SOTAVerified

Backdoor Attack

Backdoor attacks inject maliciously constructed data into a training set so that, at test time, the trained model misclassifies inputs patched with a backdoor trigger as an adversarially-desired target class.

Papers

Showing 426450 of 523 papers

TitleStatusHype
Data Poisoning-based Backdoor Attack Framework against Supervised Learning Rules of Spiking Neural Networks0
DeBackdoor: A Deductive Framework for Detecting Backdoor Attacks on Deep Models with Limited Data0
Debiasing Backdoor Attack: A Benign Application of Backdoor Attack in Eliminating Data Bias0
Deep Learning Backdoors0
DeepPayload: Black-box Backdoor Attack on Deep Learning Models through Neural Payload Injection0
DeepSweep: An Evaluation Framework for Mitigating DNN Backdoor Attacks using Data Augmentation0
DEFEAT: Deep Hidden Feature Backdoor Attacks by Imperceptible Perturbation and Latent Representation Constraints0
Defending against Backdoor Attack on Deep Neural Networks0
Defending Against Backdoor Attack on Graph Nerual Network by Explainability0
Defending against Backdoor Attacks in Natural Language Generation0
Defending Against Backdoor Attacks Using Ensembles of Weak Learners0
Defending Against Weight-Poisoning Backdoor Attacks for Parameter-Efficient Fine-Tuning0
Defending Backdoor Attacks on Vision Transformer via Patch Processing0
Defending Backdoor Data Poisoning Attacks by Using Noisy Label Defense Algorithm0
Defending the Edge: Representative-Attention for Mitigating Backdoor Attacks in Federated Learning0
Defense-as-a-Service: Black-box Shielding against Backdoored Graph Models0
Demystifying Poisoning Backdoor Attacks from a Statistical Perspective0
Detecting Backdoor in Deep Neural Networks via Intentional Adversarial Perturbations0
Detector Collapse: Physical-World Backdooring Object Detection to Catastrophic Overload or Blindness in Autonomous Driving0
DeTrigger: A Gradient-Centric Approach to Backdoor Attack Mitigation in Federated Learning0
DiffPhysBA: Diffusion-based Physical Backdoor Attack against Person Re-Identification in Real-World0
DisDet: Exploring Detectability of Backdoor Attack on Diffusion Models0
Does Few-shot Learning Suffer from Backdoor Attacks?0
Don't Trigger Me! A Triggerless Backdoor Attack Against Deep Neural Networks0
Double Landmines: Invisible Textual Backdoor Attacks based on Dual-Trigger0
Show:102550
← PrevPage 18 of 21Next →

No leaderboard results yet.