SOTAVerified

Backdoor Attack

Backdoor attacks inject maliciously constructed data into a training set so that, at test time, the trained model misclassifies inputs patched with a backdoor trigger as an adversarially-desired target class.

Papers

Showing 451475 of 523 papers

TitleStatusHype
Attacking by Aligning: Clean-Label Backdoor Attacks on Object DetectionCode0
Gungnir: Exploiting Stylistic Features in Images for Backdoor Attacks on Diffusion ModelsCode0
Diff-Cleanse: Identifying and Mitigating Backdoor Attacks in Diffusion ModelsCode0
MDTD: A Multi Domain Trojan Detector for Deep Neural NetworksCode0
Backdoor Pre-trained Models Can Transfer to AllCode0
Towards Invisible Backdoor Attack on Text-to-Image Diffusion ModelCode0
Color Backdoor: A Robust Poisoning Attack in Color SpaceCode0
Backdoor Graph CondensationCode0
Going In Style: Audio Backdoors Through Stylistic TransformationsCode0
Genetic Algorithm-Based Dynamic Backdoor Attack on Federated Learning-Based Network Traffic ClassificationCode0
Mind Your Heart: Stealthy Backdoor Attack on Dynamic Deep Neural Network in Edge ComputingCode0
Unlearning Backdoor Attacks for LLMs with Weak-to-Strong Knowledge DistillationCode0
Mitigating Backdoor Attack by Injecting Proactive Defensive BackdoorCode0
Where to Attack: A Dynamic Locator Model for Backdoor Attack in Text ClassificationsCode0
Generalization Bound and New Algorithm for Clean-Label Backdoor AttackCode0
MixBridge: Heterogeneous Image-to-Image Backdoor Attack through Mixture of Schrödinger BridgesCode0
Model-Contrastive Learning for Backdoor DefenseCode0
Model Pairing Using Embedding Translation for Backdoor Attack Detection on Open-Set Classification TasksCode0
Scanning Trojaned Models Using Out-of-Distribution SamplesCode0
Motif-Backdoor: Rethinking the Backdoor Attack on Graph Neural Networks via MotifsCode0
MSDT: Masked Language Model Scoring Defense in Text DomainCode0
Backdoor for Debias: Mitigating Model Bias with Backdoor Attack-based Artificial BiasCode0
From Trojan Horses to Castle Walls: Unveiling Bilateral Data Poisoning Effects in Diffusion ModelsCode0
SDBA: A Stealthy and Long-Lasting Durable Backdoor Attack in Federated LearningCode0
Beating Backdoor Attack at Its Own GameCode0
Show:102550
← PrevPage 19 of 21Next →

No leaderboard results yet.