The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for backdoor with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2003-2005 (15) 2006-2007 (15) 2008-2009 (17) 2010-2016 (16) 2017-2018 (23) 2019 (29) 2020 (89) 2021 (161) 2022 (285) 2023 (445) 2024 (126)
Publication types (Num. hits)
article(699) incollection(1) inproceedings(519) phdthesis(2)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 63 occurrences of 54 keywords

Results
Found 1221 publication records. Showing 1221 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
165Lionel Paris, Richard Ostrowski, Pierre Siegel, Lakhdar Sais From Horn Strong Backdoor Sets to Ordered Strong Backdoor Sets. Search on Bibsonomy MICAI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
143Stefan Szeider Backdoor Sets for DLL Subsolvers. Search on Bibsonomy J. Autom. Reason. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF unit propagation, pure literal elimination, backdoor sets, W[P]-completeness, satisfiability, parameterized complexity
117Jin Taek Kim, Jeong-Ho Kho, Min-Seok Hong, Choul Woong Son, Do-Won Lee, Sang-Jo Youk, Geuk Lee A study on intrusion protection techniques against Linux kernel backdoor. Search on Bibsonomy ICHIT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
94Loïc Duflot CPU Bugs, CPU Backdoors and Consequences on Security. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF hardware bug, hardware backdoor, CPU, x86
91Sherri Sparks, Shawn Embleton, Cliff Changchun Zou A chipset level network backdoor: bypassing host-based firewall & IDS. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF network backdoor, rootkit, hardware security
83Bistra Dilkina, Carla P. Gomes, Ashish Sabharwal Tradeoffs in the Complexity of Backdoor Detection. Search on Bibsonomy CP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
77Bistra Dilkina, Carla P. Gomes, Yuri Malitsky, Ashish Sabharwal, Meinolf Sellmann Backdoors to Combinatorial Optimization: Feasibility and Optimality. Search on Bibsonomy CPAIOR The full citation details ... 2009 DBLP  DOI  BibTeX  RDF backdoor sets, search, variable selection
69Stephan Kottler, Michael Kaufmann 0001, Carsten Sinz A New Bound for an NP-Hard Subclass of 3-SAT Using Backdoors. Search on Bibsonomy SAT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
69Adam L. Young, Moti Yung Space-Efficient Kleptography Without Random Oracles. Search on Bibsonomy Information Hiding The full citation details ... 2007 DBLP  DOI  BibTeX  RDF twisted elliptic curves, elliptic curve, Key exchange, kleptography
66Adam L. Young, Moti Yung A Timing-Resistant Elliptic Curve Backdoor in RSA. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Twisted elliptic curves, RSA, subliminal channel, kleptography
66Stefan Szeider Matched Formulas and Backdoor Sets. Search on Bibsonomy SAT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
66Lionel Paris, Richard Ostrowski, Pierre Siegel, Lakhdar Sais Computing Horn Strong Backdoor Sets Thanks to Local Search. Search on Bibsonomy ICTAI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
57Marko Samer, Stefan Szeider Backdoor Sets of Quantified Boolean Formulas. Search on Bibsonomy J. Autom. Reason. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Backdoor sets, Variable dependencies, Parameterized complexity, Quantified Boolean formulas
52Loïc Duflot CPU bugs, CPU backdoors and consequences on security. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
52Naomi Nishimura, Prabhakar Ragde, Stefan Szeider Solving #SAT using vertex covers. Search on Bibsonomy Acta Informatica The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
52Naomi Nishimura, Prabhakar Ragde, Stefan Szeider Solving #SAT Using Vertex Covers. Search on Bibsonomy SAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
48Marko Samer, Stefan Szeider Backdoor Sets of Quantified Boolean Formulas. Search on Bibsonomy SAT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
48Adam L. Young, Moti Yung An Elliptic Curve Backdoor Algorithm for RSASSA. Search on Bibsonomy Information Hiding The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
43Matti Järvisalo, Tommi A. Junttila Limitations of restricted branching in clause learning. Search on Bibsonomy Constraints An Int. J. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Branching heuristics, Clause learning, Backdoor sets, Proof complexity, Propositional satisfiability, DPLL, Problem structure
43Shih-Yao Dai, Sy-Yen Kuo MAPMon: A Host-Based Malware Detection Tool. Search on Bibsonomy PRDC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Auto-Start Extensibility Point, Malware Attacking Points, Honeypot, Malicious Software, Backdoor
43Hyungwoo Kang, Soon Jwa Hong, Dong Hoon Lee 0001 Matching Connection Pairs. Search on Bibsonomy PDCAT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Connection pairs, Detoured attack, Traceback, Stepping stone, Backdoor
31Adam L. Young, Moti Yung A Space Efficient Backdoor in RSA and Its Applications. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Decision Diffie-Hellman, black-box ciphers, twist on elliptic curves, RSA, elliptic curve cryptography, tamper-resistance, Diffie-Hellman, Key recovery, SETUP
31Adam L. Young, Moti Yung Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF hidden ciphers, obfuscated ciphers, black-box ciphers, Huffman compression, reverse-engineering, data compression, entropy, subliminal channel, Digital Rights Management (DRM), Symmetric ciphers, kleptography
28Haibin Zheng, Haiyang Xiong, Jinyin Chen, Haonan Ma, Guohan Huang Motif-Backdoor: Rethinking the Backdoor Attack on Graph Neural Networks via Motifs. Search on Bibsonomy IEEE Trans. Comput. Soc. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
28Haibin Zheng, Haiyang Xiong, Haonan Ma, Guohan Huang, Jinyin Chen Link-Backdoor: Backdoor Attack on Link Prediction via Node Injection. Search on Bibsonomy IEEE Trans. Comput. Soc. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
28Jinyin Chen, Haiyang Xiong, Haibin Zheng, Jian Zhang 0023, Yi Liu 0024 Dyn-Backdoor: Backdoor Attack on Dynamic Link Prediction. Search on Bibsonomy IEEE Trans. Netw. Sci. Eng. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
28Soumyadeep Pal, Yuguang Yao, Ren Wang 0008, Bingquan Shen, Sijia Liu 0001 Backdoor Secrets Unveiled: Identifying Backdoor Data with Optimized Scaled Prediction Consistency. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
28Siyuan Liang, Kuanrong Liu, Jiajun Gong, Jiawei Liang, Yuan Xun, Ee-Chien Chang, Xiaochun Cao Unlearning Backdoor Threats: Enhancing Backdoor Defense in Multimodal Contrastive Learning via Local Token Unlearning. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
28Shangxi Wu, Qiuyang He, Yi Zhang 0101, Dongyuan Lu, Jitao Sang Debiasing backdoor attack: A benign application of backdoor attack in eliminating data bias. Search on Bibsonomy Inf. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Arthur Mercier, Nikita Smolin, Oliver Sihlovec, Stefanos Koffas, Stjepan Picek Backdoor Pony: Evaluating backdoor attacks and defenses in different domains. Search on Bibsonomy SoftwareX The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Tinghao Xie, Xiangyu Qi, Ping He, Yiming Li, Jiachen T. Wang, Prateek Mittal BaDExpert: Extracting Backdoor Functionality for Accurate Backdoor Input Detection. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Huming Qiu, Junjie Sun, Mi Zhang, Xudong Pan, Min Yang BELT: Old-School Backdoor Attacks can Evade the State-of-the-Art Defense with Backdoor Exclusivity Lifting. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Shangxi Wu, Qiuyang He, Fangzhao Wu, Jitao Sang, Yaowei Wang, Changsheng Xu Backdoor for Debias: Mitigating Model Bias with Backdoor Attack-based Artificial Bias. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Min Liu, Alberto L. Sangiovanni-Vincentelli, Xiangyu Yue Backdoor Defense with Non-Adversarial Backdoor. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Haomin Zhuang, Mingxian Yu, Hao Wang 0022, Yang Hua, Jian Li 0008, Xu Yuan 0001 Backdoor Federated Learning by Poisoning Backdoor-Critical Layers. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Bingxu Mu, Zhenxing Niu, Le Wang 0003, Xue Wang, Qiguang Mia, Rong Jin, Gang Hua 0001 Progressive Backdoor Erasing via connecting Backdoor and Adversarial Attacks. Search on Bibsonomy CVPR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Shang Wang, Yansong Gao, Anmin Fu, Zhi Zhang 0001, Yuqing Zhang 0001, Willy Susilo, Dongxi Liu CASSOCK: Viable Backdoor Attacks against DNN in the Wall of Source-Specific Backdoor Defenses. Search on Bibsonomy AsiaCCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Haibin Zheng, Haiyang Xiong, Haonan Ma, Guohan Huang, Jinyin Chen Link-Backdoor: Backdoor Attack on Link Prediction via Node Injection. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Haibin Zheng, Haiyang Xiong, Jinyin Chen, Haonan Ma, Guohan Huang Motif-Backdoor: Rethinking the Backdoor Attack on Graph Neural Networks via Motifs. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Shang Wang, Yansong Gao, Anmin Fu, Zhi Zhang 0001, Yuqing Zhang 0001, Willy Susilo CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Khoa D. Doan, Yingjie Lao, Ping Li 0001 Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Shangxi Wu, Qiuyang He, Yi Zhang 0101, Jitao Sang Debiasing Backdoor Attack: A Benign Application of Backdoor Attack in Eliminating Data Bias. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  BibTeX  RDF
28Kathrin Grosse, Taesung Lee, Battista Biggio, Youngja Park, Michael Backes 0001, Ian M. Molloy Backdoor smoothing: Demystifying backdoor attacks on deep neural networks. Search on Bibsonomy Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Rui Ning, Jiang Li 0001, Chunsheng Xin, Hongyi Wu, Chonggang Wang Hibernated Backdoor: A Mutual Information Empowered Backdoor Attack to Deep Neural Networks. Search on Bibsonomy AAAI The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Khoa D. Doan, Yingjie Lao, Ping Li 0001 Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class. Search on Bibsonomy NeurIPS The full citation details ... 2022 DBLP  BibTeX  RDF
28Yue Gao 0011, Jack W. Stokes, Manoj Ajith Prasad, Andrew T. Marshall, Kassem Fawaz, Emre Kiciman I Know Your Triggers: Defending Against Textual Backdoor Attacks with Benign Backdoor Augmentation. Search on Bibsonomy MILCOM The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Chuanshuai Chen, Jiazhu Dai Mitigating backdoor attacks in LSTM-based text classification systems by Backdoor Keyword Identification. Search on Bibsonomy Neurocomputing The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Antonio Emanuele Cinà, Kathrin Grosse, Sebastiano Vascon, Ambra Demontis, Battista Biggio, Fabio Roli, Marcello Pelillo Backdoor Learning Curves: Explaining Backdoor Poisoning Beyond Influence Functions. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
28Jinyin Chen, Haiyang Xiong, Haibin Zheng, Jian Zhang 0023, Guodong Jiang, Yi Liu 0024 Dyn-Backdoor: Backdoor Attack on Dynamic Link Prediction. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
28Ziqi Wei, Junjian Shi, Yihe Duan, Ranyang Liu, Ye Han, Zheli Liu Backdoor Filter: Mitigating Visible Backdoor Triggers in Dataset. Search on Bibsonomy DTPI The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Zahra Ashktorab, Casey Dugan, James Johnson, Aabhas Sharma, Dustin Ramsey Torres, Ingrid Lange, Benjamin Hoover, Heiko Ludwig, Bryant Chen, Nathalie Baracaldo, Werner Geyer, Qian Pan The Design and Development of a Game to Study Backdoor Poisoning Attacks: The Backdoor Game. Search on Bibsonomy IUI The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Shuang Li, Hongwei Li 0001, Hanxiao Chen Stand-in Backdoor: A Stealthy and Powerful Backdoor Attack. Search on Bibsonomy GLOBECOM The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Meirong Liu, Hong Zheng, Qin Liu 0001, Xiaofei Xing, Yinglong Dai A Backdoor Embedding Method for Backdoor Detection in Deep Neural Networks. Search on Bibsonomy UbiSec The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Chuanshuai Chen, Jiazhu Dai Mitigating backdoor attacks in LSTM-based Text Classification Systems by Backdoor Keyword Identification. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
28Yunfei Liu, Xingjun Ma, James Bailey 0001, Feng Lu 0005 Reflection Backdoor: A Natural Backdoor Attack on Deep Neural Networks. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
28Hyun Kwon, Hyunsoo Yoon, Ki-Woong Park Multi-Targeted Backdoor: Indentifying Backdoor Attack for Multiple Deep Neural Networks. Search on Bibsonomy IEICE Trans. Inf. Syst. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Kota Yoshida, Takeshi Fujino Disabling Backdoor and Identifying Poison Data by using Knowledge Distillation in Backdoor Attacks on Deep Neural Networks. Search on Bibsonomy AISec@CCS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Hyun Kwon, Hyunsoo Yoon, Ki-Woong Park FriendNet Backdoor: Indentifying Backdoor Attack that is safe for Friendly Deep Neural Network. Search on Bibsonomy ICSIM The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Yunfei Liu, Xingjun Ma, James Bailey 0001, Feng Lu 0005 Reflection Backdoor: A Natural Backdoor Attack on Deep Neural Networks. Search on Bibsonomy ECCV (10) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Guillaume Escamocher, Mohamed Siala 0002, Barry O'Sullivan From Backdoor Key to Backdoor Completability: Improving a Known Measure of Hardness for the Satisfiable CSP. Search on Bibsonomy CPAIOR The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Constantinos Patsakis, Nikolaos Alexandris A New SETUP for Factoring Based Algorithms. Search on Bibsonomy IIH-MSP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Secretly Embedded Trapdoor with Universal Protection, Coppersmith's theorem, cryptovirology, RSA, public key cryptography, factoring, backdoor
17Siddharth Gupta 0001, Christopher Hunter, Patrick Murphy, Ashutosh Sabharwal WARPnet: clean slate research on deployed wireless networks. Search on Bibsonomy MobiHoc The full citation details ... 2009 DBLP  DOI  BibTeX  RDF warpnet, measurement, wireless, control, warp
17S. Momina Tabish, M. Zubair Shafiq, Muddassar Farooq Malware detection using statistical analysis of byte-level file content. Search on Bibsonomy KDD Workshop on CyberSecurity and Intelligence Informatics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF computer malware, data mining, forensics
17Bistra Dilkina, Carla P. Gomes, Ashish Sabharwal Backdoors in the Context of Learning. Search on Bibsonomy SAT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Yong Gao 0001 Random Instances of W[2]-Complete Problems: Thresholds, Complexity, and Algorithms. Search on Bibsonomy SAT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Stephan Kottler, Michael Kaufmann 0001, Carsten Sinz Computation of Renameable Horn Backdoors. Search on Bibsonomy SAT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Jian-Xia Wang, Wan-Zhen Zhou, Yun-Feng Xu Embedded Intrusion Detection and Authority Management System. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Peter Gregory, Maria Fox 0001, Derek Long A New Empirical Study of Weak Backdoors. Search on Bibsonomy CP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Chun-Ming Leung, Yuen-Yan Chan Network Forensic on Encrypted Peer-to-Peer VoIP Traffics and the Detection, Blocking, and Prioritization of Skype Traffics. Search on Bibsonomy WETICE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Enterprise Network Security, Network Foren- sics, Traffic Prioritiza- tion, Reverse Engineering, Blocking, Traffic Analysis, Skype, NAT Traversal
17José M. González, Vern Paxson Enhancing Network Intrusion Detection with Integrated Sampling and Filtering. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Seungwon Shin, Jaeyeon Jung, Hari Balakrishnan Malware prevalence in the KaZaA file-sharing network. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF KaZaA, virus prevalence, peer-to-peer
17Tzer-Shyong Chen, Fuh-Gwo Jeng, Yu-Chia Liu Hacking Tricks Toward Security on Network Environments. Search on Bibsonomy PDCAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Hacking tricks, Trojan programs, Intrusion detection system, Firewall, Phishing
17Kevin Borders, Atul Prakash 0001 Web tap: detecting covert web traffic. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF spyware detection, intrusion detection, anomaly detection, HTTP, covert channels, tunnels
17Inês Lynce, João Marques-Silva 0001 Hidden Structure in Unsatisfiable Random 3-SAT: An Empirical Study. Search on Bibsonomy ICTAI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17A. Murat Fiskiran, Ruby B. Lee Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution. Search on Bibsonomy ICCD The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Joel M. Gompert Local Search with Maximal Independent Sets. Search on Bibsonomy CP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Mauro Borchardt, Carlos Maziero, Edgard Jamhour An Architecture for On-the-Fly File Integrity Checking. Search on Bibsonomy LADC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Claude Crépeau, Alain Slakmon Simple Backdoors for RSA Key Generation. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Yuyuan Sun, Yuliang Lu, Xuehu Yan, Xuan Wang Invisible backdoor learning in regional transform domain. Search on Bibsonomy Neural Comput. Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Tao Xiang 0001, Fei Ouyang, Di Zhang, Chunlong Xie, Hao Wang 0003 NLPSweep: A comprehensive defense scheme for mitigating NLP backdoor attacks. Search on Bibsonomy Inf. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Orson Mengara, Anderson R. Avila, Tiago H. Falk Backdoor Attacks to Deep Neural Networks: A Survey of the Literature, Challenges, and Future Research Directions. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Chengxu Yu, Yulai Zhang Defending Against Backdoor Attacks by Quarantine Training. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Quentin Le Roux, Eric Bourbao, Yannick Teglia, Kassem Kallas A Comprehensive Survey on Backdoor Attacks and Their Defenses in Face Recognition Systems. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Xiangyu Zhao, Hanzhou Wu, Xinpeng Zhang 0001 Effective Backdoor Attack on Graph Neural Networks in Spectral Domain. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Yongkang Wang, Di-Hua Zhai, Dongyu Han, Yuyin Guan, Yuanqing Xia MITDBA: Mitigating Dynamic Backdoor Attacks in Federated Learning for IoT Applications. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Xinfeng Li, Junning Ze, Chen Yan 0001, Yushi Cheng, Xiaoyu Ji 0001, Wenyuan Xu 0001 Enrollment-Stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Jianyao Yin, Honglong Chen, Junjian Li, Yudong Gao Enhanced Coalescence Backdoor Attack Against DNN Based on Pixel Gradient. Search on Bibsonomy Neural Process. Lett. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Yu Tang, Lijuan Sun, Xiaolong Xu 0002 SilentTrig: An imperceptible backdoor attack against speaker identification with hidden triggers. Search on Bibsonomy Pattern Recognit. Lett. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Mingfu Xue, Yinghao Wu, Shifeng Ni, Leo Yu Zhang, Yushu Zhang, Weiqiang Liu 0001 Untargeted Backdoor Attack Against Deep Neural Networks With Imperceptible Trigger. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Yongkang Wang, Di-Hua Zhai, Yuanqing Xia, Danyang Liu PerVK: A Robust Personalized Federated Framework to Defend Against Backdoor Attacks for IoT Applications. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Shingo Yashiki, Chako Takahashi, Koutarou Suzuki Backdoor Attacks on Graph Neural Networks Trained with Data Augmentation. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Yinbo Yu, Jiajia Liu 0001, Hongzhi Guo, Bomin Mao, Nei Kato A Spatiotemporal Backdoor Attack Against Behavior-Oriented Decision Makers in Metaverse: From Perspective of Autonomous Driving. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Zhou Yang 0003, Bowen Xu, Jie M. Zhang, Hong Jin Kang, Jieke Shi, Junda He, David Lo 0001 Stealthy Backdoor Attack for Code Models. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Jin Lee, Crystal Abidin Backdoor advertising scandals, Yingyeo culture, and cancel culture among YouTube Influencers in South Korea. Search on Bibsonomy New Media Soc. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Ruinan Jin, Chun-Yin Huang, Chenyu You, Xiaoxiao Li Backdoor Attack on Unpaired Medical Image-Text Foundation Models: A Pilot Study on MedCLIP. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Qiannan Wang, Changchun Yin, Liming Fang 0001, Lu Zhou 0002, Zhe Liu 0001, Run Wang, Chenhao Lin SSL-OTA: Unveiling Backdoor Threats in Self-Supervised Learning for Object Detection. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Zihan Guan 0001, Mengxuan Hu, Sheng Li 0001, Anil Vullikanti UFID: A Unified Framework for Input-level Backdoor Detection on Diffusion Models. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Xiaoxuan Han, Songlin Yang, Wei Wang 0025, Ziwen He, Jing Dong 0003 Is It Possible to Backdoor Face Forgery Detection with Natural Triggers? Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Khondoker Murad Hossain, Tim Oates 0001 TEN-GUARD: Tensor Decomposition for Backdoor Attack Detection in Deep Neural Networks. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Zhenbo Song, Wenhao Gao, Kaihao Zhang, Wenhan Luo, Zhaoxin Fan, Jianfeng Lu AS-FIBA: Adaptive Selective Frequency-Injection for Backdoor Attack on Deep Face Restoration. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 1221 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license