SOTAVerified

Backdoor Attack

Backdoor attacks inject maliciously constructed data into a training set so that, at test time, the trained model misclassifies inputs patched with a backdoor trigger as an adversarially-desired target class.

Papers

Showing 226250 of 523 papers

TitleStatusHype
Exploiting the Vulnerability of Large Language Models via Defense-Aware Architectural BackdoorCode0
NoiseAttack: An Evasive Sample-Specific Multi-Targeted Backdoor Attack Through White Gaussian NoiseCode0
EmoAttack: Utilizing Emotional Voice Conversion for Speech Backdoor Attacks on Deep Speech Classification Models0
SAB:A Stealing and Robust Backdoor Attack based on Steganographic Algorithm against Federated Learning0
MakeupAttack: Feature Space Black-box Backdoor Attack on Face Recognition via Makeup TransferCode0
Large Language Models are Good Attackers: Efficient and Stealthy Textual Backdoor Attacks0
MEGen: Generative Backdoor in Large Language Models via Model Editing0
A Disguised Wolf Is More Harmful Than a Toothless Tiger: Adaptive Malicious Code Injection Backdoor Attack Leveraging User Behavior as Triggers0
Diff-Cleanse: Identifying and Mitigating Backdoor Attacks in Diffusion ModelsCode0
DeepBaR: Fault Backdoor Attack on Deep Neural Network Layers0
BackdoorBench: A Comprehensive Benchmark and Analysis of Backdoor Learning0
Trading Devil Final: Backdoor attack via Stock market and Bayesian Optimization0
Krait: A Backdoor Attack Against Graph Prompt Tuning0
Backdoor Attacks against Image-to-Image Networks0
BoBa: Boosting Backdoor Detection through Data Distribution Inference in Federated Learning0
Evolutionary Trigger Detection and Lightweight Model Repair Based Backdoor Defense0
BadCLM: Backdoor Attack in Clinical Language Models for Electronic Health Records0
Backdoor Graph CondensationCode0
SOS! Soft Prompt Attack Against Open-Source Large Language Models0
Venomancer: Towards Imperceptible and Target-on-Demand Backdoor Attacks in Federated LearningCode0
Attack On Prompt: Backdoor Attack in Prompt-Based Continual Learning0
Revisiting Backdoor Attacks against Large Vision-Language Models from Domain Shift0
CBPF: Filtering Poisoned Data Based on Composite Backdoor Attack0
EmoAttack: Emotion-to-Image Diffusion Models for Emotional Backdoor Generation0
Backdooring Bias into Text-to-Image ModelsCode0
Show:102550
← PrevPage 10 of 21Next →

No leaderboard results yet.