SOTAVerified

Backdoor Attack

Backdoor attacks inject maliciously constructed data into a training set so that, at test time, the trained model misclassifies inputs patched with a backdoor trigger as an adversarially-desired target class.

Papers

Showing 301325 of 523 papers

TitleStatusHype
VL-Trojan: Multimodal Instruction Backdoor Attacks against Autoregressive Visual Language Models0
VSVC: Backdoor attack against Keyword Spotting based on Voiceprint Selection and Voice Conversion0
Vulnerabilities of Deep Learning-Driven Semantic Communications to Backdoor (Trojan) Attacks0
WaveAttack: Asymmetric Frequency Obfuscation-based Backdoor Attacks Against Deep Neural Networks0
Weak-to-Strong Backdoor Attack for Large Language Models0
When Backdoors Speak: Understanding LLM Backdoor Attacks Through Model-Generated Explanations0
Widen The Backdoor To Let More Attackers In0
You Are Catching My Attention: Are Vision Transformers Bad Learners Under Backdoor Attacks?0
DeepBaR: Fault Backdoor Attack on Deep Neural Network Layers0
Personalization as a Shortcut for Few-Shot Backdoor Attack against Text-to-Image Diffusion Models0
Data-centric NLP Backdoor Defense from the Lens of Memorization0
SPBA: Utilizing Speech Large Language Model for Backdoor Attacks on Speech Classification Models0
A4O: All Trigger for One sample0
A Backdoor Approach with Inverted Labels Using Dirty Label-Flipping Attacks0
Effective backdoor attack on graph neural networks in link prediction tasks0
A Backdoor Attack Scheme with Invisible Triggers Based on Model Architecture Modification0
A Channel-Triggered Backdoor Attack on Wireless Semantic Image Reconstruction0
A Clean-graph Backdoor Attack against Graph Convolutional Networks with Poisoned Label Only0
A clean-label graph backdoor attack method in node classification task0
Act in Collusion: A Persistent Distributed Multi-Target Backdoor in Federated Learning0
Adaptive Backdoor Attacks with Reasonable Constraints on Graph Neural Networks0
AdaTest:Reinforcement Learning and Adaptive Sampling for On-chip Hardware Trojan Detection0
A Disguised Wolf Is More Harmful Than a Toothless Tiger: Adaptive Malicious Code Injection Backdoor Attack Leveraging User Behavior as Triggers0
A Dual-Purpose Framework for Backdoor Defense and Backdoor Amplification in Diffusion Models0
A Dual Stealthy Backdoor: From Both Spatial and Frequency Perspectives0
Show:102550
← PrevPage 13 of 21Next →

No leaderboard results yet.