Defending Pre-trained Language Models as Few-shot Learners against Backdoor Attacks

Zhaohan Xi · Tianyu Du · Tianyu Du · Changjiang Li · Ren Pang · Shouling Ji · Jinghui Chen · Fenglong Ma · Ting Wang

Great Hall & Hall B1+B2 (level 1) #714
[ ]
Wed 13 Dec 8:45 a.m. PST — 10:45 a.m. PST


Pre-trained language models (PLMs) have demonstrated remarkable performance as few-shot learners. However, their security risks under such settings are largely unexplored. In this work, we conduct a pilot study showing that PLMs as few-shot learners are highly vulnerable to backdoor attacks while existing defenses are inadequate due to the unique challenges of few-shot scenarios. To address such challenges, we advocate MDP, a novel lightweight, pluggable, and effective defense for PLMs as few-shot learners. Specifically, MDP leverages the gap between the masking-sensitivity of poisoned and clean samples: with reference to the limited few-shot data as distributional anchors, it compares the representations of given samples under varying masking and identifies poisoned samples as ones with significant variations. We show analytically that MDP creates an interesting dilemma for the attacker to choose between attack effectiveness and detection evasiveness. The empirical evaluation using benchmark datasets and representative attacks validates the efficacy of MDP. The code of MDP is publicly available.

Chat is not available.