Vision Transformers Under Data Poisoning Attacks

dc.contributor.advisorNguyen, Thanh
dc.contributor.advisorHinkle, Lindsay
dc.contributor.advisorLowd, Daniel
dc.contributor.authorPeery, Gabriel
dc.date.accessioned2023-08-18T15:58:09Z
dc.date.available2023-08-18T15:58:09Z
dc.date.issued2023
dc.description72 pagesen_US
dc.description.abstractOwing to state-of-the-art performance and parallelizability, the Vision Transformer architecture is growing in prevalence for security-critical computer vision tasks. Designers may collect training images from public sources, but such data may be sabotaged; otherwise natural images may have subtle patterns added to them, crafted to cause a specific image to be incorrectly classified after training. Poisoning attack methods have been developed and tested on ResNets, but Vision Transformers' vulnerability has not been investigated. I develop a new poisoning attack method that augments Witches' Brew with heuristics for choosing which images to poison. I use it to attack DeiT, a Vision Transformer, while it is fine-tuned for benchmarks like classifying CIFAR-10. I also evaluate how DeiT's image tokenization introduces risk in the form of efficient attacks where sample modification is constrained to a limited count of patches. Progressively tightening constraints in extensive experiments, I compare the strength of attacks by observing which remain successful under the most challenging limitations. Accordingly, I find that the choice of objective greatly influences strength. In addition, I find that constraints on patch count deteriorate success rate more than those on image count. Attention rollout selection helps compensate, but image selection by gradient magnitude increases strength more. I find that Mixup and Cutmix are an effective defense, so I recommend them in security-critical applications.en_US
dc.identifier.orcid0009-0001-3538-5161
dc.identifier.urihttps://hdl.handle.net/1794/28707
dc.language.isoen_US
dc.publisherUniversity of Oregon
dc.rightsCC BY 4.0
dc.subjectDeep learningen_US
dc.subjectData poisoningen_US
dc.subjectVision Transformeren_US
dc.subjectCybersecurityen_US
dc.subjectComputer scienceen_US
dc.titleVision Transformers Under Data Poisoning Attacks
dc.typeThesis/Dissertation

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Peery_Gabriel_Thesis_CHC-UsedLaTeX.pdf
Size:
23.14 MB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
Name:
license.txt
Size:
2.12 KB
Format:
Plain Text
Description: