Research Article
Detection of Trojaning Attack on Neural Networks via Cost of Sample Classification
Input: The node sensitivity on each layer , number of layers of the model , number of neurons on each layer | Output: Identify the abnormal nodes | (1) | for to do: | (2) | Sort the elements of the distribution in ascending order | (3) | Calculate the lower quartile position in : | (4) | Calculate the median quartile position in : | (5) | Calculate the upper quartile position in : | (6) | Calculate based on their positions | (7) | Calculate interquartile range | (8) | Calculate weak upper limit | (9) | Calculate weak lower limit | (10) | Calculate strong upper limit | (11) | Calculate strong upper limit | (12) | if | (13) | output the node is an abnormal node | (14) | end if | (15) | end for |
|