SOTAVerified

Backdoor Attack

Backdoor attacks inject maliciously constructed data into a training set so that, at test time, the trained model misclassifies inputs patched with a backdoor trigger as an adversarially-desired target class.

Papers

Showing 125 of 523 papers

TitleStatusHype
VisualTrap: A Stealthy Backdoor Attack on GUI Agents via Visual Grounding Manipulation0
Beyond Training-time Poisoning: Component-level and Post-training Backdoors in Deep Reinforcement Learning0
CUBA: Controlled Untargeted Backdoor Attack against Deep Neural Networks0
Screen Hijack: Visual Poisoning of VLM Agents in Mobile Environments0
ME: Trigger Element Combination Backdoor Attack on Copyright Infringement0
Single-Node Trigger Backdoor Attacks in Graph-Based Recommendation Systems0
SPBA: Utilizing Speech Large Language Model for Backdoor Attacks on Speech Classification Models0
Backdoor Attack on Vision Language Models with Stealthy Semantic Manipulation0
Invisible Backdoor Triggers in Image Editing Model via Deep WatermarkingCode0
Heterogeneous Graph Backdoor Attack0
Poison in the Well: Feature Embedding Disruption in Backdoor Attacks0
Backdoors in DRL: Four Environments Focusing on In-distribution Triggers0
BadDepth: Backdoor Attacks Against Monocular Depth Estimation in the Physical World0
BadVLA: Towards Backdoor Attacks on Vision-Language-Action Models via Objective-Decoupled Optimization0
FIGhost: Fluorescent Ink-based Stealthy and Flexible Backdoor Attacks on Physical Traffic Sign Recognition0
Defending the Edge: Representative-Attention for Mitigating Backdoor Attacks in Federated Learning0
MixBridge: Heterogeneous Image-to-Image Backdoor Attack through Mixture of Schrödinger BridgesCode0
Natural Reflection Backdoor Attack on Vision Language Model for Autonomous Driving0
BadLingual: A Novel Lingual-Backdoor Attack against Large Language Models0
Protocol-agnostic and Data-free Backdoor Attacks on Pre-trained Models in RF FingerprintingCode0
Dynamic Attention Analysis for Backdoor Detection in Text-to-Image Diffusion ModelsCode0
SFIBA: Spatial-based Full-target Invisible Backdoor Attacks0
Erased but Not Forgotten: How Backdoors Compromise Concept Erasure0
BadMoE: Backdooring Mixture-of-Experts LLMs via Optimizing Routing Triggers and Infecting Dormant Experts0
Robo-Troj: Attacking LLM-based Task Planners0
Show:102550
← PrevPage 1 of 21Next →

No leaderboard results yet.