Anonymous ID: 71d1e7 Nov. 29, 2022, 6:42 p.m. No.17851876   🗄️.is đź”—kun   >>1936 >>1969 >>2005 >>2050 >>2058

Elon posted a picture of, among other things, a gun with no trigger visible.

 

https://mobile.twitter.com/elonmusk/status/1597165510595989504

 

A number of people commented that it was a fake or play gun.

 

A "hidden trigger," though, has meaning in his world (which is not my area of expertise - so am just tossing out ideas for others to assess):

 

  1. "Official Implementation of the AAAI-20 paper Hidden Trigger Backdoor Attacks

 

"With the success of deep learning algorithms in various domains, studying adversarial attacks to secure deep models in real world applications has become an important research topic.Backdoor attacks are a form of adversarial attacks on deep networkswhere the attacker providespoisoned datato the victim to train the model with, andthen activates the attack by showing a specific small triggerpattern at the test time. Most state-of-the-art backdoor attacks either provide mislabeled poisoning data that is possible to identify by visual inspection, reveal the trigger in the poisoned data, or use noise to hide the trigger.We proposea novel form of backdoor attack where poisoned data look natural with correct labels and also more importantly,the attacker hides the trigger in the poisoned data and keeps the trigger secret until the test time. We perform an extensive study on various image classification settings and show that our attack can fool the model by pasting the trigger at random locations on unseen images although the model performs well on clean data. We also show that our proposed attack cannot be easily defended using a state-of-the-art defense algorithm for backdoor attacks."

 

Sauce:

https://github.com/UMBCvision/Hidden-Trigger-Backdoor-Attacks

 

  1. Missed Trigger

 

"IPG 2.1 Game Play Error — Missed Trigger

 

"Definition

 

"A triggered ability triggers, but the player controlling the ability doesn’tdemonstrate awareness of the trigger’s existenceby the first time that it would affect the game in a visible fashion."

 

Sauce: https://blogs.magicjudges.org/rules/ipg2-1/

 

  1. NLP application for hidden trigger attacks

 

"Abstract:

 

"Thevulnerability of deep neural networks (DNN) to backdoor (trojan) attacksis extensively studiedfor the image domain$=. In a backdoor attack, a DNN is modified to exhibit expected behaviors under attacker-specified inputs (i.e., triggers==). Exploring the backdoor vulnerability of DNN in natural language processing (NLP), recent studies are limited to using specially added words/phrases as the trigger pattern (i.e., word-based triggers), which distorts the semantics of the base sentence, causes perceivable abnormality in linguistic features and can be eliminated by potential defensive techniques.

 

"In this paper, we present LiMnguistic Style-Motivated backdoor attack (LISM), thefirst hidden trigger backdoor attack which exploits implicit linguistic styles for backdooring NLP models. …"

 

https://www.usenix.org/conference/usenixsecurity22/presentation/pan-hidden

Anonymous ID: 71d1e7 Nov. 29, 2022, 7:10 p.m. No.17852054   🗄️.is đź”—kun

>> 17851876

TLDR version: "Elon Musk's posting of a photo of a gun with no visible trigger may have been a wink to would-be saboteurs that he is on to them - or - that they have fallen for a "hidden trigger" backdoor attack.