SOTAVerified

Backdoor Attack

Backdoor attacks inject maliciously constructed data into a training set so that, at test time, the trained model misclassifies inputs patched with a backdoor trigger as an adversarially-desired target class.

Papers

Showing 126150 of 523 papers

TitleStatusHype
BadDepth: Backdoor Attacks Against Monocular Depth Estimation in the Physical World0
Backdoors in DRL: Four Environments Focusing on In-distribution Triggers0
BadVLA: Towards Backdoor Attacks on Vision-Language-Action Models via Objective-Decoupled Optimization0
FIGhost: Fluorescent Ink-based Stealthy and Flexible Backdoor Attacks on Physical Traffic Sign Recognition0
Defending the Edge: Representative-Attention for Mitigating Backdoor Attacks in Federated Learning0
MixBridge: Heterogeneous Image-to-Image Backdoor Attack through Mixture of Schrödinger BridgesCode0
Natural Reflection Backdoor Attack on Vision Language Model for Autonomous Driving0
BadLingual: A Novel Lingual-Backdoor Attack against Large Language Models0
Protocol-agnostic and Data-free Backdoor Attacks on Pre-trained Models in RF FingerprintingCode0
Dynamic Attention Analysis for Backdoor Detection in Text-to-Image Diffusion ModelsCode0
SFIBA: Spatial-based Full-target Invisible Backdoor Attacks0
Erased but Not Forgotten: How Backdoors Compromise Concept Erasure0
BadMoE: Backdooring Mixture-of-Experts LLMs via Optimizing Routing Triggers and Infecting Dormant Experts0
Robo-Troj: Attacking LLM-based Task Planners0
BadApex: Backdoor Attack Based on Adaptive Optimization Mechanism of Black-box Large Language Models0
Strategic Planning of Stealthy Backdoor Attacks in Markov Decision Processes0
Exploring Backdoor Attack and Defense for LLM-empowered Recommendations0
Parasite: A Steganography-based Backdoor Attack Framework for Diffusion Models0
ShadowCoT: Cognitive Hijacking for Stealthy Reasoning Backdoors in LLMs0
Backdoor Detection through Replicated Execution of Outsourced Training0
A Channel-Triggered Backdoor Attack on Wireless Semantic Image Reconstruction0
DeBackdoor: A Deductive Framework for Detecting Backdoor Attacks on Deep Models with Limited Data0
Towards Invisible Backdoor Attack on Text-to-Image Diffusion ModelCode0
A Semantic and Clean-label Backdoor Attack against Graph Convolutional Networks0
Adaptive Backdoor Attacks with Reasonable Constraints on Graph Neural Networks0
Show:102550
← PrevPage 6 of 21Next →

No leaderboard results yet.