PulseAugur
LIVE 15:11:10
research · [1 source] ·
0
research

Researchers develop polymorphic backdoor attacks against semantic communication systems

Researchers have developed SemBugger, a novel polymorphic backdoor attack targeting semantic communication systems. Unlike previous monomorphic attacks, SemBugger can generate diverse malicious outputs by dynamically adjusting trigger intensity during training. This approach poisons training data with graded-intensity triggers and optimizes the system with hierarchical malicious loss, allowing the system's knowledge to adapt to trigger intensity while preserving fidelity for benign inputs. A new defense mechanism involving controlled noise addition has also been proposed to counter these attacks. AI

Summary written by gemini-2.5-flash-lite from 1 source. How we write summaries →

IMPACT Introduces a new class of sophisticated attacks against semantic communication systems, necessitating advancements in AI security defenses.

RANK_REASON Academic paper detailing a new type of backdoor attack and a corresponding defense mechanism.

Read on arXiv cs.AI →

COVERAGE [1]

  1. arXiv cs.AI TIER_1 · Xiao Yang, Yuni Lai, Gaolei Li, Jun Wu, Kai Zhou, Jianhua Li, Mingzhe Chen ·

    Toward Polymorphic Backdoor against Semantic Communication via Intensity-Based Poisoning

    arXiv:2604.23231v1 Announce Type: cross Abstract: Semantic Communication (SC) backdoor attacks aim to utilize triggers to manipulate the system into producing predetermined outputs via backdoored shared knowledge. Current SC backdoors adopt monomorphic paradigms with single attac…