SOTAVerified

Backdoor Attack

Backdoor attacks inject maliciously constructed data into a training set so that, at test time, the trained model misclassifies inputs patched with a backdoor trigger as an adversarially-desired target class.

Papers

Showing 101150 of 523 papers

TitleStatusHype
Can We Mitigate Backdoor Attack Using Adversarial Detection Methods?Code1
Deep Feature Space Trojan Attack of Neural Networks by Controlled DetoxificationCode1
Sleeper Agent: Scalable Hidden Trigger Backdoors for Neural Networks Trained from ScratchCode1
Backdoor Attacks Against Dataset DistillationCode1
LOTUS: Evasive and Resilient Backdoor Attacks through Sub-PartitioningCode1
LIRA: Learnable, Imperceptible and Robust Backdoor AttacksCode1
Mask-based Invisible Backdoor Attacks on Object DetectionCode1
Universal Jailbreak Backdoors from Poisoned Human FeedbackCode1
BadCLIP: Dual-Embedding Guided Backdoor Attack on Multimodal Contrastive LearningCode1
Mind the Style of Text! Adversarial and Backdoor Attacks Based on Text Style TransferCode1
T2IShield: Defending Against Backdoors on Text-to-Image Diffusion ModelsCode1
Mitigating Fine-tuning based Jailbreak Attack with Backdoor Enhanced Safety AlignmentCode1
Backdoor Attack against Speaker VerificationCode1
BadEdit: Backdooring large language models by model editingCode1
Online Gradient Boosting Decision Tree: In-Place Updates for Efficient Adding/Deleting DataCode0
OrderBkd: Textual backdoor attack through repositioningCode0
"No Matter What You Do": Purifying GNN Models via Backdoor UnlearningCode0
Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural NetworksCode0
Pass off Fish Eyes for Pearls: Attacking Model Selection of Pre-trained ModelsCode0
Model-Contrastive Learning for Backdoor DefenseCode0
Model Pairing Using Embedding Translation for Backdoor Attack Detection on Open-Set Classification TasksCode0
NoiseAttack: An Evasive Sample-Specific Multi-Targeted Backdoor Attack Through White Gaussian NoiseCode0
MixBridge: Heterogeneous Image-to-Image Backdoor Attack through Mixture of Schrödinger BridgesCode0
Motif-Backdoor: Rethinking the Backdoor Attack on Graph Neural Networks via MotifsCode0
BadDet: Backdoor Attacks on Object DetectionCode0
Backdoor Attack against One-Class Sequential Anomaly Detection ModelsCode0
Towards Adversarial Robustness And Backdoor Mitigation in SSLCode0
MSDT: Masked Language Model Scoring Defense in Text DomainCode0
Attacking by Aligning: Clean-Label Backdoor Attacks on Object DetectionCode0
MDTD: A Multi Domain Trojan Detector for Deep Neural NetworksCode0
Link-Backdoor: Backdoor Attack on Link Prediction via Node InjectionCode0
Backdoor Pre-trained Models Can Transfer to AllCode0
Learning to Backdoor Federated LearningCode0
MakeupAttack: Feature Space Black-box Backdoor Attack on Face Recognition via Makeup TransferCode0
Mind Your Heart: Stealthy Backdoor Attack on Dynamic Deep Neural Network in Edge ComputingCode0
Invisible Backdoor Attack with Dynamic Triggers against Person Re-identificationCode0
Invisible Backdoor Triggers in Image Editing Model via Deep WatermarkingCode0
Attacks on fairness in Federated LearningCode0
Backdoor Graph CondensationCode0
Backdoor for Debias: Mitigating Model Bias with Backdoor Attack-based Artificial BiasCode0
Backdooring Bias into Text-to-Image ModelsCode0
Under-confidence Backdoors Are Resilient and Stealthy BackdoorsCode0
Mitigating Backdoor Attack by Injecting Proactive Defensive BackdoorCode0
PBP: Post-training Backdoor Purification for Malware ClassifiersCode0
Enhancing Backdoor Attacks with Multi-Level MMD RegularizationCode0
Beating Backdoor Attack at Its Own GameCode0
Gungnir: Exploiting Stylistic Features in Images for Backdoor Attacks on Diffusion ModelsCode0
Genetic Algorithm-Based Dynamic Backdoor Attack on Federated Learning-Based Network Traffic ClassificationCode0
Going In Style: Audio Backdoors Through Stylistic TransformationsCode0
Generalization Bound and New Algorithm for Clean-Label Backdoor AttackCode0
Show:102550
← PrevPage 3 of 11Next →

No leaderboard results yet.