Boosting Backdoor Attack with A Learnable Poisoning Sample Selection Strategy Jul 14, 2023 Backdoor Attack Data Poisoning
— Unverified 0A Dual Stealthy Backdoor: From Both Spatial and Frequency Perspectives Jul 3, 2023 Backdoor Attack
— Unverified 0Fake the Real: Backdoor Attack on Deep Speech Classification via Voice Conversion Jun 28, 2023 Backdoor Attack Voice Conversion
— Unverified 0Adversarial Backdoor Attack by Naturalistic Data Poisoning on Trajectory Prediction in Autonomous Driving Jun 27, 2023 Autonomous Driving Backdoor Attack
— Unverified 0Hidden Backdoor Attack against Deep Learning-Based Wireless Signal Modulation Classifiers Jun 19, 2023 Backdoor Attack Classification
— Unverified 0Efficient Backdoor Attacks for Deep Neural Networks in Real-world Scenarios Jun 14, 2023 Backdoor Attack
Code Code Available 0A Proxy Attack-Free Strategy for Practically Improving the Poisoning Efficiency in Backdoor Attacks Jun 14, 2023 Active Learning Backdoor Attack
— Unverified 0Privacy Inference-Empowered Stealthy Backdoor Attack on Federated Learning under Non-IID Scenarios Jun 13, 2023 Backdoor Attack Federated Learning
— Unverified 0Mitigating Backdoor Attack Via Prerequisite Transformation Jun 3, 2023 Autonomous Driving Backdoor Attack
— Unverified 0Versatile Backdoor Attack with Visible, Semantic, Sample-Specific, and Compatible Triggers Jun 1, 2023 Backdoor Attack backdoor defense
— Unverified 0Backdoor Attacks Against Incremental Learners: An Empirical Evaluation Study May 28, 2023 Adversarial Robustness Backdoor Attack
— Unverified 0Personalization as a Shortcut for Few-Shot Backdoor Attack against Text-to-Image Diffusion Models May 18, 2023 Backdoor Attack Image Generation
— Unverified 0UOR: Universal Backdoor Attacks on Pre-trained Language Models May 16, 2023 Backdoor Attack Contrastive Learning
— Unverified 0BadSAM: Exploring Security Vulnerabilities of SAM via Backdoor Attacks May 5, 2023 Backdoor Attack Image Segmentation
— Unverified 0Defending against Insertion-based Textual Backdoor Attacks via Attribution May 3, 2023 Backdoor Attack Language Modeling
Code Code Available 0DABS: Data-Agnostic Backdoor attack at the Server in Federated Learning May 2, 2023 Backdoor Attack Federated Learning
— Unverified 0Prompt as Triggers for Backdoor Attack: Examining the Vulnerability in Language Models May 2, 2023 Backdoor Attack Few-Shot Text Classification
— Unverified 0FedGrad: Mitigating Backdoor Attacks in Federated Learning Through Local Ultimate Gradients Inspection Apr 29, 2023 Backdoor Attack Federated Learning
Code Code Available 0ChatGPT as an Attack Tool: Stealthy Textual Backdoor Attack via Blackbox Generative Model Trigger Apr 27, 2023 Backdoor Attack
— Unverified 0INK: Inheritable Natural Backdoor Attack Against Model Distillation Apr 21, 2023 Backdoor Attack Data Poisoning
— Unverified 0BadVFL: Backdoor Attacks in Vertical Federated Learning Apr 18, 2023 Backdoor Attack Federated Learning
— Unverified 0Evil from Within: Machine Learning Backdoors through Hardware Trojans Apr 17, 2023 Backdoor Attack Self-Driving Cars
— Unverified 0Rethinking the Trigger-injecting Position in Graph Backdoor Attack Apr 5, 2023 Backdoor Attack Position
— Unverified 0Recover Triggered States: Protect Model Against Backdoor Attack in Reinforcement Learning Apr 1, 2023 Backdoor Attack reinforcement-learning
Code Code Available 0Backdoor Attacks with Input-unique Triggers in NLP Mar 25, 2023 Backdoor Attack Language Modelling
— Unverified 0Learning to Backdoor Federated Learning Mar 6, 2023 Backdoor Attack Federated Learning
Code Code Available 0Backdoor Attacks and Defenses in Federated Learning: Survey, Challenges and Future Research Directions Mar 3, 2023 Backdoor Attack Federated Learning
— Unverified 0Backdoor for Debias: Mitigating Model Bias with Backdoor Attack-based Artificial Bias Mar 1, 2023 Backdoor Attack Knowledge Distillation
Code Code Available 0A semantic backdoor attack against Graph Convolutional Networks Feb 28, 2023 Backdoor Attack Classification
— Unverified 0Backdoor Attacks Against Deep Image Compression via Adaptive Frequency Trigger Feb 28, 2023 Backdoor Attack Face Recognition
— Unverified 0SATBA: An Invisible Backdoor Attack Based On Spatial Attention Feb 25, 2023 Backdoor Attack backdoor defense
— Unverified 0Defending Against Backdoor Attacks by Layer-wise Feature Analysis Feb 24, 2023 Backdoor Attack
Code Code Available 0BadGPT: Exploring Security Vulnerabilities of ChatGPT via Backdoor Attacks to InstructGPT Feb 21, 2023 Backdoor Attack Language Modeling
— Unverified 0On Feasibility of Server-side Backdoor Attacks on Split Learning Feb 19, 2023 Backdoor Attack Federated Learning
— Unverified 0Attacks in Adversarial Machine Learning: A Systematic Survey from the Life-cycle Perspective Feb 19, 2023 Adversarial Attack Backdoor Attack
— Unverified 0QTrojan: A Circuit Backdoor Against Quantum Neural Networks Feb 16, 2023 Backdoor Attack Data Poisoning
— Unverified 0Training-free Lexical Backdoor Attacks on Language Models Feb 8, 2023 Backdoor Attack Data Poisoning
Code Code Available 0Revisiting Personalized Federated Learning: Robustness Against Backdoor Attacks Feb 3, 2023 Backdoor Attack Federated Learning
— Unverified 0Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering Jan 29, 2023 Backdoor Attack
— Unverified 0BDMMT: Backdoor Sample Detection for Language Models through Model Mutation Testing Jan 25, 2023 Backdoor Attack Sentence
— Unverified 0Backdoor Attacks in Peer-to-Peer Federated Learning Jan 23, 2023 Backdoor Attack Federated Learning
— Unverified 0Universal Detection of Backdoor Attacks via Density-based Clustering and Centroids Analysis Jan 11, 2023 Backdoor Attack Clustering
Code Code Available 0You Are Catching My Attention: Are Vision Transformers Bad Learners Under Backdoor Attacks? Jan 1, 2023 Backdoor Attack
— Unverified 0Color Backdoor: A Robust Poisoning Attack in Color Space Jan 1, 2023 Backdoor Attack SSIM
Code Code Available 0SSDA: Secure Source-Free Domain Adaptation Jan 1, 2023 Backdoor Attack Domain Adaptation
Code Code Available 0Mind Your Heart: Stealthy Backdoor Attack on Dynamic Deep Neural Network in Edge Computing Dec 22, 2022 Backdoor Attack Edge-computing
Code Code Available 0Vulnerabilities of Deep Learning-Driven Semantic Communications to Backdoor (Trojan) Attacks Dec 21, 2022 Backdoor Attack Decoder
— Unverified 0VSVC: Backdoor attack against Keyword Spotting based on Voiceprint Selection and Voice Conversion Dec 20, 2022 Backdoor Attack Keyword Spotting
— Unverified 0AI Security for Geoscience and Remote Sensing: Challenges and Future Trends Dec 19, 2022 Adversarial Attack Backdoor Attack
— Unverified 0Backdoor Attack Detection in Computer Vision by Applying Matrix Factorization on the Weights of Deep Networks Dec 15, 2022 Backdoor Attack image-classification
— Unverified 0