page":"53","last_page":"57"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9872000217437744,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9843000173568726,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.9920058250427246},{"id":"https://openalex.org/keywords/mnist-database","display_name":"MNIST database","score":0.9256389141082764},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.8273955583572388},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.7350244522094727},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.720588743686676},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5263634324073792},{"id":"https://openalex.org/keywords/training-set","display_name":"Training set","score":0.41724294424057007},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39642593264579773},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.38490766286849976},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3759252727031708},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.23893725872039795}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.9920058250427246},{"id":"https://openalex.org/C190502265","wikidata":"https://www.wikidata.org/wiki/Q17069496","display_name":"MNIST database","level":3,"score":0.9256389141082764},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.8273955583572388},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.7350244522094727},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.720588743686676},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5263634324073792},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.41724294424057007},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39642593264579773},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.38490766286849976},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3759252727031708},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.23893725872039795}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3378936.3378938","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3378936.3378938","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd International Conference on Software Engineering and Information Management","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6100000143051147,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1963845801","display_name":null,"funder_award_id":"2018-0-00420","funder_id":"https://openalex.org/F4320335489","funder_display_name":"Institute for Information and Communications Technology Promotion"},{"id":"https://openalex.org/G264060168","display_name":null,"funder_award_id":"2017R1C1B2003957","funder_id":"https://openalex.org/F4320322120","funder_display_name":"National Research Foundation of Korea"}],"funders":[{"id":"https://openalex.org/F4320322120","display_name":"National Research Foundation of Korea","ror":"https://ror.org/013aysd81"},{"id":"https://openalex.org/F4320335489","display_name":"Institute for Information and Communications Technology Promotion","ror":"https://ror.org/01g0hqq23"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1945616565","https://openalex.org/W1968411139","https://openalex.org/W2076063813","https://openalex.org/W2112507308","https://openalex.org/W2112796928","https://openalex.org/W2125908420","https://openalex.org/W2180612164","https://openalex.org/W2243397390","https://openalex.org/W2516574342","https://openalex.org/W2591602089","https://openalex.org/W2748789698","https://openalex.org/W2750384547","https://openalex.org/W2753783305","https://openalex.org/W2934843808","https://openalex.org/W2943220429","https://openalex.org/W2949506549","https://openalex.org/W2953384591","https://openalex.org/W2963207607","https://openalex.org/W2963542245","https://openalex.org/W2964121744","https://openalex.org/W2964153729","https://openalex.org/W3014697957","https://openalex.org/W6631190155","https://openalex.org/W6637162671","https://openalex.org/W6713134421","https://openalex.org/W6719080892","https://openalex.org/W6743986261","https://openalex.org/W6752765571"],"related_works":["https://openalex.org/W3093748630","https://openalex.org/W3206218040","https://openalex.org/W4206776436","https://openalex.org/W4328053081","https://openalex.org/W4385573555","https://openalex.org/W4281570223","https://openalex.org/W2989852175","https://openalex.org/W3015716673","https://openalex.org/W4288797976","https://openalex.org/W3132644649"],"abstract_inverted_index":{"Deep":[0],"neural":[1],"networks":[2],"(DNNs)":[3],"provide":[4],"good":[5],"performance":[6],"in":[7,120,125,138,251],"image":[8],"recognition,":[9],"speech":[10],"recognition":[11],"and":[12,94,135,152,173,194,206,224,232,237,253,264,267],"pattern":[13],"analysis.":[14],"However,":[15,113],"DNNs":[16,32,45],"are":[17,167],"vulnerable":[18],"to":[19,26,33,106,145,162],"backdoor":[20,104,115,164,186],"attacks.":[21],"Backdoor":[22],"attacks":[23,165],"allow":[24],"attackers":[25,61],"proactively":[27],"access":[28],"training":[29],"data":[30,54],"of":[31,65,133,148,154,260,270],"train":[34],"additional":[35],"malicious":[36,53],"data,":[37,50,212],"including":[38,213],"the":[39,48,52,56,91,108,139,149,155,176,197,204,210,214,248,261,265,271],"specific":[40,57,80,215],"trigger.":[41],"In":[42,179],"normal":[43,49],"times,":[44],"correctly":[46,168,189,219],"classify":[47],"but":[51],"with":[55,86,209],"trigger":[58,216],"trained":[59],"by":[60,170,175,191,196,221,226],"can":[62,101,117],"cause":[63,95,146],"misclassification":[64,147],"DNNs.":[66],"For":[67],"example,":[68],"if":[69],"an":[70,82,96,99],"attacker":[71,100],"sets":[72],"up":[73],"a":[74,79,87,103,131,184,240],"road":[75,92],"sign":[76,93],"that":[77,166,187,217,247],"includes":[78],"trigger,":[81],"autonomous":[83],"vehicle":[84],"equipped":[85],"DNN":[88,109],"may":[89],"misidentify":[90],"accident.":[97],"Thus,":[98],"use":[102],"attack":[105,116,257],"threaten":[107],"at":[110],"any":[111],"time.":[112],"this":[114,180],"be":[118],"useful":[119],"certain":[121],"situations,":[122,141],"such":[123],"as":[124,234,239],"military":[126,140],"situations.":[127],"Since":[128],"there":[129],"is":[130,143,160,188,218],"mixture":[132],"enemy":[134,150,177,198,207,227,262],"friendly":[136,156,171,192,205,222,272],"force":[137],"it":[142,159],"necessary":[144,161],"equipment":[151,172],"classification":[153],"equipment.":[157,178],"Therefore,":[158],"make":[163],"recognized":[169,190,220],"misrecognized":[174],"paper,":[181],"we":[182],"propose":[183],"friendnet":[185],"classifier":[193,208,223,263],"misclassified":[195,225],"classifier.":[199,228],"This":[200],"method":[201,250],"additionally":[202],"trains":[203],"proposed":[211,249],"We":[229],"used":[230],"MNIST":[231,252],"Fashion-MNIST":[233,254],"experimental":[235],"datasets":[236],"Tensorflow":[238],"machine":[241],"learning":[242],"library.":[243],"Experimental":[244],"results":[245],"show":[246],"has":[255],"100%":[256],"success":[258],"rate":[259],"99.21%":[266],"92.3%":[268],"accuracy":[269],"classifier,":[273],"respectively.":[274]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2020-03-13T00:00:00"}
