|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 63 occurrences of 54 keywords
|
|
|
Results
Found 1221 publication records. Showing 1221 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
165 | Lionel Paris, Richard Ostrowski, Pierre Siegel, Lakhdar Sais |
From Horn Strong Backdoor Sets to Ordered Strong Backdoor Sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MICAI ![In: MICAI 2007: Advances in Artificial Intelligence, 6th Mexican International Conference on Artificial Intelligence, Aguascalientes, Mexico, November 4-10, 2007, Proceedings, pp. 105-117, 2007, Springer, 978-3-540-76630-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
143 | Stefan Szeider |
Backdoor Sets for DLL Subsolvers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Autom. Reason. ![In: J. Autom. Reason. 35(1-3), pp. 73-88, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
unit propagation, pure literal elimination, backdoor sets, W[P]-completeness, satisfiability, parameterized complexity |
117 | Jin Taek Kim, Jeong-Ho Kho, Min-Seok Hong, Choul Woong Son, Do-Won Lee, Sang-Jo Youk, Geuk Lee |
A study on intrusion protection techniques against Linux kernel backdoor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICHIT ![In: Proceedings of the 2009 International Conference on Hybrid Information Technology, ICHIT 2009, Daejeon, Korea, August 27-29, 2009, pp. 86-90, 2009, ACM, 978-1-60558-662-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
94 | Loïc Duflot |
CPU Bugs, CPU Backdoors and Consequences on Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings, pp. 580-599, 2008, Springer, 978-3-540-88312-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
hardware bug, hardware backdoor, CPU, x86 |
91 | Sherri Sparks, Shawn Embleton, Cliff Changchun Zou |
A chipset level network backdoor: bypassing host-based firewall & IDS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 125-134, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
network backdoor, rootkit, hardware security |
83 | Bistra Dilkina, Carla P. Gomes, Ashish Sabharwal |
Tradeoffs in the Complexity of Backdoor Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CP ![In: Principles and Practice of Constraint Programming - CP 2007, 13th International Conference, CP 2007, Providence, RI, USA, September 23-27, 2007, Proceedings, pp. 256-270, 2007, Springer, 978-3-540-74969-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
77 | Bistra Dilkina, Carla P. Gomes, Yuri Malitsky, Ashish Sabharwal, Meinolf Sellmann |
Backdoors to Combinatorial Optimization: Feasibility and Optimality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPAIOR ![In: Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems, 6th International Conference, CPAIOR 2009, Pittsburgh, PA, USA, May 27-31, 2009, Proceedings, pp. 56-70, 2009, Springer, 978-3-642-01928-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
backdoor sets, search, variable selection |
69 | Stephan Kottler, Michael Kaufmann 0001, Carsten Sinz |
A New Bound for an NP-Hard Subclass of 3-SAT Using Backdoors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAT ![In: Theory and Applications of Satisfiability Testing - SAT 2008, 11th International Conference, SAT 2008, Guangzhou, China, May 12-15, 2008. Proceedings, pp. 161-167, 2008, Springer, 978-3-540-79718-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
69 | Adam L. Young, Moti Yung |
Space-Efficient Kleptography Without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers, pp. 112-129, 2007, Springer, 978-3-540-77369-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
twisted elliptic curves, elliptic curve, Key exchange, kleptography |
66 | Adam L. Young, Moti Yung |
A Timing-Resistant Elliptic Curve Backdoor in RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers, pp. 427-441, 2007, Springer, 978-3-540-79498-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Twisted elliptic curves, RSA, subliminal channel, kleptography |
66 | Stefan Szeider |
Matched Formulas and Backdoor Sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAT ![In: Theory and Applications of Satisfiability Testing - SAT 2007, 10th International Conference, Lisbon, Portugal, May 28-31, 2007, Proceedings, pp. 94-99, 2007, Springer, 978-3-540-72787-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
66 | Lionel Paris, Richard Ostrowski, Pierre Siegel, Lakhdar Sais |
Computing Horn Strong Backdoor Sets Thanks to Local Search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICTAI ![In: 18th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2006), 13-15 November 2006, Arlington, VA, USA, pp. 139-143, 2006, IEEE Computer Society, 0-7695-2728-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
57 | Marko Samer, Stefan Szeider |
Backdoor Sets of Quantified Boolean Formulas. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Autom. Reason. ![In: J. Autom. Reason. 42(1), pp. 77-97, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Backdoor sets, Variable dependencies, Parameterized complexity, Quantified Boolean formulas |
52 | Loïc Duflot |
CPU bugs, CPU backdoors and consequences on security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 5(2), pp. 91-104, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
52 | Naomi Nishimura, Prabhakar Ragde, Stefan Szeider |
Solving #SAT using vertex covers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Acta Informatica ![In: Acta Informatica 44(7-8), pp. 509-523, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
52 | Naomi Nishimura, Prabhakar Ragde, Stefan Szeider |
Solving #SAT Using Vertex Covers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAT ![In: Theory and Applications of Satisfiability Testing - SAT 2006, 9th International Conference, Seattle, WA, USA, August 12-15, 2006, Proceedings, pp. 396-409, 2006, Springer, 3-540-37206-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
48 | Marko Samer, Stefan Szeider |
Backdoor Sets of Quantified Boolean Formulas. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAT ![In: Theory and Applications of Satisfiability Testing - SAT 2007, 10th International Conference, Lisbon, Portugal, May 28-31, 2007, Proceedings, pp. 230-243, 2007, Springer, 978-3-540-72787-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
48 | Adam L. Young, Moti Yung |
An Elliptic Curve Backdoor Algorithm for RSASSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers, pp. 355-374, 2006, Springer, 978-3-540-74123-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
43 | Matti Järvisalo, Tommi A. Junttila |
Limitations of restricted branching in clause learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Constraints An Int. J. ![In: Constraints An Int. J. 14(3), pp. 325-356, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Branching heuristics, Clause learning, Backdoor sets, Proof complexity, Propositional satisfiability, DPLL, Problem structure |
43 | Shih-Yao Dai, Sy-Yen Kuo |
MAPMon: A Host-Based Malware Detection Tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRDC ![In: 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 17-19 December, 2007, Melbourne, Victoria, Australia, pp. 349-356, 2007, IEEE Computer Society, 0-7695-3054-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Auto-Start Extensibility Point, Malware Attacking Points, Honeypot, Malicious Software, Backdoor |
43 | Hyungwoo Kang, Soon Jwa Hong, Dong Hoon Lee 0001 |
Matching Connection Pairs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: Parallel and Distributed Computing: Applications and Technologies, 5th International Conference, PDCAT 2004, Singapore, December 8-10, 2004, Proceedings, pp. 642-649, 2004, Springer, 3-540-24013-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Connection pairs, Detoured attack, Traceback, Stepping stone, Backdoor |
31 | Adam L. Young, Moti Yung |
A Space Efficient Backdoor in RSA and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers, pp. 128-143, 2005, Springer, 3-540-33108-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Decision Diffie-Hellman, black-box ciphers, twist on elliptic curves, RSA, elliptic curve cryptography, tamper-resistance, Diffie-Hellman, Key recovery, SETUP |
31 | Adam L. Young, Moti Yung |
Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings, pp. 297-311, 2003, Springer, 3-540-40515-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
hidden ciphers, obfuscated ciphers, black-box ciphers, Huffman compression, reverse-engineering, data compression, entropy, subliminal channel, Digital Rights Management (DRM), Symmetric ciphers, kleptography |
28 | Haibin Zheng, Haiyang Xiong, Jinyin Chen, Haonan Ma, Guohan Huang |
Motif-Backdoor: Rethinking the Backdoor Attack on Graph Neural Networks via Motifs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Comput. Soc. Syst. ![In: IEEE Trans. Comput. Soc. Syst. 11(2), pp. 2479-2493, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
28 | Haibin Zheng, Haiyang Xiong, Haonan Ma, Guohan Huang, Jinyin Chen |
Link-Backdoor: Backdoor Attack on Link Prediction via Node Injection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Comput. Soc. Syst. ![In: IEEE Trans. Comput. Soc. Syst. 11(2), pp. 1816-1831, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
28 | Jinyin Chen, Haiyang Xiong, Haibin Zheng, Jian Zhang 0023, Yi Liu 0024 |
Dyn-Backdoor: Backdoor Attack on Dynamic Link Prediction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Netw. Sci. Eng. ![In: IEEE Trans. Netw. Sci. Eng. 11(1), pp. 525-542, January - February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
28 | Soumyadeep Pal, Yuguang Yao, Ren Wang 0008, Bingquan Shen, Sijia Liu 0001 |
Backdoor Secrets Unveiled: Identifying Backdoor Data with Optimized Scaled Prediction Consistency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.10717, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
28 | Siyuan Liang, Kuanrong Liu, Jiajun Gong, Jiawei Liang, Yuan Xun, Ee-Chien Chang, Xiaochun Cao |
Unlearning Backdoor Threats: Enhancing Backdoor Defense in Multimodal Contrastive Learning via Local Token Unlearning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.16257, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
28 | Shangxi Wu, Qiuyang He, Yi Zhang 0101, Dongyuan Lu, Jitao Sang |
Debiasing backdoor attack: A benign application of backdoor attack in eliminating data bias. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 643, pp. 119171, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Arthur Mercier, Nikita Smolin, Oliver Sihlovec, Stefanos Koffas, Stjepan Picek |
Backdoor Pony: Evaluating backdoor attacks and defenses in different domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SoftwareX ![In: SoftwareX 22, pp. 101387, May 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Tinghao Xie, Xiangyu Qi, Ping He, Yiming Li, Jiachen T. Wang, Prateek Mittal |
BaDExpert: Extracting Backdoor Functionality for Accurate Backdoor Input Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2308.12439, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Huming Qiu, Junjie Sun, Mi Zhang, Xudong Pan, Min Yang |
BELT: Old-School Backdoor Attacks can Evade the State-of-the-Art Defense with Backdoor Exclusivity Lifting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2312.04902, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Shangxi Wu, Qiuyang He, Fangzhao Wu, Jitao Sang, Yaowei Wang, Changsheng Xu |
Backdoor for Debias: Mitigating Model Bias with Backdoor Attack-based Artificial Bias. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2303.01504, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Min Liu, Alberto L. Sangiovanni-Vincentelli, Xiangyu Yue |
Backdoor Defense with Non-Adversarial Backdoor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2307.15539, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Haomin Zhuang, Mingxian Yu, Hao Wang 0022, Yang Hua, Jian Li 0008, Xu Yuan 0001 |
Backdoor Federated Learning by Poisoning Backdoor-Critical Layers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2308.04466, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Bingxu Mu, Zhenxing Niu, Le Wang 0003, Xue Wang, Qiguang Mia, Rong Jin, Gang Hua 0001 |
Progressive Backdoor Erasing via connecting Backdoor and Adversarial Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CVPR ![In: IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2023, Vancouver, BC, Canada, June 17-24, 2023, pp. 20495-20503, 2023, IEEE, 979-8-3503-0129-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Shang Wang, Yansong Gao, Anmin Fu, Zhi Zhang 0001, Yuqing Zhang 0001, Willy Susilo, Dongxi Liu |
CASSOCK: Viable Backdoor Attacks against DNN in the Wall of Source-Specific Backdoor Defenses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, ASIA CCS 2023, Melbourne, VIC, Australia, July 10-14, 2023, pp. 938-950, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Haibin Zheng, Haiyang Xiong, Haonan Ma, Guohan Huang, Jinyin Chen |
Link-Backdoor: Backdoor Attack on Link Prediction via Node Injection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2208.06776, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Haibin Zheng, Haiyang Xiong, Jinyin Chen, Haonan Ma, Guohan Huang |
Motif-Backdoor: Rethinking the Backdoor Attack on Graph Neural Networks via Motifs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2210.13710, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Shang Wang, Yansong Gao, Anmin Fu, Zhi Zhang 0001, Yuqing Zhang 0001, Willy Susilo |
CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2206.00145, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Khoa D. Doan, Yingjie Lao, Ping Li 0001 |
Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2210.09194, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Shangxi Wu, Qiuyang He, Yi Zhang 0101, Jitao Sang |
Debiasing Backdoor Attack: A Benign Application of Backdoor Attack in Eliminating Data Bias. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2202.10582, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
28 | Kathrin Grosse, Taesung Lee, Battista Biggio, Youngja Park, Michael Backes 0001, Ian M. Molloy |
Backdoor smoothing: Demystifying backdoor attacks on deep neural networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 120, pp. 102814, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Rui Ning, Jiang Li 0001, Chunsheng Xin, Hongyi Wu, Chonggang Wang |
Hibernated Backdoor: A Mutual Information Empowered Backdoor Attack to Deep Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI ![In: Thirty-Sixth AAAI Conference on Artificial Intelligence, AAAI 2022, Thirty-Fourth Conference on Innovative Applications of Artificial Intelligence, IAAI 2022, The Twelveth Symposium on Educational Advances in Artificial Intelligence, EAAI 2022 Virtual Event, February 22 - March 1, 2022, pp. 10309-10318, 2022, AAAI Press, 978-1-57735-876-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Khoa D. Doan, Yingjie Lao, Ping Li 0001 |
Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NeurIPS ![In: Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, NeurIPS 2022, New Orleans, LA, USA, November 28 - December 9, 2022., 2022, 9781713871088. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
28 | Yue Gao 0011, Jack W. Stokes, Manoj Ajith Prasad, Andrew T. Marshall, Kassem Fawaz, Emre Kiciman |
I Know Your Triggers: Defending Against Textual Backdoor Attacks with Benign Backdoor Augmentation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MILCOM ![In: IEEE Military Communications Conference, MILCOM 2022, Rockville, MD, USA, November 28 - December 2, 2022, pp. 442-449, 2022, IEEE, 978-1-6654-8534-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Chuanshuai Chen, Jiazhu Dai |
Mitigating backdoor attacks in LSTM-based text classification systems by Backdoor Keyword Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Neurocomputing ![In: Neurocomputing 452, pp. 253-262, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
28 | Antonio Emanuele Cinà, Kathrin Grosse, Sebastiano Vascon, Ambra Demontis, Battista Biggio, Fabio Roli, Marcello Pelillo |
Backdoor Learning Curves: Explaining Backdoor Poisoning Beyond Influence Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2106.07214, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
28 | Jinyin Chen, Haiyang Xiong, Haibin Zheng, Jian Zhang 0023, Guodong Jiang, Yi Liu 0024 |
Dyn-Backdoor: Backdoor Attack on Dynamic Link Prediction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2110.03875, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
28 | Ziqi Wei, Junjian Shi, Yihe Duan, Ranyang Liu, Ye Han, Zheli Liu |
Backdoor Filter: Mitigating Visible Backdoor Triggers in Dataset. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DTPI ![In: IEEE 2nd International Conference on Digital Twins and Parallel Intelligence, DTPI 2022, Boston, MA, USA, October 24-28, 2022, pp. 102-105, 2021, IEEE, 978-1-6654-9227-0. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
28 | Zahra Ashktorab, Casey Dugan, James Johnson, Aabhas Sharma, Dustin Ramsey Torres, Ingrid Lange, Benjamin Hoover, Heiko Ludwig, Bryant Chen, Nathalie Baracaldo, Werner Geyer, Qian Pan |
The Design and Development of a Game to Study Backdoor Poisoning Attacks: The Backdoor Game. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IUI ![In: IUI '21: 26th International Conference on Intelligent User Interfaces, College Station, TX, USA, April 13-17, 2021, pp. 423-433, 2021, ACM, 978-1-4503-8017-1. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
28 | Shuang Li, Hongwei Li 0001, Hanxiao Chen |
Stand-in Backdoor: A Stealthy and Powerful Backdoor Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: IEEE Global Communications Conference, GLOBECOM 2021, Madrid, Spain, December 7-11, 2021, pp. 1-6, 2021, IEEE, 978-1-7281-8104-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
28 | Meirong Liu, Hong Zheng, Qin Liu 0001, Xiaofei Xing, Yinglong Dai |
A Backdoor Embedding Method for Backdoor Detection in Deep Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers, pp. 1-12, 2021, Springer, 978-981-19-0467-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
28 | Chuanshuai Chen, Jiazhu Dai |
Mitigating backdoor attacks in LSTM-based Text Classification Systems by Backdoor Keyword Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2007.12070, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
28 | Yunfei Liu, Xingjun Ma, James Bailey 0001, Feng Lu 0005 |
Reflection Backdoor: A Natural Backdoor Attack on Deep Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2007.02343, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
28 | Hyun Kwon, Hyunsoo Yoon, Ki-Woong Park |
Multi-Targeted Backdoor: Indentifying Backdoor Attack for Multiple Deep Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Inf. Syst. ![In: IEICE Trans. Inf. Syst. 103-D(4), pp. 883-887, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Kota Yoshida, Takeshi Fujino |
Disabling Backdoor and Identifying Poison Data by using Knowledge Distillation in Backdoor Attacks on Deep Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec@CCS ![In: AISec@CCS 2020: Proceedings of the 13th ACM Workshop on Artificial Intelligence and Security, Virtual Event, USA, 13 November 2020., pp. 117-127, 2020, ACM, 978-1-4503-8094-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Hyun Kwon, Hyunsoo Yoon, Ki-Woong Park |
FriendNet Backdoor: Indentifying Backdoor Attack that is safe for Friendly Deep Neural Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSIM ![In: ICSIM '20: The 3rd International Conference on Software Engineering and Information Management, Sydney, NSW, Australia, January 12-15, 2020, pp. 53-57, 2020, ACM, 978-1-4503-7690-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Yunfei Liu, Xingjun Ma, James Bailey 0001, Feng Lu 0005 |
Reflection Backdoor: A Natural Backdoor Attack on Deep Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECCV (10) ![In: Computer Vision - ECCV 2020 - 16th European Conference, Glasgow, UK, August 23-28, 2020, Proceedings, Part X, pp. 182-199, 2020, Springer, 978-3-030-58606-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Guillaume Escamocher, Mohamed Siala 0002, Barry O'Sullivan |
From Backdoor Key to Backdoor Completability: Improving a Known Measure of Hardness for the Satisfiable CSP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPAIOR ![In: Integration of Constraint Programming, Artificial Intelligence, and Operations Research - 15th International Conference, CPAIOR 2018, Delft, The Netherlands, June 26-29, 2018, Proceedings, pp. 198-214, 2018, Springer, 978-3-319-93030-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Constantinos Patsakis, Nikolaos Alexandris |
A New SETUP for Factoring Based Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), Darmstadt, Germany, 15-17 October, 2010, Proceedings, pp. 200-203, 2010, IEEE Computer Society, 978-1-4244-8378-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Secretly Embedded Trapdoor with Universal Protection, Coppersmith's theorem, cryptovirology, RSA, public key cryptography, factoring, backdoor |
17 | Siddharth Gupta 0001, Christopher Hunter, Patrick Murphy, Ashutosh Sabharwal |
WARPnet: clean slate research on deployed wireless networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiHoc ![In: Proceedings of the 10th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2009, New Orleans, LA, USA, May 18-21, 2009, pp. 331-332, 2009, ACM, 978-1-60558-531-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
warpnet, measurement, wireless, control, warp |
17 | S. Momina Tabish, M. Zubair Shafiq, Muddassar Farooq |
Malware detection using statistical analysis of byte-level file content. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD Workshop on CyberSecurity and Intelligence Informatics ![In: Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, Paris, France, June 28, 2009, pp. 23-31, 2009, ACM, 978-1-60558-669-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
computer malware, data mining, forensics |
17 | Bistra Dilkina, Carla P. Gomes, Ashish Sabharwal |
Backdoors in the Context of Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAT ![In: Theory and Applications of Satisfiability Testing - SAT 2009, 12th International Conference, SAT 2009, Swansea, UK, June 30 - July 3, 2009. Proceedings, pp. 73-79, 2009, Springer, 978-3-642-02776-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Yong Gao 0001 |
Random Instances of W[2]-Complete Problems: Thresholds, Complexity, and Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAT ![In: Theory and Applications of Satisfiability Testing - SAT 2008, 11th International Conference, SAT 2008, Guangzhou, China, May 12-15, 2008. Proceedings, pp. 91-104, 2008, Springer, 978-3-540-79718-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Stephan Kottler, Michael Kaufmann 0001, Carsten Sinz |
Computation of Renameable Horn Backdoors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAT ![In: Theory and Applications of Satisfiability Testing - SAT 2008, 11th International Conference, SAT 2008, Guangzhou, China, May 12-15, 2008. Proceedings, pp. 154-160, 2008, Springer, 978-3-540-79718-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Jian-Xia Wang, Wan-Zhen Zhou, Yun-Feng Xu |
Embedded Intrusion Detection and Authority Management System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 982-985, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Peter Gregory, Maria Fox 0001, Derek Long |
A New Empirical Study of Weak Backdoors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CP ![In: Principles and Practice of Constraint Programming, 14th International Conference, CP 2008, Sydney, Australia, September 14-18, 2008. Proceedings, pp. 618-623, 2008, Springer, 978-3-540-85957-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Chun-Ming Leung, Yuen-Yan Chan |
Network Forensic on Encrypted Peer-to-Peer VoIP Traffics and the Detection, Blocking, and Prioritization of Skype Traffics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 16th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE 2007), 18-20 June 2007, Paris, France, pp. 401-408, 2007, IEEE Computer Society, 0-7695-2879-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Enterprise Network Security, Network Foren- sics, Traffic Prioritiza- tion, Reverse Engineering, Blocking, Traffic Analysis, Skype, NAT Traversal |
17 | José M. González, Vern Paxson |
Enhancing Network Intrusion Detection with Integrated Sampling and Filtering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 9th International Symposium, RAID 2006, Hamburg, Germany, September 20-22, 2006, Proceedings, pp. 272-289, 2006, Springer, 3-540-39723-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Seungwon Shin, Jaeyeon Jung, Hari Balakrishnan |
Malware prevalence in the KaZaA file-sharing network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, IMC 2006, Rio de Janeriro, Brazil, October 25-27, 2006, pp. 333-338, 2006, ACM, 1-59593-561-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
KaZaA, virus prevalence, peer-to-peer |
17 | Tzer-Shyong Chen, Fuh-Gwo Jeng, Yu-Chia Liu |
Hacking Tricks Toward Security on Network Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2006), 4-7 December 2006, Taipei, Taiwan, pp. 442-447, 2006, IEEE Computer Society, 0-7695-2736-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Hacking tricks, Trojan programs, Intrusion detection system, Firewall, Phishing |
17 | Kevin Borders, Atul Prakash 0001 |
Web tap: detecting covert web traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004, pp. 110-120, 2004, ACM, 1-58113-961-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
spyware detection, intrusion detection, anomaly detection, HTTP, covert channels, tunnels |
17 | Inês Lynce, João Marques-Silva 0001 |
Hidden Structure in Unsatisfiable Random 3-SAT: An Empirical Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICTAI ![In: 16th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2004), 15-17 November 2004, Boca Raton, FL, USA, pp. 246-251, 2004, IEEE Computer Society, 0-7695-2236-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | A. Murat Fiskiran, Ruby B. Lee |
Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCD ![In: 22nd IEEE International Conference on Computer Design: VLSI in Computers & Processors (ICCD 2004), 11-13 October 2004, San Jose, CA, USA, Proceedings, pp. 452-457, 2004, IEEE Computer Society, 0-7695-2231-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Joel M. Gompert |
Local Search with Maximal Independent Sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CP ![In: Principles and Practice of Constraint Programming - CP 2004, 10th International Conference, CP 2004, Toronto, Canada, September 27 - October 1, 2004, Proceedings, pp. 795, 2004, Springer, 3-540-23241-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Mauro Borchardt, Carlos Maziero, Edgard Jamhour |
An Architecture for On-the-Fly File Integrity Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LADC ![In: Dependable Computing, First Latin-American Symposium, LADC 2003, Sao Paulo, Brazil, October 21-24, 2003, Proceedings, pp. 117-126, 2003, Springer, 3-540-20224-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Claude Crépeau, Alain Slakmon |
Simple Backdoors for RSA Key Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2003, The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings, pp. 403-416, 2003, Springer, 3-540-00847-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Yuyuan Sun, Yuliang Lu, Xuehu Yan, Xuan Wang |
Invisible backdoor learning in regional transform domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Neural Comput. Appl. ![In: Neural Comput. Appl. 36(14), pp. 8097-8108, May 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Tao Xiang 0001, Fei Ouyang, Di Zhang, Chunlong Xie, Hao Wang 0003 |
NLPSweep: A comprehensive defense scheme for mitigating NLP backdoor attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 661, pp. 120176, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Orson Mengara, Anderson R. Avila, Tiago H. Falk |
Backdoor Attacks to Deep Neural Networks: A Survey of the Literature, Challenges, and Future Research Directions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 29004-29023, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Chengxu Yu, Yulai Zhang |
Defending Against Backdoor Attacks by Quarantine Training. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 10681-10689, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Quentin Le Roux, Eric Bourbao, Yannick Teglia, Kassem Kallas |
A Comprehensive Survey on Backdoor Attacks and Their Defenses in Face Recognition Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 47433-47468, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Xiangyu Zhao, Hanzhou Wu, Xinpeng Zhang 0001 |
Effective Backdoor Attack on Graph Neural Networks in Spectral Domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 11(7), pp. 12102-12114, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Yongkang Wang, Di-Hua Zhai, Dongyu Han, Yuyin Guan, Yuanqing Xia |
MITDBA: Mitigating Dynamic Backdoor Attacks in Federated Learning for IoT Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 11(6), pp. 10115-10132, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Xinfeng Li, Junning Ze, Chen Yan 0001, Yushi Cheng, Xiaoyu Ji 0001, Wenyuan Xu 0001 |
Enrollment-Stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 11(8), pp. 13108-13124, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Jianyao Yin, Honglong Chen, Junjian Li, Yudong Gao |
Enhanced Coalescence Backdoor Attack Against DNN Based on Pixel Gradient. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Neural Process. Lett. ![In: Neural Process. Lett. 56(2), pp. 114, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Yu Tang, Lijuan Sun, Xiaolong Xu 0002 |
SilentTrig: An imperceptible backdoor attack against speaker identification with hidden triggers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pattern Recognit. Lett. ![In: Pattern Recognit. Lett. 177, pp. 103-109, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Mingfu Xue, Yinghao Wu, Shifeng Ni, Leo Yu Zhang, Yushu Zhang, Weiqiang Liu 0001 |
Untargeted Backdoor Attack Against Deep Neural Networks With Imperceptible Trigger. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Ind. Informatics ![In: IEEE Trans. Ind. Informatics 20(3), pp. 5004-5013, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Yongkang Wang, Di-Hua Zhai, Yuanqing Xia, Danyang Liu |
PerVK: A Robust Personalized Federated Framework to Defend Against Backdoor Attacks for IoT Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Ind. Informatics ![In: IEEE Trans. Ind. Informatics 20(3), pp. 4930-4939, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Shingo Yashiki, Chako Takahashi, Koutarou Suzuki |
Backdoor Attacks on Graph Neural Networks Trained with Data Augmentation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 107(3), pp. 355-358, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Yinbo Yu, Jiajia Liu 0001, Hongzhi Guo, Bomin Mao, Nei Kato |
A Spatiotemporal Backdoor Attack Against Behavior-Oriented Decision Makers in Metaverse: From Perspective of Autonomous Driving. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Areas Commun. ![In: IEEE J. Sel. Areas Commun. 42(4), pp. 948-962, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Zhou Yang 0003, Bowen Xu, Jie M. Zhang, Hong Jin Kang, Jieke Shi, Junda He, David Lo 0001 |
Stealthy Backdoor Attack for Code Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 50(4), pp. 721-741, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Jin Lee, Crystal Abidin |
Backdoor advertising scandals, Yingyeo culture, and cancel culture among YouTube Influencers in South Korea. ![Search on Bibsonomy](Pics/bibsonomy.png) |
New Media Soc. ![In: New Media Soc. 26(1), pp. 405-425, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Ruinan Jin, Chun-Yin Huang, Chenyu You, Xiaoxiao Li |
Backdoor Attack on Unpaired Medical Image-Text Foundation Models: A Pilot Study on MedCLIP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.01911, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Qiannan Wang, Changchun Yin, Liming Fang 0001, Lu Zhou 0002, Zhe Liu 0001, Run Wang, Chenhao Lin |
SSL-OTA: Unveiling Backdoor Threats in Self-Supervised Learning for Object Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.00137, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Zihan Guan 0001, Mengxuan Hu, Sheng Li 0001, Anil Vullikanti |
UFID: A Unified Framework for Input-level Backdoor Detection on Diffusion Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2404.01101, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Xiaoxuan Han, Songlin Yang, Wei Wang 0025, Ziwen He, Jing Dong 0003 |
Is It Possible to Backdoor Face Forgery Detection with Natural Triggers? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.00414, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Khondoker Murad Hossain, Tim Oates 0001 |
TEN-GUARD: Tensor Decomposition for Backdoor Attack Detection in Deep Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.05432, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Zhenbo Song, Wenhao Gao, Kaihao Zhang, Wenhan Luo, Zhaoxin Fan, Jianfeng Lu |
AS-FIBA: Adaptive Selective Frequency-Injection for Backdoor Attack on Deep Face Restoration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.06430, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 1221 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|