The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for backdoor with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2003-2005 (15) 2006-2007 (15) 2008-2009 (17) 2010-2016 (16) 2017-2018 (23) 2019 (29) 2020 (89) 2021 (161) 2022 (285) 2023 (445) 2024 (126)
Publication types (Num. hits)
article(699) incollection(1) inproceedings(519) phdthesis(2)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 63 occurrences of 54 keywords

Results
Found 1221 publication records. Showing 1221 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
14Yuhao Bian, Shengjing Tian, Xiuping Liu MirrorAttack: Backdoor Attack on 3D Point Cloud with a Distorting Mirror. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Yige Li, Xingjun Ma, Jiabo He, Hanxun Huang, Yu-Gang Jiang Multi-Trigger Backdoor Attacks: More Triggers, More Threats. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Zhengyao Song, Yongqiang Li, Danni Yuan, Li Liu, Shaokui Wei, Baoyuan Wu WPDA: Frequency-based Backdoor Attack with Wavelet Packet Decomposition. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Weimin Lyu, Xiao Lin, Songzhu Zheng, Lu Pang 0006, Haibin Ling, Susmit Jha, Chao Chen Task-Agnostic Detector for Insertion-Based Backdoor Attacks. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Haonan Wang, Qianli Shen, Yao Tong, Yang Zhang, Kenji Kawaguchi The Stronger the Diffusion Model, the Easier the Backdoor: Data Poisoning to Induce Copyright Breaches Without Adjusting Finetuning Pipeline. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Jiawei Liang, Siyuan Liang, Aishan Liu, Xiaojun Jia, Junhao Kuang, Xiaochun Cao Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Orson Mengara The Art of Deception: Robust Backdoor Attack using Dynamic Stacking of Triggers. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Irina Alekseevskaia, Konstantin Arkhipenko OrderBkd: Textual backdoor attack through repositioning. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Jingke Zhao, Zan Wang, Yongwei Wang, Lanjun Wang Impart: An Imperceptible and Effective Label-Specific Backdoor Attack. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Yang Sui, Huy Phan, Jinqi Xiao, Tianfang Zhang, Zijie Tang, Cong Shi 0004, Yan Wang 0003, Yingying Chen 0001, Bo Yuan DisDet: Exploring Detectability of Backdoor Attack on Diffusion Models. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Hongbin Liu, Michael K. Reiter, Neil Zhenqiang Gong Mudjacking: Patching Backdoor Vulnerabilities in Foundation Models. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Yujing Jiang, Xingjun Ma, Sarah Monazam Erfani, Yige Li, James Bailey 0001 End-to-End Anti-Backdoor Learning on Images and Time Series. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Yanqi Qiao, Dazhuang Liu, Rui Wang 0070, Kaitai Liang Low-Frequency Black-Box Backdoor Attack via Evolutionary Algorithm. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Shuai Zhao, Meihuizi Jia, Luu Anh Tuan, Jinming Wen Universal Vulnerabilities in Large Language Models: In-context Learning Backdoor Attacks. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Gorka Abad, Stjepan Picek, Aitor Urbieta Time-Distributed Backdoor Attacks on Federated Spiking Learning. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Wenmin Chen, Xiaowei Xu Invisible Backdoor Attack Through Singular Value Decomposition. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Siyuan Cheng 0005, Guanhong Tao 0001, Yingqi Liu, Guangyu Shen, Shengwei An, Shiwei Feng 0002, Xiangzhe Xu, Kaiyuan Zhang 0002, Shiqing Ma, Xiangyu Zhang LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Xinwei Liu, Xiaojun Jia, Jindong Gu, Yuan Xun, Siyuan Liang, Xiaochun Cao Does Few-shot Learning Suffer from Backdoor Attacks? Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14He Cheng, Shuhan Yuan Backdoor Attack against One-Class Sequential Anomaly Detection Models. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Aryan Satpathy, Nilaksh Nilaksh, Dhruva Rajwade An Embarrassingly Simple Defense Against Backdoor Attacks On SSL. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Zhen Xiang, Fengqing Jiang, Zidi Xiong, Bhaskar Ramasubramanian, Radha Poovendran, Bo Li BadChain: Backdoor Chain-of-Thought Prompting for Large Language Models. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Quanyu Long, Yue Deng 0010, Leilei Gan, Wenya Wang, Sinno Jialin Pan Backdoor Attacks on Dense Passage Retrievers for Disseminating Misinformation. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Zongru Wu, Zhuosheng Zhang 0001, Pengzhou Cheng, Gongshen Liu Acquiring Clean Language Models from Backdoor Poisoned Datasets by Downscaling Frequency Space. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Jiawei Liang, Siyuan Liang, Man Luo, Aishan Liu, Dongchen Han, Ee-Chien Chang, Xiaochun Cao VL-Trojan: Multimodal Instruction Backdoor Attacks against Autoregressive Visual Language Models. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Wenkai Yang, Xiaohan Bi, Yankai Lin, Sishuo Chen, Jie Zhou, Xu Sun Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Jiongxiao Wang, Jiazhao Li, Yiquan Li, Xiangyu Qi, Junjie Hu, Yixuan Li, Patrick McDaniel, Muhao Chen, Bo Li, Chaowei Xiao Mitigating Fine-tuning Jailbreak Attack with Backdoor Enhanced Alignment. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Hao Wang, Tao Xiang 0001, Shangwei Guo, Jialing He, Hangcheng Liu, Tianwei Zhang 0004 TransTroj: Transferable Backdoor Attacks to Pre-trained Models via Embedding Indistinguishability. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Baoyuan Wu, Hongrui Chen, Mingda Zhang, Zihao Zhu, Shaokui Wei, Danni Yuan, Mingli Zhu, Ruotong Wang 0008, Li Liu, Chao Shen BackdoorBench: A Comprehensive Benchmark and Analysis of Backdoor Learning. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Yufei Zhao, Dingji Wang, Bihuan Chen 0001, Ziqian Chen, Xin Peng 0001 A general approach to enhance the survivability of backdoor attacks by decision path coupling. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Georg Pichler, Marco Romanelli 0002, Divya Prakash Manivannan, Prashanth Krishnamurthy, Farshad Khorrami, Siddharth Garg On the (In)feasibility of ML Backdoor Detection as an Hypothesis Testing Problem. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Anudeex Shetty, Yue Teng, Ke He, Qiongkai Xu WARDEN: Multi-Directional Backdoor Watermarks for Embedding-as-a-Service Copyright Protection. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Orson Mengara A Backdoor Approach with Inverted Labels Using Dirty Label-Flipping Attacks. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Ka Ho Chow, Wenqi Wei, Lei Yu 0002 Imperio: Language-Guided Backdoor Attacks for Arbitrary Model Control. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Dong Lu, Tianyu Pang, Chao Du, Qian Liu, Xianjun Yang, Min Lin Test-Time Backdoor Attacks on Multimodal Large Language Models. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Lijun Sheng, Jian Liang, Ran He 0001, Zilei Wang, Tieniu Tan Can We Trust the Unlabeled Target Data? Towards Backdoor Attack and Defense on Model Adaptation. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Shuai Zhao, Leilei Gan, Luu Anh Tuan, Jie Fu, Lingjuan Lyu, Meihuizi Jia, Jinming Wen Defending Against Weight-Poisoning Backdoor Attacks for Parameter-Efficient Fine-Tuning. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Pengzhou Cheng, Wei Du, Zongru Wu, Fengwei Zhang, Libo Chen, Gongshen Liu Syntactic Ghost: An Imperceptible General-purpose Backdoor Attacks on Pre-trained Language Models. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Hanqing Fu, Gaolei Li, Jun Wu 0001, Jianhua Li 0001, Xi Lin 0003, Kai Zhou 0001, Yuchen Liu Spikewhisper: Temporal Spike Backdoor Attacks on Federated Neuromorphic Learning over Low-power Devices. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Orson Mengara The last Dance : Robust backdoor attack via diffusion models and bayesian approach. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Meiling Li, Nan Zhong, Xinpeng Zhang 0001, Zhenxing Qian, Sheng Li 0006 Object-oriented backdoor attack against image captioning. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Hong Sun, Ziqiang Li, Lei Liu, Bin Li Real is not True: Backdoor Attacks Against Deepfake Detection. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Dazhong Rong, Guoyao Yu, Shuheng Shen, Xinyi Fu, Peng Qian, Jianhai Chen, Qinming He, Xing Fu, Weiqiang Wang Clean-image Backdoor Attacks. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Alexander Unnervik, Hatef Otroshi-Shahreza, Anjith George, Sébastien Marcel Model Pairing Using Embedding Translation for Backdoor Attack Detection on Open-Set Classification Tasks. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Xiaogang Xing, Ming Xu, Yujing Bai, Dongdong Yang A clean-label graph backdoor attack method in node classification task. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Jiazhu Dai, Haoyu Sun A backdoor attack against link prediction tasks with graph neural networks. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Hongwei Zhang, Xiaoyin Xu, Dongsheng An, Xianfeng Gu, Min Zhang Backdoor Attack with Mode Mixture Latent Modification. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Jiayi Hua, Kailong Wang, Meizhen Wang, Guangdong Bai, Xiapu Luo, Haoyu Wang 0001 MalModel: Hiding Malicious Payload in Mobile Deep Learning Models with Black-box Backdoor Attack. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Ruofei Wang, Renjie Wan, Zongyu Guo, Qing Guo, Rui Huang Spy-Watermark: Robust Invisible Watermarking for Backdoor Attack. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Xiaobo Yu, Weizhi Meng 0001, Yi-Ning Liu 0002, Fei Zhou TridentShell: An enhanced covert and scalable backdoor injection attack on web applications. Search on Bibsonomy J. Netw. Comput. Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Mingfu Xue, Shifeng Ni, Yinghao Wu, Yushu Zhang, Weiqiang Liu 0010 Imperceptible and multi-channel backdoor attack. Search on Bibsonomy Appl. Intell. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Huaibing Peng, Huming Qiu, Hua Ma, Shuo Wang, Anmin Fu, Said F. Al-Sarawi, Derek Abbott, Yansong Gao On Model Outsourcing Adaptive Attacks to Deep Learning Backdoor Defenses. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Wei Guo 0012, Benedetta Tondi, Mauro Barni Universal Detection of Backdoor Attacks via Density-Based Clustering and Centroids Analysis. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Yu Guo 0003, Yu Zhao, Saihui Hou, Cong Wang 0001, Xiaohua Jia Verifying in the Dark: Verifiable Machine Unlearning by Using Invisible Backdoor Triggers. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Yi Ding 0003, Zi Wang, Zhen Qin 0002, Erqiang Zhou, Guobin Zhu, Zhiguang Qin, Kim-Kwang Raymond Choo Backdoor Attack on Deep Learning-Based Medical Image Encryption and Decryption Network. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Huming Qiu, Hua Ma, Zhi Zhang 0001, Alsharif Abuadbba, Wei Kang 0004, Anmin Fu, Yansong Gao Toward a Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Ying He, Zhili Shen, Jingyu Hua, Qixuan Dong, Jiacheng Niu, Wei Tong, Xu Huang, Chen Li, Sheng Zhong 0002 Backdoor Attack Against Split Neural Network-Based Vertical Federated Learning. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Zekai Chen, Shengxing Yu, Mingyuan Fan, Ximeng Liu, Robert H. Deng Privacy-Enhancing and Robust Backdoor Defense for Federated Learning on Heterogeneous Data. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Wenli Sun, Xinyang Jiang, Shuguang Dou, Dongsheng Li 0002, Duoqian Miao, Cheng Deng, Cairong Zhao Invisible Backdoor Attack With Dynamic Triggers Against Person Re-Identification. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Yinshan Li, Hua Ma, Zhi Zhang 0001, Yansong Gao, Alsharif Abuadbba, Minhui Xue, Anmin Fu, Yifeng Zheng, Said F. Al-Sarawi, Derek Abbott NTD: Non-Transferability Enabled Deep Learning Backdoor Detection. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Kuofeng Gao, Jiawang Bai, Baoyuan Wu, Mengxi Ya, Shu-Tao Xia Imperceptible and Robust Backdoor Attack in 3D Point Cloud. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Linkun Fan, Fazhi He, Tongzhen Si, Rubin Fan, Chuanlong Ye, Bing Li 0010 MBA: Backdoor Attacks Against 3D Mesh Classifier. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Thuy Dung Nguyen, Tuan Nguyen, Phi Le Nguyen, Hieu H. Pham 0001, Khoa D. Doan, Kok-Seng Wong Backdoor attacks and defenses in federated learning: Survey, challenges and future research directions. Search on Bibsonomy Eng. Appl. Artif. Intell. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Peng Chen, Xin Du, Zhihui Lu 0002, Hongfeng Chai Universal adversarial backdoor attacks to fool vertical federated learning. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Ying He, Zhili Shen, Chang Xia, Jingyu Hua, Wei Tong, Sheng Zhong 0002 SGBA: A stealthy scapegoat backdoor attack against deep neural networks. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Zihan Ma, Tianchong Gao Federated learning backdoor attack detection with persistence diagram. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Yubin Qu, Song Huang, Xiang Chen 0005, Xingya Wang, Yongming Yao Detection of backdoor attacks using targeted universal adversarial perturbations for deep neural networks. Search on Bibsonomy J. Syst. Softw. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Wei Jiang 0016, Xiangyu Wen, Jinyu Zhan, Xupeng Wang, Ziwei Song, Chen Bian Critical Path-Based Backdoor Detection for Deep Neural Networks. Search on Bibsonomy IEEE Trans. Neural Networks Learn. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Yiming Li 0004, Yong Jiang 0001, Zhifeng Li 0001, Shu-Tao Xia Backdoor Learning: A Survey. Search on Bibsonomy IEEE Trans. Neural Networks Learn. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Wenbo Jiang, Tianwei Zhang 0004, Han Qiu 0001, Hongwei Li 0001, Guowen Xu Incremental Learning, Incremental Backdoor Threats. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Zheng Zhang 0006, Xu Yuan 0007, Lei Zhu 0002, Jingkuan Song, Liqiang Nie BadCM: Invisible Backdoor Attack Against Cross-Modal Learning. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Ryo Meguro, Hiroya Kato, Shintaro Narisada, Seira Hidano, Kazuhide Fukushima, Takuo Suganuma, Masahiro Hiji Gradient-Based Clean Label Backdoor Attack to Graph Neural Networks. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Ryan Holland, Shantanu Pal, Lei Pan 0002, Leo Yu Zhang Backdoor Attacks and Generative Model Fairness: Current Trends and Future Research Directions. Search on Bibsonomy COMSNETS The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Samaneh Shamshiri, Insoo Sohn Defense Method Challenges Against Backdoor Attacks in Neural Networks. Search on Bibsonomy ICAIIC The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Yihao Huang 0001, Felix Juefei-Xu, Qing Guo, Jie Zhang, Yutong Wu 0009, Ming Hu 0003, Tianlin Li, Geguang Pu, Yang Liu Personalization as a Shortcut for Few-Shot Backdoor Attack against Text-to-Image Diffusion Models. Search on Bibsonomy AAAI The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Tran Huynh, Dang Nguyen, Tung Pham 0001, Anh Tran COMBAT: Alternated Training for Effective Clean-Label Backdoor Attacks. Search on Bibsonomy AAAI The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Yudong Gao, Honglong Chen, Peng Sun 0003, Junjian Li, Anqing Zhang, Zhibo Wang 0001, Weifeng Liu 0001 A Dual Stealthy Backdoor: From Both Spatial and Frequency Perspectives. Search on Bibsonomy AAAI The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Junpeng Fang, Gongduo Zhang, Qing Cui, Caizhi Tang, Lihong Gu, Longfei Li, Jinjie Gu, Jun Zhou 0011 Backdoor Adjustment via Group Adaptation for Debiased Coupon Recommendations. Search on Bibsonomy AAAI The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Zhen Qin, Feiyi Chen, Chen Zhi, Xueqiang Yan, Shuiguang Deng Resisting Backdoor Attacks in Federated Learning via Bidirectional Elections and Individual Perspective. Search on Bibsonomy AAAI The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Tong Wang, Yuan Yao 0001, Feng Xu 0007, Miao Xu, Shengwei An, Ting Wang Inspecting Prediction Confidence for Detecting Black-Box Backdoor Attacks. Search on Bibsonomy AAAI The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Qiuyu Duan, Zhongyun Hua, Qing Liao 0001, Yushu Zhang, Leo Yu Zhang Conditional Backdoor Attack via JPEG Compression. Search on Bibsonomy AAAI The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Yue Zhao, Congyi Li, Kai Chen 0012 UMA: Facilitating Backdoor Scanning via Unlearning-Based Model Ablation. Search on Bibsonomy AAAI The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Liuwan Zhu, Rui Ning, Jiang Li, Chunsheng Xin, Hongyi Wu SEER: Backdoor Detection for Vision-Language Models through Searching Target Text and Image Trigger Jointly. Search on Bibsonomy AAAI The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Xinwei Liu, Xiaojun Jia, Jindong Gu, Yuan Xun, Siyuan Liang, Xiaochun Cao Does Few-Shot Learning Suffer from Backdoor Attacks? Search on Bibsonomy AAAI The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Fangchao Yu, Bo Zeng, Kai Zhao, Zhi Pang, Lina Wang Chronic Poisoning: Backdoor Attack against Split Learning. Search on Bibsonomy AAAI The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Jiachen Zhou, Peizhuo Lv, Yibing Lan, Guozhu Meng, Kai Chen 0012, Hualong Ma DataElixir: Purifying Poisoned Dataset to Mitigate Backdoor Attacks via Diffusion Models. Search on Bibsonomy AAAI The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Xi Li, Songhe Wang, Ruiquan Huang, Mahanth Gowda, George Kesidis Temporal-Distributed Backdoor Attack against Video Based Action Recognition. Search on Bibsonomy AAAI The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Jing Cui, Yufei Han, Yuzhe Ma, Jianbin Jiao, Junge Zhang BadRL: Sparse Targeted Backdoor Attack against Reinforcement Learning. Search on Bibsonomy AAAI The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Zihan Guan 0001, Mengxuan Hu, Zhongliang Zhou, Jielu Zhang, Sheng Li 0001, Ninghao Liu BadSAM: Exploring Security Vulnerabilities of SAM via Backdoor Attacks (Student Abstract). Search on Bibsonomy AAAI The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Zihao Liu, Tianhao Wang 0001, Mengdi Huai, Chenglin Miao Backdoor Attacks via Machine Unlearning. Search on Bibsonomy AAAI The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Yiming Chen, Haiwei Wu, Jiantao Zhou 0001 Progressive Poisoned Data Isolation for Training-Time Backdoor Defense. Search on Bibsonomy AAAI The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Linkun Fan, Fazhi He, Tongzhen Si, Wei Tang, Bing Li Invisible Backdoor Attack against 3D Point Cloud Classifier in Graph Spectral Domain. Search on Bibsonomy AAAI The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Tao Liu, Yuhang Zhang, Zhu Feng, Zhiqin Yang, Chen Xu 0008, Dapeng Man, Wu Yang 0001 Beyond Traditional Threats: A Persistent Backdoor Attack on Federated Learning. Search on Bibsonomy AAAI The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Hannah Davis, Matthew D. Green, Nadia Heninger, Keegan Ryan, Adam Suhl On the Possibility of a Backdoor in the Micali-Schnorr Generator. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Akshayvarun Subramanya, Soroush Abbasi Koohpayegani, Aniruddha Saha, Ajinkya Tejankar, Hamed Pirsiavash A Closer Look at Robustness of Vision Transformers to Backdoor Attacks. Search on Bibsonomy WACV The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14He Cheng, Shuhan Yuan Backdoor Attack Against One-Class Sequential Anomaly Detection Models. Search on Bibsonomy PAKDD (3) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Xi Li, Chen Wu, Jiaqi Wang Unveiling Backdoor Risks Brought by Foundation Models in Heterogeneous Federated Learning. Search on Bibsonomy PAKDD (3) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Yue Wang 0055, Wenqing Li, Michail Maniatakos, Saif Eddin Jabari Optimal Smoothing Distribution Exploration for Backdoor Neutralization in Deep Learning-based Traffic Systems. Search on Bibsonomy ANZCC The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Xiaoyang Wang, Dimitrios Dimitriadis, Sanmi Koyejo, Shruti Tople Invariant Aggregator for Defending against Federated Backdoor Attacks. Search on Bibsonomy AISTATS The full citation details ... 2024 DBLP  BibTeX  RDF
14Georg Pichler, Marco Romanelli 0002, Divya Prakash Manivannan, Prashanth Krishnamurthy, Farshad Khorrami, Siddharth Garg On the (In)feasibility of ML Backdoor Detection as an Hypothesis Testing Problem. Search on Bibsonomy AISTATS The full citation details ... 2024 DBLP  BibTeX  RDF
14Yunsong Huang, Weicheng Liu, Hui-Ming Wang 0001 Hidden Backdoor Attack Against Deep Learning-Based Wireless Signal Modulation Classifiers. Search on Bibsonomy IEEE Trans. Veh. Technol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 1221 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license