SOTAVerified

Backdoor Attack

Backdoor attacks inject maliciously constructed data into a training set so that, at test time, the trained model misclassifies inputs patched with a backdoor trigger as an adversarially-desired target class.

Papers

Showing 151175 of 523 papers

TitleStatusHype
Stealthy Patch-Wise Backdoor Attack in 3D Point Cloud via Curvature Awareness0
C^2 ATTACK: Towards Representation Backdoor on CLIP via Concept Confusion0
AnywhereDoor: Multi-Target Backdoor Attacks on Object DetectionCode0
Gungnir: Exploiting Stylistic Features in Images for Backdoor Attacks on Diffusion ModelsCode0
BadRefSR: Backdoor Attacks Against Reference-based Image Super ResolutionCode0
A Dual-Purpose Framework for Backdoor Defense and Backdoor Amplification in Diffusion Models0
Stealthy Backdoor Attack in Self-Supervised Learning Vision Encoders for Large Vision Language Models0
Multi-Target Federated Backdoor Attack Based on Feature Aggregation0
ELBA-Bench: An Efficient Learning Backdoor Attacks Benchmark for Large Language Models0
Show Me Your Code! Kill Code Poisoning: A Lightweight Method Based on Code Naturalness0
ReVeil: Unconstrained Concealed Backdoor Attack on Deep Neural Networks using Machine UnlearningCode0
A Robust Attack: Displacement Backdoor Attack0
Online Gradient Boosting Decision Tree: In-Place Updates for Efficient Adding/Deleting DataCode0
Scanning Trojaned Models Using Out-of-Distribution SamplesCode0
UNIDOOR: A Universal Framework for Action-Level Backdoor Attacks in Deep Reinforcement LearningCode0
DarkMind: Latent Chain-of-Thought Backdoor in Customized LLMs0
Retrievals Can Be Detrimental: A Contrastive Backdoor Attack Paradigm on Retrieval-Augmented Diffusion Models0
Cooperative Decentralized Backdoor Attacks on Vertical Federated Learning0
Energy Backdoor Attack to Deep Neural NetworksCode0
A4O: All Trigger for One sample0
BADTV: Unveiling Backdoor Threats in Third-Party Task Vectors0
HoneypotNet: Backdoor Attacks Against Model Extraction0
Stealthy Backdoor Attack to Real-world Models in Android Apps0
Injecting Bias into Text Classification Models using Backdoor Attacks0
Double Landmines: Invisible Textual Backdoor Attacks based on Dual-Trigger0
Show:102550
← PrevPage 7 of 21Next →

No leaderboard results yet.