SOTAVerified

Backdoor Attack

Backdoor attacks inject maliciously constructed data into a training set so that, at test time, the trained model misclassifies inputs patched with a backdoor trigger as an adversarially-desired target class.

Papers

Showing 276300 of 523 papers

TitleStatusHype
A Clean-graph Backdoor Attack against Graph Convolutional Networks with Poisoned Label Only0
Detector Collapse: Physical-World Backdooring Object Detection to Catastrophic Overload or Blindness in Autonomous Driving0
SpamDam: Towards Privacy-Preserving and Adversary-Resistant SMS Spam DetectionCode0
How to Craft Backdoors with Unlabeled Data Alone?Code0
Backdoor Attack on Multilingual Machine Translation0
Manipulating and Mitigating Generative Model Biases without Retraining0
Privacy Backdoors: Enhancing Membership Inference through Poisoning Pre-trained Models0
A Backdoor Approach with Inverted Labels Using Dirty Label-Flipping Attacks0
Towards Adversarial Robustness And Backdoor Mitigation in SSLCode0
Impart: An Imperceptible and Effective Label-Specific Backdoor Attack0
Invisible Backdoor Attack Through Singular Value Decomposition0
Backdoor Attack with Mode Mixture Latent Modification0
AS-FIBA: Adaptive Selective Frequency-Injection for Backdoor Attack on Deep Face Restoration0
Enhancing Adversarial Training with Prior Knowledge Distillation for Robust Image Compression0
iBA: Backdoor Attack on 3D Point Cloud via Reconstructing Itself0
A general approach to enhance the survivability of backdoor attacks by decision path couplingCode0
SynGhost: Invisible and Universal Task-agnostic Backdoor Attack via Syntactic TransferCode0
Model Pairing Using Embedding Translation for Backdoor Attack Detection on Open-Set Classification TasksCode0
Low-Frequency Black-Box Backdoor Attack via Evolutionary Algorithm0
VL-Trojan: Multimodal Instruction Backdoor Attacks against Autoregressive Visual Language Models0
Whispers in Grammars: Injecting Covert Backdoors to Compromise Dense Retrieval SystemsCode0
Defending Against Weight-Poisoning Backdoor Attacks for Parameter-Efficient Fine-Tuning0
Backdoor Attack against One-Class Sequential Anomaly Detection ModelsCode0
OrderBkd: Textual backdoor attack through repositioningCode0
The last Dance : Robust backdoor attack via diffusion models and bayesian approach0
Show:102550
← PrevPage 12 of 21Next →

No leaderboard results yet.