SOTAVerified

Backdoor Attack

Backdoor attacks inject maliciously constructed data into a training set so that, at test time, the trained model misclassifies inputs patched with a backdoor trigger as an adversarially-desired target class.

Papers

Showing 126150 of 523 papers

TitleStatusHype
BAPLe: Backdoor Attacks on Medical Foundational Models using Prompt LearningCode2
Diff-Cleanse: Identifying and Mitigating Backdoor Attacks in Diffusion ModelsCode0
DeepBaR: Fault Backdoor Attack on Deep Neural Network Layers0
BackdoorBench: A Comprehensive Benchmark and Analysis of Backdoor Learning0
Trading Devil Final: Backdoor attack via Stock market and Bayesian Optimization0
Krait: A Backdoor Attack Against Graph Prompt Tuning0
AgentPoison: Red-teaming LLM Agents via Poisoning Memory or Knowledge BasesCode3
Uncertainty is Fragile: Manipulating Uncertainty in Large Language ModelsCode1
Backdoor Attacks against Image-to-Image Networks0
BoBa: Boosting Backdoor Detection through Data Distribution Inference in Federated Learning0
Evolutionary Trigger Detection and Lightweight Model Repair Based Backdoor Defense0
BadCLM: Backdoor Attack in Clinical Language Models for Electronic Health Records0
T2IShield: Defending Against Backdoors on Text-to-Image Diffusion ModelsCode1
Backdoor Graph CondensationCode0
SOS! Soft Prompt Attack Against Open-Source Large Language Models0
Venomancer: Towards Imperceptible and Target-on-Demand Backdoor Attacks in Federated LearningCode0
Attack On Prompt: Backdoor Attack in Prompt-Based Continual Learning0
Revisiting Backdoor Attacks against Large Vision-Language Models from Domain Shift0
CBPF: Filtering Poisoned Data Based on Composite Backdoor Attack0
EmoAttack: Emotion-to-Image Diffusion Models for Emotional Backdoor Generation0
Backdooring Bias into Text-to-Image ModelsCode0
Trading Devil: Robust backdoor attack via Stochastic investment models and Bayesian approach0
Federated Learning with Flexible Architectures0
An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong DetectionCode2
Lurking in the shadows: Unveiling Stealthy Backdoor Attacks against Personalized Federated Learning0
Show:102550
← PrevPage 6 of 21Next →

No leaderboard results yet.