SOTAVerified

Backdoor Attack

Backdoor attacks inject maliciously constructed data into a training set so that, at test time, the trained model misclassifies inputs patched with a backdoor trigger as an adversarially-desired target class.

Papers

Showing 201250 of 523 papers

TitleStatusHype
Defending Against Weight-Poisoning Backdoor Attacks for Parameter-Efficient Fine-Tuning0
Defending Backdoor Attacks on Vision Transformer via Patch Processing0
HaS-Nets: A Heal and Select Mechanism to Defend DNNs Against Backdoor Attacks for Data Collection Scenarios0
Hidden Backdoor Attack against Deep Learning-Based Wireless Signal Modulation Classifiers0
Defending the Edge: Representative-Attention for Mitigating Backdoor Attacks in Federated Learning0
Defense-as-a-Service: Black-box Shielding against Backdoored Graph Models0
HoneypotNet: Backdoor Attacks Against Model Extraction0
Cooperative Backdoor Attack in Decentralized Reinforcement Learning with Theoretical Guarantee0
Detecting Backdoor in Deep Neural Networks via Intentional Adversarial Perturbations0
Detector Collapse: Physical-World Backdooring Object Detection to Catastrophic Overload or Blindness in Autonomous Driving0
DeTrigger: A Gradient-Centric Approach to Backdoor Attack Mitigation in Federated Learning0
DiffPhysBA: Diffusion-based Physical Backdoor Attack against Person Re-Identification in Real-World0
DisDet: Exploring Detectability of Backdoor Attack on Diffusion Models0
Does Few-shot Learning Suffer from Backdoor Attacks?0
Don't Trigger Me! A Triggerless Backdoor Attack Against Deep Neural Networks0
Double Landmines: Invisible Textual Backdoor Attacks based on Dual-Trigger0
Contributor-Aware Defenses Against Adversarial Backdoor Attacks0
Dual Model Replacement:invisible Multi-target Backdoor Attack based on Federal Learning0
Backdoor Attack with Imperceptible Input and Latent Modification0
Confidence Matters: Inspecting Backdoors in Deep Neural Networks via Distribution Transfer0
EEG-Based Brain-Computer Interfaces Are Vulnerable to Backdoor Attacks0
BadCLM: Backdoor Attack in Clinical Language Models for Electronic Health Records0
Concealing Backdoor Model Updates in Federated Learning by Trigger-Optimized Data Poisoning0
ELBA-Bench: An Efficient Learning Backdoor Attacks Benchmark for Large Language Models0
Exploiting Machine Unlearning for Backdoor Attacks in Deep Learning System0
BadDepth: Backdoor Attacks Against Monocular Depth Estimation in the Physical World0
A semantic backdoor attack against Graph Convolutional Networks0
Compression-Resistant Backdoor Attack against Deep Neural Networks0
A Semantic and Clean-label Backdoor Attack against Graph Convolutional Networks0
Enhancing Adversarial Training with Prior Knowledge Distillation for Robust Image Compression0
Backdoor Attacks with Input-unique Triggers in NLP0
Erased but Not Forgotten: How Backdoors Compromise Concept Erasure0
CloudFort: Enhancing Robustness of 3D Point Cloud Classification Against Backdoor Attacks via Spatial Partitioning and Ensemble Prediction0
Evil from Within: Machine Learning Backdoors through Hardware Trojans0
Evolutionary Trigger Detection and Lightweight Model Repair Based Backdoor Defense0
BadGPT: Exploring Security Vulnerabilities of ChatGPT via Backdoor Attacks to InstructGPT0
A Clean-graph Backdoor Attack against Graph Convolutional Networks with Poisoned Label Only0
Explainability-based Backdoor Attacks Against Graph Neural Networks0
Exploring Backdoor Attack and Defense for LLM-empowered Recommendations0
A4O: All Trigger for One sample0
EX-RAY: Distinguishing Injected Backdoor from Natural Features in Neural Networks by Examining Differential Feature Symmetry0
Fake the Real: Backdoor Attack on Deep Speech Classification via Voice Conversion0
CLEAR: Clean-Up Sample-Targeted Backdoor in Neural Networks0
Backdoor Attacks on the DNN Interpretation System0
Feature Grinding: Efficient Backdoor Sanitation in Deep Neural Networks0
A Robust Attack: Displacement Backdoor Attack0
Physical Backdoor Attacks to Lane Detection Systems in Autonomous Driving0
Federated Learning with Flexible Architectures0
Check Your Other Door! Creating Backdoor Attacks in the Frequency Domain0
Are You Copying My Prompt? Protecting the Copyright of Vision Prompt for VPaaS via Watermark0
Show:102550
← PrevPage 5 of 11Next →

No leaderboard results yet.