SlideShare a Scribd company logo
DEFENSE
Army looks to block data
‘poisoning’ in facial recognition,
AI
(Getty Images)
SUBSCRIBE
Written by Jackson Barnett
Feb 11, 2020 | FEDSCOOP
The Army has many data problems. But when it comes to the
data that underlies facial recognition, one sticks out: Enemies
want to poison the well.
Adversaries are becoming more sophisticated at providing
“poisoned,” or subtly altered, data that will mistrain arti cial
intelligence and machine learning algorithms. To try and
safeguard facial recognition databases from these so-called
SUBSCRIBE
backdoor attacks, the Army is funding research to build
defensive software to mine through its databases.
Since deep learning algorithms are only as good as the data
they rely on, adversaries can use backdoor attacks to leave
the Army with untrustworthy AI or even bake-in the ability to
kill an algorithm when it sees a particular image, or “trigger.”
“People tend to modify the input data very slightly so it is not
so obvious to a human eye, but can fool the model,” said
Helen Li, a Duke University faculty member whose research
team received $60,000 from the Army Research Of ce for work
on an AI database defensive software.
Backdoors can be implanted into a database and labeled in a
way that trains the algorithm to “break” when it comes
across the image in the real world, Li said. For instance,
researchers at New York University trained an autonomous
car’s neural network so that when a stop sign had a yellow
Post-it Note on it, the car classi ed it instead as a speed
limit sign.
An AI problem and an Army problem
Data quality and security are challenges for AI developers who
use databases larger than any human can comb through for
anomalies. But the Army and other services face the added
layer threats from adversaries seeking to disarm the U.S.
military.
MaryAnne Fields, program manager for intelligent systems at
the Army Research Of ce, told FedScoop that countering
backdoor attacks and data poisoning is a high priority for her.
“The fact that you are using a large database is a two-way
street,” Fields said. “It is an opportunity for the adversary to
inject poison into the database.”
The software Li’s team is developing with ARO funding is
designed to detect potential backdoors in a database and
then instruct the algorithm to unlearn connections it may
have picked up from the bad data.
The trigger challenge doesn’t only emanate from attackers.
Models will misclassify novel images if they learn on a
database without the right size and diversity of data points.
Having too few images with too many of the same traits in the
same label group could cause unintentional “natural triggers,”
Fields said. For example, a photo of a man in a database
labeled as “Frank” wearing a hat in every image may cause the
SUBSCRIBE
algorithm to classify all men with hats as Frank, or miss the
real Frank if he isn’t wearing a hat.
“The Army does need to think differently about the type of
data it is using,” Fields said.
Using large databases forces the Army to make dif cult trade-
offs. Increasing the number of images increases the chance
for adversary attacks. Decrease the size and unintentional
triggers formed from a monolithic database becomes a
problem.
“If you don’t have very much data to work with, these types of
problems, and particularly the natural triggers, become more
prevalent,” Fields said. “It is important to defend.”
Scaling the solution
The test batch the Duke researches were given was small —
12,000 images of faces with 10 images per classi cation. Some
facial recognition databases exceed half a billion images.
But Li pointed to a different challenge: image resolution. As
images increase in quality, the complexity in searching for the
triggers increases “exponentially,” Li said.
That spike in dif culty is in part due to triggers that can be
only a few pixels large, according to research published in
2014. “It is easy to produce images that are completely
unrecognizable to humans, but that state-of-the-art (deep
neural networks) believe to be recognizable objects with
99.99% con dence,” the paper says.
Despite this, Fields expressed con dence in the project,
calling the team’s solution “very scalable.”
-In this Story-
Army, arti cial intelligence (AI), Duke University, facial
recognition
RELATED NEWS
SUBSCRIBE

More Related Content

PDF
Security and Privacy Measurements in Social Networks: Experiences and Lessons...
PDF
A Comparison Study of Android Mobile Forensics for Retrieving Files System
PDF
AndRadar: Fast Discovery of Android Applications in Alternative Markets
PDF
Andreas Haimböck-Tichy
PPTX
Biometric Databases and Hadoop__HadoopSummit2010
PDF
Addressing privacy concerns_in_the_age_of_federated_data_access
PDF
Terrorism in the Age of Big Data
PPTX
___________________________________________________________
Security and Privacy Measurements in Social Networks: Experiences and Lessons...
A Comparison Study of Android Mobile Forensics for Retrieving Files System
AndRadar: Fast Discovery of Android Applications in Alternative Markets
Andreas Haimböck-Tichy
Biometric Databases and Hadoop__HadoopSummit2010
Addressing privacy concerns_in_the_age_of_federated_data_access
Terrorism in the Age of Big Data
___________________________________________________________

Similar to Army looks to block data ‘poisoning’ in facial recognition, AI (20)

PDF
Simone Scardapane - The dark side of deep learning - Codemotion Milan 2017
PPTX
CTRL, Search, Exploit, and Destroy
PDF
AI: The New Player in Cybersecurity (Nov. 08, 2023)
PDF
THE INTEREST OF HYBRIDIZING EXPLAINABLE AI WITH RNN TO RESOLVE DDOS ATTACKS: ...
PDF
A Knowledge Transfer-Based Semi-Supervised Federated Learning for IoT Malware...
PDF
Deep Dive Into Deep Learning : How AI is Powering the Future of Endpoint Secu...
PDF
A foundation for breach data analysis
PDF
Deepfakes: An Emerging Internet Threat and their Detection
PDF
INT 1010 07-4.pdf
PPTX
Data De-identification
PPTX
Jason Samide - State of Security & 2016 Predictions
PPT
Polinter09
PDF
ENHANCING MALWARE DETECTION AND ANALYSIS USING DEEP LEARNING AND EXPLAINABLE ...
PDF
Data trawling and security strategies
PDF
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
PDF
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
PDF
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
PDF
Why Is Threat Intelligence the Key to Effective Pentesting and Red Teaming
PPTX
Big Data: 8 facts and 8 fictions
PDF
Data De-identification
Simone Scardapane - The dark side of deep learning - Codemotion Milan 2017
CTRL, Search, Exploit, and Destroy
AI: The New Player in Cybersecurity (Nov. 08, 2023)
THE INTEREST OF HYBRIDIZING EXPLAINABLE AI WITH RNN TO RESOLVE DDOS ATTACKS: ...
A Knowledge Transfer-Based Semi-Supervised Federated Learning for IoT Malware...
Deep Dive Into Deep Learning : How AI is Powering the Future of Endpoint Secu...
A foundation for breach data analysis
Deepfakes: An Emerging Internet Threat and their Detection
INT 1010 07-4.pdf
Data De-identification
Jason Samide - State of Security & 2016 Predictions
Polinter09
ENHANCING MALWARE DETECTION AND ANALYSIS USING DEEP LEARNING AND EXPLAINABLE ...
Data trawling and security strategies
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
Why Is Threat Intelligence the Key to Effective Pentesting and Red Teaming
Big Data: 8 facts and 8 fictions
Data De-identification
Ad

More from TJR Global (20)

PDF
Cloud Tech Innovations You May be Overlooking: Taking Advantage Of Microservi...
PDF
The main ICT and cloud trend will be edge computing
PDF
Over 80% of IT leaders will adopt or expand cloud-based IAM and face challenges
PDF
When Quantum Computing Meets Cloud Computing
PDF
Cloud Security Challenges 2021
PDF
Prioritizing The Cloud's Top Four Security Risks
PDF
When it Comes to Cybersecurity and Compliance, there is no Room for Error
PDF
Will AI replace cybersecurity teams completely?
PDF
Why 2021 willl be the year of Adaptive Cybersecurity?
PDF
Five tips for observability success amid cloud complexity
PDF
Is Serverless Computing Reafy to Go Mainstream?
PDF
The technologies driving business transformation in 2021
PDF
From Cloud Computing to Cooking: 4 Ways IT Mirrors Fine Cuisine
PDF
The Keys To Effective Cybersecurity, Accordiing To The Charter Of Trust
PDF
Eight Cybersecurity Lessons Learned From Life
PDF
Getting started with cloud computing: as review
PDF
Every little thing you meed to lnow about cloud computing
PDF
Top 10 cloud storage stories of 2020
PDF
Tech trends in 2021: Fast planes and home working
PDF
The US wants startups to get a piece of the $16 billion spent on space tech
Cloud Tech Innovations You May be Overlooking: Taking Advantage Of Microservi...
The main ICT and cloud trend will be edge computing
Over 80% of IT leaders will adopt or expand cloud-based IAM and face challenges
When Quantum Computing Meets Cloud Computing
Cloud Security Challenges 2021
Prioritizing The Cloud's Top Four Security Risks
When it Comes to Cybersecurity and Compliance, there is no Room for Error
Will AI replace cybersecurity teams completely?
Why 2021 willl be the year of Adaptive Cybersecurity?
Five tips for observability success amid cloud complexity
Is Serverless Computing Reafy to Go Mainstream?
The technologies driving business transformation in 2021
From Cloud Computing to Cooking: 4 Ways IT Mirrors Fine Cuisine
The Keys To Effective Cybersecurity, Accordiing To The Charter Of Trust
Eight Cybersecurity Lessons Learned From Life
Getting started with cloud computing: as review
Every little thing you meed to lnow about cloud computing
Top 10 cloud storage stories of 2020
Tech trends in 2021: Fast planes and home working
The US wants startups to get a piece of the $16 billion spent on space tech
Ad

Recently uploaded (20)

PPTX
Machine Learning_overview_presentation.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Big Data Technologies - Introduction.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Getting Started with Data Integration: FME Form 101
PPTX
Spectroscopy.pptx food analysis technology
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
A Presentation on Artificial Intelligence
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Tartificialntelligence_presentation.pptx
PDF
Electronic commerce courselecture one. Pdf
Machine Learning_overview_presentation.pptx
Spectral efficient network and resource selection model in 5G networks
Network Security Unit 5.pdf for BCA BBA.
Big Data Technologies - Introduction.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Assigned Numbers - 2025 - Bluetooth® Document
Digital-Transformation-Roadmap-for-Companies.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Getting Started with Data Integration: FME Form 101
Spectroscopy.pptx food analysis technology
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Per capita expenditure prediction using model stacking based on satellite ima...
A Presentation on Artificial Intelligence
20250228 LYD VKU AI Blended-Learning.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Tartificialntelligence_presentation.pptx
Electronic commerce courselecture one. Pdf

Army looks to block data ‘poisoning’ in facial recognition, AI

  • 1. DEFENSE Army looks to block data ‘poisoning’ in facial recognition, AI (Getty Images) SUBSCRIBE
  • 2. Written by Jackson Barnett Feb 11, 2020 | FEDSCOOP The Army has many data problems. But when it comes to the data that underlies facial recognition, one sticks out: Enemies want to poison the well. Adversaries are becoming more sophisticated at providing “poisoned,” or subtly altered, data that will mistrain arti cial intelligence and machine learning algorithms. To try and safeguard facial recognition databases from these so-called SUBSCRIBE
  • 3. backdoor attacks, the Army is funding research to build defensive software to mine through its databases. Since deep learning algorithms are only as good as the data they rely on, adversaries can use backdoor attacks to leave the Army with untrustworthy AI or even bake-in the ability to kill an algorithm when it sees a particular image, or “trigger.” “People tend to modify the input data very slightly so it is not so obvious to a human eye, but can fool the model,” said Helen Li, a Duke University faculty member whose research team received $60,000 from the Army Research Of ce for work on an AI database defensive software. Backdoors can be implanted into a database and labeled in a way that trains the algorithm to “break” when it comes across the image in the real world, Li said. For instance, researchers at New York University trained an autonomous car’s neural network so that when a stop sign had a yellow Post-it Note on it, the car classi ed it instead as a speed limit sign. An AI problem and an Army problem Data quality and security are challenges for AI developers who use databases larger than any human can comb through for anomalies. But the Army and other services face the added layer threats from adversaries seeking to disarm the U.S. military. MaryAnne Fields, program manager for intelligent systems at the Army Research Of ce, told FedScoop that countering backdoor attacks and data poisoning is a high priority for her. “The fact that you are using a large database is a two-way street,” Fields said. “It is an opportunity for the adversary to inject poison into the database.” The software Li’s team is developing with ARO funding is designed to detect potential backdoors in a database and then instruct the algorithm to unlearn connections it may have picked up from the bad data. The trigger challenge doesn’t only emanate from attackers. Models will misclassify novel images if they learn on a database without the right size and diversity of data points. Having too few images with too many of the same traits in the same label group could cause unintentional “natural triggers,” Fields said. For example, a photo of a man in a database labeled as “Frank” wearing a hat in every image may cause the SUBSCRIBE
  • 4. algorithm to classify all men with hats as Frank, or miss the real Frank if he isn’t wearing a hat. “The Army does need to think differently about the type of data it is using,” Fields said. Using large databases forces the Army to make dif cult trade- offs. Increasing the number of images increases the chance for adversary attacks. Decrease the size and unintentional triggers formed from a monolithic database becomes a problem. “If you don’t have very much data to work with, these types of problems, and particularly the natural triggers, become more prevalent,” Fields said. “It is important to defend.” Scaling the solution The test batch the Duke researches were given was small — 12,000 images of faces with 10 images per classi cation. Some facial recognition databases exceed half a billion images. But Li pointed to a different challenge: image resolution. As images increase in quality, the complexity in searching for the triggers increases “exponentially,” Li said. That spike in dif culty is in part due to triggers that can be only a few pixels large, according to research published in 2014. “It is easy to produce images that are completely unrecognizable to humans, but that state-of-the-art (deep neural networks) believe to be recognizable objects with 99.99% con dence,” the paper says. Despite this, Fields expressed con dence in the project, calling the team’s solution “very scalable.” -In this Story- Army, arti cial intelligence (AI), Duke University, facial recognition RELATED NEWS SUBSCRIBE