SOTAVerified

Backdoor Attack

Backdoor attacks inject maliciously constructed data into a training set so that, at test time, the trained model misclassifies inputs patched with a backdoor trigger as an adversarially-desired target class.

Papers

Showing 201225 of 523 papers

TitleStatusHype
Model Pairing Using Embedding Translation for Backdoor Attack Detection on Open-Set Classification TasksCode0
Low-Frequency Black-Box Backdoor Attack via Evolutionary Algorithm0
Mitigating Fine-tuning based Jailbreak Attack with Backdoor Enhanced Safety AlignmentCode1
Whispers in Grammars: Injecting Covert Backdoors to Compromise Dense Retrieval SystemsCode0
VL-Trojan: Multimodal Instruction Backdoor Attacks against Autoregressive Visual Language Models0
Defending Against Weight-Poisoning Backdoor Attacks for Parameter-Efficient Fine-Tuning0
Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery DetectionCode1
Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based AgentsCode2
Backdoor Attack against One-Class Sequential Anomaly Detection ModelsCode0
Test-Time Backdoor Attacks on Multimodal Large Language ModelsCode2
OrderBkd: Textual backdoor attack through repositioningCode0
The last Dance : Robust backdoor attack via diffusion models and bayesian approach0
DisDet: Exploring Detectability of Backdoor Attack on Diffusion Models0
Model Supply Chain Poisoning: Backdooring Pre-trained Models via Embedding IndistinguishabilityCode1
BackdoorBench: A Comprehensive Benchmark and Analysis of Backdoor Learning0
BadChain: Backdoor Chain-of-Thought Prompting for Large Language ModelsCode2
Universal Vulnerabilities in Large Language Models: Backdoor Attacks for In-context Learning0
Inferring Properties of Graph Neural Networks0
The Stronger the Diffusion Model, the Easier the Backdoor: Data Poisoning to Induce Copyright Breaches Without Adjusting Finetuning Pipeline0
TEN-GUARD: Tensor Decomposition for Backdoor Attack Detection in Deep Neural Networks0
Object-oriented backdoor attack against image captioning0
Effective backdoor attack on graph neural networks in link prediction tasks0
Spy-Watermark: Robust Invisible Watermarking for Backdoor AttackCode0
The Art of Deception: Robust Backdoor Attack using Dynamic Stacking of Triggers0
Imperio: Language-Guided Backdoor Attacks for Arbitrary Model Control0
Show:102550
← PrevPage 9 of 21Next →

No leaderboard results yet.