ONION: A Simple and Effective Defense Against Textual Backdoor Attacks Nov 20, 2020 Backdoor Attack backdoor defense
Code Code Available 1Backdoor Attack against Speaker Verification Oct 22, 2020 Backdoor Attack Clustering
Code Code Available 1Embedding and Extraction of Knowledge in Tree Ensemble Classifiers Oct 16, 2020 Backdoor Attack BIG-bench Machine Learning
Code Code Available 1Input-Aware Dynamic Backdoor Attack Oct 16, 2020 Backdoor Attack Diversity
Code Code Available 1Practical Detection of Trojan Neural Networks: Data-Limited and Data-Free Cases Jul 31, 2020 Backdoor Attack
Code Code Available 1Defending against Backdoors in Federated Learning with Robust Learning Rate Jul 7, 2020 Backdoor Attack Federated Learning
Code Code Available 1Reflection Backdoor: A Natural Backdoor Attack on Deep Neural Networks Jul 5, 2020 Backdoor Attack
Code Code Available 1Can We Mitigate Backdoor Attack Using Adversarial Detection Methods? Jun 26, 2020 Adversarial Defense Backdoor Attack
Code Code Available 1Graph Backdoor Jun 21, 2020 Backdoor Attack Descriptive
Code Code Available 1Backdoor Attacks to Graph Neural Networks Jun 19, 2020 Backdoor Attack General Classification
Code Code Available 1DBA: Distributed Backdoor Attacks against Federated Learning May 1, 2020 Backdoor Attack Feature Importance
Code Code Available 1Clean-Label Backdoor Attacks on Video Recognition Models Mar 6, 2020 Backdoor Attack backdoor defense
Code Code Available 1Hidden Trigger Backdoor Attacks Sep 30, 2019 Backdoor Attack image-classification
Code Code Available 1A new Backdoor Attack in CNNs by training set corruption without label poisoning Feb 12, 2019 Backdoor Attack General Classification
Code Code Available 1VisualTrap: A Stealthy Backdoor Attack on GUI Agents via Visual Grounding Manipulation Jul 9, 2025 Backdoor Attack Visual Grounding
— Unverified 0Beyond Training-time Poisoning: Component-level and Post-training Backdoors in Deep Reinforcement Learning Jul 7, 2025 Backdoor Attack Deep Reinforcement Learning
— Unverified 0CUBA: Controlled Untargeted Backdoor Attack against Deep Neural Networks Jun 20, 2025 Backdoor Attack backdoor defense
— Unverified 0Screen Hijack: Visual Poisoning of VLM Agents in Mobile Environments Jun 16, 2025 Backdoor Attack
— Unverified 0ME: Trigger Element Combination Backdoor Attack on Copyright Infringement Jun 12, 2025 Backdoor Attack
— Unverified 0Single-Node Trigger Backdoor Attacks in Graph-Based Recommendation Systems Jun 10, 2025 Backdoor Attack Recommendation Systems
— Unverified 0SPBA: Utilizing Speech Large Language Model for Backdoor Attacks on Speech Classification Models Jun 10, 2025 Backdoor Attack Keyword Spotting
— Unverified 0Backdoor Attack on Vision Language Models with Stealthy Semantic Manipulation Jun 8, 2025 Backdoor Attack Data Poisoning
— Unverified 0Invisible Backdoor Triggers in Image Editing Model via Deep Watermarking Jun 5, 2025 Backdoor Attack Image Generation
Code Code Available 0Heterogeneous Graph Backdoor Attack May 30, 2025 Backdoor Attack backdoor defense
— Unverified 0Poison in the Well: Feature Embedding Disruption in Backdoor Attacks May 26, 2025 Backdoor Attack
— Unverified 0BadDepth: Backdoor Attacks Against Monocular Depth Estimation in the Physical World May 22, 2025 Autonomous Driving Backdoor Attack
— Unverified 0Backdoors in DRL: Four Environments Focusing on In-distribution Triggers May 22, 2025 Backdoor Attack Data Poisoning
— Unverified 0BadVLA: Towards Backdoor Attacks on Vision-Language-Action Models via Objective-Decoupled Optimization May 22, 2025 Backdoor Attack Vision-Language-Action
— Unverified 0FIGhost: Fluorescent Ink-based Stealthy and Flexible Backdoor Attacks on Physical Traffic Sign Recognition May 17, 2025 Autonomous Driving Backdoor Attack
— Unverified 0Defending the Edge: Representative-Attention for Mitigating Backdoor Attacks in Federated Learning May 15, 2025 Backdoor Attack Federated Learning
— Unverified 0MixBridge: Heterogeneous Image-to-Image Backdoor Attack through Mixture of Schrödinger Bridges May 12, 2025 Backdoor Attack
Code Code Available 0Natural Reflection Backdoor Attack on Vision Language Model for Autonomous Driving May 9, 2025 Autonomous Driving Backdoor Attack
— Unverified 0BadLingual: A Novel Lingual-Backdoor Attack against Large Language Models May 6, 2025 Backdoor Attack
— Unverified 0Protocol-agnostic and Data-free Backdoor Attacks on Pre-trained Models in RF Fingerprinting May 1, 2025 Backdoor Attack
Code Code Available 0Dynamic Attention Analysis for Backdoor Detection in Text-to-Image Diffusion Models Apr 29, 2025 Backdoor Attack
Code Code Available 0SFIBA: Spatial-based Full-target Invisible Backdoor Attacks Apr 29, 2025 Backdoor Attack Specificity
— Unverified 0Erased but Not Forgotten: How Backdoors Compromise Concept Erasure Apr 29, 2025 Backdoor Attack Machine Unlearning
— Unverified 0BadMoE: Backdooring Mixture-of-Experts LLMs via Optimizing Routing Triggers and Infecting Dormant Experts Apr 24, 2025 Backdoor Attack Mixture-of-Experts
— Unverified 0Robo-Troj: Attacking LLM-based Task Planners Apr 23, 2025 Backdoor Attack Diversity
— Unverified 0BadApex: Backdoor Attack Based on Adaptive Optimization Mechanism of Black-box Large Language Models Apr 18, 2025 Backdoor Attack
— Unverified 0Strategic Planning of Stealthy Backdoor Attacks in Markov Decision Processes Apr 17, 2025 Backdoor Attack
— Unverified 0Exploring Backdoor Attack and Defense for LLM-empowered Recommendations Apr 15, 2025 Backdoor Attack Recommendation Systems
— Unverified 0Parasite: A Steganography-based Backdoor Attack Framework for Diffusion Models Apr 8, 2025 Backdoor Attack Image Generation
— Unverified 0ShadowCoT: Cognitive Hijacking for Stealthy Reasoning Backdoors in LLMs Apr 8, 2025 Backdoor Attack
— Unverified 0Backdoor Detection through Replicated Execution of Outsourced Training Mar 31, 2025 Backdoor Attack
— Unverified 0A Channel-Triggered Backdoor Attack on Wireless Semantic Image Reconstruction Mar 31, 2025 Backdoor Attack Image Reconstruction
— Unverified 0DeBackdoor: A Deductive Framework for Detecting Backdoor Attacks on Deep Models with Limited Data Mar 27, 2025 Backdoor Attack
— Unverified 0Towards Invisible Backdoor Attack on Text-to-Image Diffusion Model Mar 22, 2025 Backdoor Attack
Code Code Available 0A Semantic and Clean-label Backdoor Attack against Graph Convolutional Networks Mar 19, 2025 Backdoor Attack Graph Classification
— Unverified 0Adaptive Backdoor Attacks with Reasonable Constraints on Graph Neural Networks Mar 12, 2025 Backdoor Attack Graph Similarity
— Unverified 0