SOTAVerified

Backdoor Attack

Backdoor attacks inject maliciously constructed data into a training set so that, at test time, the trained model misclassifies inputs patched with a backdoor trigger as an adversarially-desired target class.

Papers

Showing 151175 of 523 papers

TitleStatusHype
Under-confidence Backdoors Are Resilient and Stealthy BackdoorsCode0
Invisible Backdoor Attack with Dynamic Triggers against Person Re-identificationCode0
Learning to Backdoor Federated LearningCode0
Backdooring Bias into Text-to-Image ModelsCode0
Color Backdoor: A Robust Poisoning Attack in Color SpaceCode0
A general approach to enhance the survivability of backdoor attacks by decision path couplingCode0
Link-Backdoor: Backdoor Attack on Link Prediction via Node InjectionCode0
How to Craft Backdoors with Unlabeled Data Alone?Code0
Claim-Guided Textual Backdoor Attack for Practical ApplicationsCode0
Watch Out! Simple Horizontal Class Backdoor Can Trivially Evade DefenseCode0
MixBridge: Heterogeneous Image-to-Image Backdoor Attack through Mixture of Schrödinger BridgesCode0
Generalization Bound and New Algorithm for Clean-Label Backdoor AttackCode0
Whispers in Grammars: Injecting Covert Backdoors to Compromise Dense Retrieval SystemsCode0
CBD: A Certified Backdoor Detector Based on Local Dominant ProbabilityCode0
From Trojan Horses to Castle Walls: Unveiling Bilateral Data Poisoning Effects in Diffusion ModelsCode0
Genetic Algorithm-Based Dynamic Backdoor Attack on Federated Learning-Based Network Traffic ClassificationCode0
Adversarial Feature Map Pruning for BackdoorCode0
FooBaR: Fault Fooling Backdoor Attack on Neural Network TrainingCode0
Going In Style: Audio Backdoors Through Stylistic TransformationsCode0
Backdoor Attack through Frequency DomainCode0
FedGrad: Mitigating Backdoor Attacks in Federated Learning Through Local Ultimate Gradients InspectionCode0
AnywhereDoor: Multi-Target Backdoor Attacks on Object DetectionCode0
Invisible Backdoor Triggers in Image Editing Model via Deep WatermarkingCode0
Backdoor Attacks against No-Reference Image Quality Assessment Models via a Scalable TriggerCode0
Exploiting the Vulnerability of Large Language Models via Defense-Aware Architectural BackdoorCode0
Show:102550
← PrevPage 7 of 21Next →

No leaderboard results yet.