Algorithm 2 Online attacked sample detection |
-
1:
Use and to fine-tune the f
-
2:
for all do
-
3:
← Deep features of the poisoned data extracted by model f
-
4:
Add to the backdoor feature set
-
5:
end for
-
6:
for all do
-
7:
← Deep features of the benign data extracted by model f
-
8:
Add to the benign feature set
-
9:
end for
-
10:
Train using and
-
11:
←Deep features of the input sample x extracted by the online deployment model f
-
12:
ifthen
-
13:
Permission x input f
-
14:
else
-
15:
Reject x input f
-
16:
end if
|