Adversarial Examples Make Strong Poisons

Abstract

The adversarial machine learning literature is largely partitioned into evasion attacks on testing data and poisoning attacks on training data. In this work, we show that adversarial examples, originally intended for attacking pre-trained models, are even more effective for data poisoning than recent methods designed specifically for poisoning. In fact, adversarial examples with labels re-assigned by the crafting network remain effective for training, suggesting that adversarial examples contain useful semantic content, just with the "wrong" labels (according to a network, but not a human). Our method, adversarial poisoning, is substantially more effective than existing poisoning methods for secure dataset release, and we release a poisoned version of ImageNet, ImageNet-P, to encourage research into the strength of this form of data obfuscation.

Cite

Text

Fowl et al. "Adversarial Examples Make Strong Poisons." Neural Information Processing Systems, 2021.

Markdown

[Fowl et al. "Adversarial Examples Make Strong Poisons." Neural Information Processing Systems, 2021.](https://mlanthology.org/neurips/2021/fowl2021neurips-adversarial/)

BibTeX

@inproceedings{fowl2021neurips-adversarial,
  title     = {{Adversarial Examples Make Strong Poisons}},
  author    = {Fowl, Liam and Goldblum, Micah and Chiang, Ping-yeh and Geiping, Jonas and Czaja, Wojciech and Goldstein, Tom},
  booktitle = {Neural Information Processing Systems},
  year      = {2021},
  url       = {https://mlanthology.org/neurips/2021/fowl2021neurips-adversarial/}
}