Research Article

Detection of Trojaning Attack on Neural Networks via Cost of Sample Classification

Figure 1

Trojaning attack example. Buckley is the legal user, while Assidi is an illegal user. Typically, the face-to-unlock technology grants access to legal user and rejected the illegal user. But when the illegal user activates the trojaned nodes that are preembedded in the neural network, the neural network will incorrectly identify the illegal user as a legal user.