SOTAVerified

Backdoor Attack

Backdoor attacks inject maliciously constructed data into a training set so that, at test time, the trained model misclassifies inputs patched with a backdoor trigger as an adversarially-desired target class.

Papers

Showing 176200 of 523 papers

TitleStatusHype
Gungnir: Exploiting Stylistic Features in Images for Backdoor Attacks on Diffusion ModelsCode0
Genetic Algorithm-Based Dynamic Backdoor Attack on Federated Learning-Based Network Traffic ClassificationCode0
Cross-Context Backdoor Attacks against Graph Prompt LearningCode0
Going In Style: Audio Backdoors Through Stylistic TransformationsCode0
MSDT: Masked Language Model Scoring Defense in Text DomainCode0
From Trojan Horses to Castle Walls: Unveiling Bilateral Data Poisoning Effects in Diffusion ModelsCode0
Data Free Backdoor AttacksCode0
FooBaR: Fault Fooling Backdoor Attack on Neural Network TrainingCode0
AnywhereDoor: Multi-Target Backdoor Attacks on Object DetectionCode0
Generalization Bound and New Algorithm for Clean-Label Backdoor AttackCode0
Backdoor Attacks against No-Reference Image Quality Assessment Models via a Scalable TriggerCode0
Beating Backdoor Attack at Its Own GameCode0
AnywhereDoor: Multi-Target Backdoor Attacks on Object DetectionCode0
Enhancing Backdoor Attacks with Multi-Level MMD RegularizationCode0
Adversarial examples are useful too!Code0
Adversarial Feature Map Pruning for BackdoorCode0
FedGrad: Mitigating Backdoor Attacks in Federated Learning Through Local Ultimate Gradients InspectionCode0
Few-shot Backdoor Attacks via Neural Tangent KernelsCode0
BagFlip: A Certified Defense against Data PoisoningCode0
Exploiting the Vulnerability of Large Language Models via Defense-Aware Architectural BackdoorCode0
Diff-Cleanse: Identifying and Mitigating Backdoor Attacks in Diffusion ModelsCode0
Backdoor Graph CondensationCode0
EmInspector: Combating Backdoor Attacks in Federated Self-Supervised Learning Through Embedding InspectionCode0
Dynamic Attention Analysis for Backdoor Detection in Text-to-Image Diffusion ModelsCode0
Backdoor Attack on Unpaired Medical Image-Text Foundation Models: A Pilot Study on MedCLIPCode0
Show:102550
← PrevPage 8 of 21Next →

No leaderboard results yet.