MixBridge: Heterogeneous Image-to-Image Backdoor Attack through Mixture of Schr""odinger Bridges

📅 2025-05-12
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This paper addresses the challenge in Schrödinger Bridge (SB) diffusion models where multiple backdoor triggers struggle to coexist and rely on restrictive input distribution assumptions. We propose the first heterogeneous multi-trigger backdoor injection method compatible with arbitrary input distributions—including image-to-image translation—without modifying the underlying stochastic differential equation (SDE) dynamics, relying solely on poisoned image-pair training. Our core contributions are: (1) a Divide-and-Merge hybrid bridge strategy that decouples task-specific backdoor paths; and (2) a Weight Redistribution Scheme (WRS) to mitigate interference among concurrent backdoors. Integrating Diffusion Schrödinger Bridge (DSB) modeling, geometric-mean distribution priors, and dynamic weight fusion, our approach achieves precise multi-trigger activation, high-fidelity reconstruction, and strong stealth across diverse generative tasks—significantly outperforming both single-trigger and existing SB-based backdoor methods.

Technology Category

Application Category

📝 Abstract
This paper focuses on implanting multiple heterogeneous backdoor triggers in bridge-based diffusion models designed for complex and arbitrary input distributions. Existing backdoor formulations mainly address single-attack scenarios and are limited to Gaussian noise input models. To fill this gap, we propose MixBridge, a novel diffusion Schr""odinger bridge (DSB) framework to cater to arbitrary input distributions (taking I2I tasks as special cases). Beyond this trait, we demonstrate that backdoor triggers can be injected into MixBridge by directly training with poisoned image pairs. This eliminates the need for the cumbersome modifications to stochastic differential equations required in previous studies, providing a flexible tool to study backdoor behavior for bridge models. However, a key question arises: can a single DSB model train multiple backdoor triggers? Unfortunately, our theory shows that when attempting this, the model ends up following the geometric mean of benign and backdoored distributions, leading to performance conflict across backdoor tasks. To overcome this, we propose a Divide-and-Merge strategy to mix different bridges, where models are independently pre-trained for each specific objective (Divide) and then integrated into a unified model (Merge). In addition, a Weight Reallocation Scheme (WRS) is also designed to enhance the stealthiness of MixBridge. Empirical studies across diverse generation tasks speak to the efficacy of MixBridge.
Problem

Research questions and friction points this paper is trying to address.

Implanting multiple heterogeneous backdoor triggers in diffusion models
Overcoming performance conflict in training multiple backdoor triggers
Enhancing stealthiness of backdoor attacks with Weight Reallocation Scheme
Innovation

Methods, ideas, or system contributions that make the work stand out.

MixBridge uses mixture of Schrödinger bridges
Divide-and-Merge strategy integrates multiple triggers
Weight Reallocation Scheme enhances attack stealthiness
🔎 Similar Papers
No similar papers found.
S
Shixi Qin
School of Computer Science and Technology, University of Chinese Academy of Sciences, Beijing, China
Zhiyong Yang
Zhiyong Yang
Professor of Marketing, Miami University
Cross-cultural ResearchConsumer PsychologyFamily Decision-MakingConsumer Socialization
S
Shilong Bao
School of Computer Science and Technology, University of Chinese Academy of Sciences, Beijing, China
Shi Wang
Shi Wang
Institute of Computing Technology
knowledge graphnatural language processingneural-symbolic dual-process computing
Q
Qianqian Xu
Key Laboratory of Intelligent Information Processing, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China
Qingming Huang
Qingming Huang
University of the Chinese Academy of Sciences
Multimedia Analysis and RetrievalImage and Video ProcessingPattern RecognitionComputer VisionVideo Coding