SOTAVerified

Backdoor Attack

Backdoor attacks inject maliciously constructed data into a training set so that, at test time, the trained model misclassifies inputs patched with a backdoor trigger as an adversarially-desired target class.

Papers

Showing 376400 of 523 papers

TitleStatusHype
Trading Devil Final: Backdoor attack via Stock market and Bayesian Optimization0
Trading Devil RL: Backdoor attack via Stock market, Bayesian Optimization and Reinforcement Learning0
Trading Devil: Robust backdoor attack via Stochastic investment models and Bayesian approach0
Transferable Graph Backdoor Attack0
Trojan Horse Training for Breaking Defenses against Backdoor Attacks in Deep Learning0
Are You Using Reliable Graph Prompts? Trojan Prompt Attacks on Graph Neural Networks0
TrojanRobot: Physical-World Backdoor Attacks Against VLM-based Robotic Manipulation0
TrojVLM: Backdoor Attack Against Vision Language Models0
Understanding Impacts of Task Similarity on Backdoor Attack and Detection0
Bidirectional Contrastive Split Learning for Visual Question Answering0
Universal Vulnerabilities in Large Language Models: Backdoor Attacks for In-context Learning0
Unlearn to Relearn Backdoors: Deferred Backdoor Functionality Attacks on Deep Learning Models0
UOR: Universal Backdoor Attacks on Pre-trained Language Models0
VisualTrap: A Stealthy Backdoor Attack on GUI Agents via Visual Grounding Manipulation0
VL-Trojan: Multimodal Instruction Backdoor Attacks against Autoregressive Visual Language Models0
VSVC: Backdoor attack against Keyword Spotting based on Voiceprint Selection and Voice Conversion0
Vulnerabilities of Deep Learning-Driven Semantic Communications to Backdoor (Trojan) Attacks0
WaveAttack: Asymmetric Frequency Obfuscation-based Backdoor Attacks Against Deep Neural Networks0
Weak-to-Strong Backdoor Attack for Large Language Models0
When Backdoors Speak: Understanding LLM Backdoor Attacks Through Model-Generated Explanations0
Widen The Backdoor To Let More Attackers In0
You Are Catching My Attention: Are Vision Transformers Bad Learners Under Backdoor Attacks?0
DeepBaR: Fault Backdoor Attack on Deep Neural Network Layers0
Invisible Threats: Backdoor Attack in OCR Systems0
Is It Possible to Backdoor Face Forgery Detection with Natural Triggers?0
Show:102550
← PrevPage 16 of 21Next →

No leaderboard results yet.