Table of contents

Our attack is carried out in two distinct phases: backdoor injection and backdoor stealthiness. Experimental results using ResNet-18 and MobileNet-V2 models trained on CIFAR-10 and Tiny ImageNet datasets show the effectiveness of our proposed attack. The results highlight the success of our attack in increasing energy consumption on trigger samples while preserving the default model’s performance for clean/regular inputs.