VisualTrap: A Stealthy Backdoor Attack on GUI Agents via Visual Grounding Manipulation Jul 9, 2025 Backdoor Attack Visual Grounding
— Unverified 0Beyond Training-time Poisoning: Component-level and Post-training Backdoors in Deep Reinforcement Learning Jul 7, 2025 Backdoor Attack Deep Reinforcement Learning
— Unverified 0CUBA: Controlled Untargeted Backdoor Attack against Deep Neural Networks Jun 20, 2025 Backdoor Attack backdoor defense
— Unverified 0Screen Hijack: Visual Poisoning of VLM Agents in Mobile Environments Jun 16, 2025 Backdoor Attack
— Unverified 0ME: Trigger Element Combination Backdoor Attack on Copyright Infringement Jun 12, 2025 Backdoor Attack
— Unverified 0SPBA: Utilizing Speech Large Language Model for Backdoor Attacks on Speech Classification Models Jun 10, 2025 Backdoor Attack Keyword Spotting
— Unverified 0Single-Node Trigger Backdoor Attacks in Graph-Based Recommendation Systems Jun 10, 2025 Backdoor Attack Recommendation Systems
— Unverified 0Backdoor Attack on Vision Language Models with Stealthy Semantic Manipulation Jun 8, 2025 Backdoor Attack Data Poisoning
— Unverified 0Invisible Backdoor Triggers in Image Editing Model via Deep Watermarking Jun 5, 2025 Backdoor Attack Image Generation
Code Code Available 0Heterogeneous Graph Backdoor Attack May 30, 2025 Backdoor Attack backdoor defense
— Unverified 0Poison in the Well: Feature Embedding Disruption in Backdoor Attacks May 26, 2025 Backdoor Attack
— Unverified 0Backdoors in DRL: Four Environments Focusing on In-distribution Triggers May 22, 2025 Backdoor Attack Data Poisoning
— Unverified 0BadDepth: Backdoor Attacks Against Monocular Depth Estimation in the Physical World May 22, 2025 Autonomous Driving Backdoor Attack
— Unverified 0BadVLA: Towards Backdoor Attacks on Vision-Language-Action Models via Objective-Decoupled Optimization May 22, 2025 Backdoor Attack Vision-Language-Action
— Unverified 0FIGhost: Fluorescent Ink-based Stealthy and Flexible Backdoor Attacks on Physical Traffic Sign Recognition May 17, 2025 Autonomous Driving Backdoor Attack
— Unverified 0Defending the Edge: Representative-Attention for Mitigating Backdoor Attacks in Federated Learning May 15, 2025 Backdoor Attack Federated Learning
— Unverified 0MixBridge: Heterogeneous Image-to-Image Backdoor Attack through Mixture of Schrödinger Bridges May 12, 2025 Backdoor Attack
Code Code Available 0Natural Reflection Backdoor Attack on Vision Language Model for Autonomous Driving May 9, 2025 Autonomous Driving Backdoor Attack
— Unverified 0BadLingual: A Novel Lingual-Backdoor Attack against Large Language Models May 6, 2025 Backdoor Attack
— Unverified 0Protocol-agnostic and Data-free Backdoor Attacks on Pre-trained Models in RF Fingerprinting May 1, 2025 Backdoor Attack
Code Code Available 0Dynamic Attention Analysis for Backdoor Detection in Text-to-Image Diffusion Models Apr 29, 2025 Backdoor Attack
Code Code Available 0Erased but Not Forgotten: How Backdoors Compromise Concept Erasure Apr 29, 2025 Backdoor Attack Machine Unlearning
— Unverified 0SFIBA: Spatial-based Full-target Invisible Backdoor Attacks Apr 29, 2025 Backdoor Attack Specificity
— Unverified 0BadMoE: Backdooring Mixture-of-Experts LLMs via Optimizing Routing Triggers and Infecting Dormant Experts Apr 24, 2025 Backdoor Attack Mixture-of-Experts
— Unverified 0Robo-Troj: Attacking LLM-based Task Planners Apr 23, 2025 Backdoor Attack Diversity
— Unverified 0BadApex: Backdoor Attack Based on Adaptive Optimization Mechanism of Black-box Large Language Models Apr 18, 2025 Backdoor Attack
— Unverified 0Strategic Planning of Stealthy Backdoor Attacks in Markov Decision Processes Apr 17, 2025 Backdoor Attack
— Unverified 0Exploring Backdoor Attack and Defense for LLM-empowered Recommendations Apr 15, 2025 Backdoor Attack Recommendation Systems
— Unverified 0Parasite: A Steganography-based Backdoor Attack Framework for Diffusion Models Apr 8, 2025 Backdoor Attack Image Generation
— Unverified 0ShadowCoT: Cognitive Hijacking for Stealthy Reasoning Backdoors in LLMs Apr 8, 2025 Backdoor Attack
— Unverified 0Backdoor Detection through Replicated Execution of Outsourced Training Mar 31, 2025 Backdoor Attack
— Unverified 0A Channel-Triggered Backdoor Attack on Wireless Semantic Image Reconstruction Mar 31, 2025 Backdoor Attack Image Reconstruction
— Unverified 0DeBackdoor: A Deductive Framework for Detecting Backdoor Attacks on Deep Models with Limited Data Mar 27, 2025 Backdoor Attack
— Unverified 0Towards Invisible Backdoor Attack on Text-to-Image Diffusion Model Mar 22, 2025 Backdoor Attack
Code Code Available 0A Semantic and Clean-label Backdoor Attack against Graph Convolutional Networks Mar 19, 2025 Backdoor Attack Graph Classification
— Unverified 0Stealthy Patch-Wise Backdoor Attack in 3D Point Cloud via Curvature Awareness Mar 12, 2025 Backdoor Attack
— Unverified 0Adaptive Backdoor Attacks with Reasonable Constraints on Graph Neural Networks Mar 12, 2025 Backdoor Attack Graph Similarity
— Unverified 0C^2 ATTACK: Towards Representation Backdoor on CLIP via Concept Confusion Mar 12, 2025 Backdoor Attack
— Unverified 0AnywhereDoor: Multi-Target Backdoor Attacks on Object Detection Mar 9, 2025 Backdoor Attack Multi-Task Learning
Code Code Available 0BadRefSR: Backdoor Attacks Against Reference-based Image Super Resolution Feb 28, 2025 Backdoor Attack Image Super-Resolution
Code Code Available 0Gungnir: Exploiting Stylistic Features in Images for Backdoor Attacks on Diffusion Models Feb 28, 2025 Backdoor Attack backdoor defense
Code Code Available 0A Dual-Purpose Framework for Backdoor Defense and Backdoor Amplification in Diffusion Models Feb 26, 2025 Backdoor Attack backdoor defense
— Unverified 0Stealthy Backdoor Attack in Self-Supervised Learning Vision Encoders for Large Vision Language Models Feb 25, 2025 Backdoor Attack Hallucination
— Unverified 0Multi-Target Federated Backdoor Attack Based on Feature Aggregation Feb 23, 2025 Backdoor Attack Federated Learning
— Unverified 0ELBA-Bench: An Efficient Learning Backdoor Attacks Benchmark for Large Language Models Feb 22, 2025 Backdoor Attack In-Context Learning
— Unverified 0Show Me Your Code! Kill Code Poisoning: A Lightweight Method Based on Code Naturalness Feb 20, 2025 Backdoor Attack Language Modeling
— Unverified 0ReVeil: Unconstrained Concealed Backdoor Attack on Deep Neural Networks using Machine Unlearning Feb 17, 2025 Backdoor Attack Machine Unlearning
Code Code Available 0To Think or Not to Think: Exploring the Unthinking Vulnerability in Large Reasoning Models Feb 16, 2025 Adversarial Attack Backdoor Attack
Code Code Available 1A Robust Attack: Displacement Backdoor Attack Feb 14, 2025 Autonomous Driving Backdoor Attack
— Unverified 0Online Gradient Boosting Decision Tree: In-Place Updates for Efficient Adding/Deleting Data Feb 3, 2025 Backdoor Attack
Code Code Available 0