Research Article

DeepDefense: A Steganalysis-Based Backdoor Detecting and Mitigating Protocol in Deep Neural Networks for AI Security

Table 6

Effectiveness performance comparison of defensing protocols under different backdoor attacks.

DatasetAttack typeFP [15]ABL [19]Ours
ASR %CA %ASR %CA %ASR %CA %

CIFAR10None Attack0.0091.880.0092.750.0093.79
BadNets99.8190.370.4293.140.2190.54
Blend Attack100.0093.430.4876.560.1560.43
SSBA99.9093.090.5093.170.4390.81

VGGFACE2 subsetNone Attack0.0072.620.0082.960.0086.73
BadNets11.7977.260.0014.900.3283.36
Blend Attack14.8971.460.009.720.4678.67
SSBA11.4772.230.007.970.1784.27

For different attacks, bold values represents the best defense effect among the three defense schemes.