Cassandra: Detecting Trojaned Networks From Adversarial Perturbations
Cassandra: Detecting Trojaned Networks From Adversarial Perturbations
Deep neural networks are being widely deployed for critical tasks. In many cases, pre-trained models are sourced from vendors who may have disrupted the training pipeline to insert Trojan behaviors. These malicious behaviors can be triggered at the adversary's will, which is a serious security threat. To verify the integrity …