ShadowCoT: Cognitive Hijacking for Stealthy Reasoning Backdoors in LLMs Apr 8, 2025 Backdoor Attack
— Unverified 0Show Me Your Code! Kill Code Poisoning: A Lightweight Method Based on Code Naturalness Feb 20, 2025 Backdoor Attack Language Modeling
— Unverified 0Single-Node Trigger Backdoor Attacks in Graph-Based Recommendation Systems Jun 10, 2025 Backdoor Attack Recommendation Systems
— Unverified 0SleeperNets: Universal Backdoor Poisoning Attacks Against Reinforcement Learning Agents May 30, 2024 Backdoor Attack reinforcement-learning
— Unverified 0SOS! Soft Prompt Attack Against Open-Source Large Language Models Jul 3, 2024 Backdoor Attack
— Unverified 0SSL-OTA: Unveiling Backdoor Threats in Self-Supervised Learning for Object Detection Dec 30, 2023 Autonomous Driving Backdoor Attack
— Unverified 0Stealthy and Robust Backdoor Attack against 3D Point Clouds through Additional Point Features Dec 10, 2024 Backdoor Attack Bayesian Optimization
— Unverified 0Stealthy Backdoor Attack in Self-Supervised Learning Vision Encoders for Large Vision Language Models Feb 25, 2025 Backdoor Attack Hallucination
— Unverified 0Stealthy Backdoor Attack to Real-world Models in Android Apps Jan 2, 2025 Backdoor Attack
— Unverified 0Stealthy Patch-Wise Backdoor Attack in 3D Point Cloud via Curvature Awareness Mar 12, 2025 Backdoor Attack
— Unverified 0Strategic Planning of Stealthy Backdoor Attacks in Markov Decision Processes Apr 17, 2025 Backdoor Attack
— Unverified 0Streamlined Federated Unlearning: Unite as One to Be Highly Efficient Nov 28, 2024 Backdoor Attack Federated Learning
— Unverified 0Subnet Replacement: Deployment-stage backdoor attack against deep neural networks in gray-box setting Jul 15, 2021 Backdoor Attack Philosophy
— Unverified 0Tabdoor: Backdoor Vulnerabilities in Transformer-based Neural Networks for Tabular Data Nov 13, 2023 Backdoor Attack
— Unverified 0Targeted Forgetting and False Memory Formation in Continual Learners through Adversarial Backdoor Attacks Feb 17, 2020 Backdoor Attack Continual Learning
— Unverified 0TARGET: Template-Transferable Backdoor Attack Against Prompt-based NLP Models via GPT4 Nov 29, 2023 Backdoor Attack
— Unverified 0Technical Report: Assisting Backdoor Federated Learning with Whole Population Knowledge Alignment Jul 25, 2022 Backdoor Attack Federated Learning
— Unverified 0Temporal-Distributed Backdoor Attack Against Video Based Action Recognition Aug 21, 2023 Action Recognition Backdoor Attack
— Unverified 0TEN-GUARD: Tensor Decomposition for Backdoor Attack Detection in Deep Neural Networks Jan 6, 2024 Backdoor Attack Tensor Decomposition
— Unverified 0Test-Time Detection of Backdoor Triggers for Poisoned Deep Neural Networks Dec 6, 2021 Backdoor Attack image-classification
— Unverified 0The Art of Deception: Robust Backdoor Attack using Dynamic Stacking of Triggers Jan 3, 2024 Backdoor Attack speech-recognition
— Unverified 0The last Dance : Robust backdoor attack via diffusion models and bayesian approach Feb 5, 2024 Backdoor Attack Denoising
— Unverified 0The Stronger the Diffusion Model, the Easier the Backdoor: Data Poisoning to Induce Copyright Breaches Without Adjusting Finetuning Pipeline Jan 7, 2024 Backdoor Attack Data Poisoning
— Unverified 0Towards Robust Physical-world Backdoor Attacks on Lane Detection May 9, 2024 Autonomous Driving Backdoor Attack
— Unverified 0Towards Sample-specific Backdoor Attack with Clean Labels via Attribute Trigger Dec 3, 2023 Attribute Backdoor Attack
— Unverified 0Trading Devil Final: Backdoor attack via Stock market and Bayesian Optimization Jul 21, 2024 Automatic Speech Recognition Backdoor Attack
— Unverified 0Trading Devil RL: Backdoor attack via Stock market, Bayesian Optimization and Reinforcement Learning Dec 23, 2024 Backdoor Attack Bayesian Optimization
— Unverified 0Trading Devil: Robust backdoor attack via Stochastic investment models and Bayesian approach Jun 15, 2024 Backdoor Attack speech-recognition
— Unverified 0Transferable Graph Backdoor Attack Jun 21, 2022 Backdoor Attack Graph Mining
— Unverified 0Trojan Horse Training for Breaking Defenses against Backdoor Attacks in Deep Learning Mar 25, 2022 Backdoor Attack
— Unverified 0Are You Using Reliable Graph Prompts? Trojan Prompt Attacks on Graph Neural Networks Oct 17, 2024 Backdoor Attack Prompt Learning
— Unverified 0TrojanRobot: Physical-World Backdoor Attacks Against VLM-based Robotic Manipulation Nov 18, 2024 Backdoor Attack Decision Making
— Unverified 0TrojVLM: Backdoor Attack Against Vision Language Models Sep 28, 2024 Backdoor Attack Image Captioning
— Unverified 0Understanding Impacts of Task Similarity on Backdoor Attack and Detection Oct 12, 2022 Backdoor Attack Multi-Task Learning
— Unverified 0Bidirectional Contrastive Split Learning for Visual Question Answering Aug 24, 2022 Adversarial Attack Backdoor Attack
— Unverified 0Universal Vulnerabilities in Large Language Models: Backdoor Attacks for In-context Learning Jan 11, 2024 Backdoor Attack In-Context Learning
— Unverified 0Unlearn to Relearn Backdoors: Deferred Backdoor Functionality Attacks on Deep Learning Models Nov 10, 2024 Backdoor Attack
— Unverified 0UOR: Universal Backdoor Attacks on Pre-trained Language Models May 16, 2023 Backdoor Attack Contrastive Learning
— Unverified 0VisualTrap: A Stealthy Backdoor Attack on GUI Agents via Visual Grounding Manipulation Jul 9, 2025 Backdoor Attack Visual Grounding
— Unverified 0VL-Trojan: Multimodal Instruction Backdoor Attacks against Autoregressive Visual Language Models Feb 21, 2024 Backdoor Attack Few-Shot Learning
— Unverified 0VSVC: Backdoor attack against Keyword Spotting based on Voiceprint Selection and Voice Conversion Dec 20, 2022 Backdoor Attack Keyword Spotting
— Unverified 0Vulnerabilities of Deep Learning-Driven Semantic Communications to Backdoor (Trojan) Attacks Dec 21, 2022 Backdoor Attack Decoder
— Unverified 0WaveAttack: Asymmetric Frequency Obfuscation-based Backdoor Attacks Against Deep Neural Networks Oct 17, 2023 Backdoor Attack SSIM
— Unverified 0Weak-to-Strong Backdoor Attack for Large Language Models Sep 26, 2024 Backdoor Attack Knowledge Distillation
— Unverified 0When Backdoors Speak: Understanding LLM Backdoor Attacks Through Model-Generated Explanations Nov 19, 2024 Backdoor Attack Explanation Generation
— Unverified 0Widen The Backdoor To Let More Attackers In Oct 9, 2021 Backdoor Attack
— Unverified 0You Are Catching My Attention: Are Vision Transformers Bad Learners Under Backdoor Attacks? Jan 1, 2023 Backdoor Attack
— Unverified 0DeepBaR: Fault Backdoor Attack on Deep Neural Network Layers Jul 30, 2024 Backdoor Attack
— Unverified 0Invisible Threats: Backdoor Attack in OCR Systems Oct 12, 2023 Backdoor Attack Optical Character Recognition
— Unverified 0Is It Possible to Backdoor Face Forgery Detection with Natural Triggers? Dec 31, 2023 Backdoor Attack backdoor defense
— Unverified 0