SOTAVerified

Backdoor Attack

Backdoor attacks inject maliciously constructed data into a training set so that, at test time, the trained model misclassifies inputs patched with a backdoor trigger as an adversarially-desired target class.

Papers

Showing 351375 of 523 papers

TitleStatusHype
Backdoor Attacks for Remote Sensing Data with Wavelet TransformCode1
CorruptEncoder: Data Poisoning based Backdoor Attacks to Contrastive LearningCode1
MSDT: Masked Language Model Scoring Defense in Text DomainCode0
Going In Style: Audio Backdoors Through Stylistic TransformationsCode0
Untargeted Backdoor Attack against Object DetectionCode1
BATT: Backdoor Attack with Transformation-based Triggers0
Motif-Backdoor: Rethinking the Backdoor Attack on Graph Neural Networks via MotifsCode0
FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated LearningCode1
Apple of Sodom: Hidden Backdoors in Superior Sentence Embeddings via Contrastive Learning0
Backdoor Attack and Defense in Federated Generative Adversarial Network-based Medical Image Synthesis0
Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class0
An Embarrassingly Simple Backdoor Attack on Self-supervised LearningCode1
Understanding Impacts of Task Similarity on Backdoor Attack and Detection0
Few-shot Backdoor Attacks via Neural Tangent KernelsCode0
BAFFLE: Hiding Backdoors in Offline Reinforcement Learning DatasetsCode1
Where to Attack: A Dynamic Locator Model for Backdoor Attack in Text ClassificationsCode0
Defending Against Backdoor Attack on Graph Nerual Network by Explainability0
TrojViT: Trojan Insertion in Vision TransformersCode1
FedPrompt: Communication-Efficient and Privacy Preserving Prompt Tuning in Federated Learning0
Bidirectional Contrastive Split Learning for Visual Question Answering0
RIBAC: Towards Robust and Imperceptible Backdoor Attack against Compact DNNCode0
Imperceptible and Robust Backdoor Attack in 3D Point CloudCode1
Link-Backdoor: Backdoor Attack on Link Prediction via Node InjectionCode0
Confidence Matters: Inspecting Backdoors in Deep Neural Networks via Distribution Transfer0
A Knowledge Distillation-Based Backdoor Attack in Federated Learning0
Show:102550
← PrevPage 15 of 21Next →

No leaderboard results yet.