SOTAVerified

Backdoor Attack

Backdoor attacks inject maliciously constructed data into a training set so that, at test time, the trained model misclassifies inputs patched with a backdoor trigger as an adversarially-desired target class.

Papers

Showing 176200 of 523 papers

TitleStatusHype
Trading Devil RL: Backdoor attack via Stock market, Bayesian Optimization and Reinforcement Learning0
A Backdoor Attack Scheme with Invisible Triggers Based on Model Architecture Modification0
BadSAD: Clean-Label Backdoor Attacks against Deep Semi-Supervised Anomaly Detection0
UIBDiffusion: Universal Imperceptible Backdoor Attack for Diffusion ModelsCode0
Stealthy and Robust Backdoor Attack against 3D Point Clouds through Additional Point Features0
Backdoor Attacks against No-Reference Image Quality Assessment Models via a Scalable TriggerCode0
An Effective and Resilient Backdoor Attack Framework against Deep Neural Networks and Vision Transformers0
Data Free Backdoor AttacksCode0
Backdooring Outlier Detection Methods: A Novel Attack Approach0
Megatron: Evasive Clean-Label Backdoor Attacks against Vision Transformer0
LaserGuider: A Laser Based Physical Backdoor Attack against Deep Neural Networks0
PBP: Post-training Backdoor Purification for Malware ClassifiersCode0
Behavior Backdoor for Deep Learning Models0
LADDER: Multi-objective Backdoor Attack via Evolutionary Algorithm0
Streamlined Federated Unlearning: Unite as One to Be Highly Efficient0
BadScan: An Architectural Backdoor Attack on Visual State Space Models0
BadSFL: Backdoor Attack against Scaffold Federated Learning0
LoBAM: LoRA-Based Backdoor Attack on Model Merging0
Memory Backdoor Attacks on Neural Networks0
AnywhereDoor: Multi-Target Backdoor Attacks on Object DetectionCode0
When Backdoors Speak: Understanding LLM Backdoor Attacks Through Model-Generated Explanations0
DeTrigger: A Gradient-Centric Approach to Backdoor Attack Mitigation in Federated Learning0
Reliable Poisoned Sample Detection against Backdoor Attacks Enhanced by Sharpness Aware Minimization0
TrojanRobot: Physical-World Backdoor Attacks Against VLM-based Robotic Manipulation0
Unlearn to Relearn Backdoors: Deferred Backdoor Functionality Attacks on Deep Learning Models0
Show:102550
← PrevPage 8 of 21Next →

No leaderboard results yet.