SOTAVerified

Backdoor Attack

Backdoor attacks inject maliciously constructed data into a training set so that, at test time, the trained model misclassifies inputs patched with a backdoor trigger as an adversarially-desired target class.

Papers

Showing 476500 of 523 papers

TitleStatusHype
GENIE: Watermarking Graph Neural Networks for Link Prediction0
GhostEncoder: Stealthy Backdoor Attacks with Dynamic Triggers to Pre-trained Encoders in Self-supervised Learning0
Gradient Broadcast Adaptation: Defending against the backdoor attack in pre-trained models0
Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering0
Handcrafted Backdoors in Deep Neural Networks0
HaS-Nets: A Heal and Select Mechanism to Defend DNNs Against Backdoor Attacks for Data Collection Scenarios0
Heterogeneous Graph Backdoor Attack0
Hidden Backdoor Attack against Deep Learning-Based Wireless Signal Modulation Classifiers0
Hidden Backdoor Attack against Semantic Segmentation Models0
HoneypotNet: Backdoor Attacks Against Model Extraction0
Impart: An Imperceptible and Effective Label-Specific Backdoor Attack0
Imperceptible and Multi-channel Backdoor Attack against Deep Neural Networks0
Imperio: Language-Guided Backdoor Attacks for Arbitrary Model Control0
Adversarial Backdoor Attack by Naturalistic Data Poisoning on Trajectory Prediction in Autonomous Driving0
Inferring Properties of Graph Neural Networks0
Injecting Bias into Text Classification Models using Backdoor Attacks0
Invisible Backdoor Attacks Using Data Poisoning in the Frequency Domain0
Invisible Backdoor Attack Through Singular Value Decomposition0
Invisible Threats: Backdoor Attack in OCR Systems0
Is It Possible to Backdoor Face Forgery Detection with Natural Triggers?0
Is Multi-Modal Necessarily Better? Robustness Evaluation of Multi-modal Fake News Detection0
Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers0
Krait: A Backdoor Attack Against Graph Prompt Tuning0
LADDER: Multi-objective Backdoor Attack via Evolutionary Algorithm0
Large Language Models are Good Attackers: Efficient and Stealthy Textual Backdoor Attacks0
Show:102550
← PrevPage 20 of 21Next →

No leaderboard results yet.