Skip to main content
. 2023 Jan 23;25(2):220. doi: 10.3390/e25020220
Algorithm 2 Online attacked sample detection
  • Input :

    Local poisoned data Dp, local benign data Dc, suspicious pre-trained DNN model f.

  • 1:

    Use Dp and Dc to fine-tune the f

  • 2:

    for all xDp do

  • 3:

        Ax← Deep features of the poisoned data extracted by model f

  • 4:

        Add Ax to the backdoor feature set Ap

  • 5:

    end for

  • 6:

    for all xDc do

  • 7:

        Ax← Deep features of the benign data extracted by model f

  • 8:

        Add Ax to the benign feature set Ac

  • 9:

    end for

  • 10:

    Train fc using Ap and Ac

  • 11:

    Ax←Deep features of the input sample x extracted by the online deployment model f

  • 12:

    iffcAx=benignthen

  • 13:

        Permission x input f

  • 14:

    else

  • 15:

        Reject x input f

  • 16:

    end if