SOTAVerified

Backdoor Attack

Backdoor attacks inject maliciously constructed data into a training set so that, at test time, the trained model misclassifies inputs patched with a backdoor trigger as an adversarially-desired target class.

Papers

Showing 401450 of 523 papers

TitleStatusHype
Be Careful with Rotation: A Uniform Backdoor Pattern for 3D Shape0
A Survey on Backdoor Attack and Defense in Natural Language Processing0
Invisible Backdoor Attack with Dynamic Triggers against Person Re-identificationCode0
PBSM: Backdoor attack against Keyword spotting based on pitch boosting and sound masking0
MSDT: Masked Language Model Scoring Defense in Text DomainCode0
Going In Style: Audio Backdoors Through Stylistic TransformationsCode0
BATT: Backdoor Attack with Transformation-based Triggers0
Motif-Backdoor: Rethinking the Backdoor Attack on Graph Neural Networks via MotifsCode0
Apple of Sodom: Hidden Backdoors in Superior Sentence Embeddings via Contrastive Learning0
Backdoor Attack and Defense in Federated Generative Adversarial Network-based Medical Image Synthesis0
Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class0
Few-shot Backdoor Attacks via Neural Tangent KernelsCode0
Understanding Impacts of Task Similarity on Backdoor Attack and Detection0
Where to Attack: A Dynamic Locator Model for Backdoor Attack in Text ClassificationsCode0
Defending Against Backdoor Attack on Graph Nerual Network by Explainability0
FedPrompt: Communication-Efficient and Privacy Preserving Prompt Tuning in Federated Learning0
Bidirectional Contrastive Split Learning for Visual Question Answering0
RIBAC: Towards Robust and Imperceptible Backdoor Attack against Compact DNNCode0
Link-Backdoor: Backdoor Attack on Link Prediction via Node InjectionCode0
Confidence Matters: Inspecting Backdoors in Deep Neural Networks via Distribution Transfer0
A Knowledge Distillation-Based Backdoor Attack in Federated Learning0
FRIB: Low-poisoning Rate Invisible Backdoor Attack based on Feature Repair0
Technical Report: Assisting Backdoor Federated Learning with Whole Population Knowledge Alignment0
Versatile Weight Attack via Flipping Limited BitsCode0
Invisible Backdoor Attacks Using Data Poisoning in the Frequency Domain0
Backdoor Attack is a Devil in Federated GAN-based Medical Image SynthesisCode0
BackdoorBench: A Comprehensive Benchmark of Backdoor Learning0
Defending Backdoor Attacks on Vision Transformer via Patch Processing0
Transferable Graph Backdoor Attack0
Is Multi-Modal Necessarily Better? Robustness Evaluation of Multi-modal Fake News Detection0
Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers0
A temporal chrominance trigger for clean-label backdoor attack against anti-spoof rebroadcast detection0
BadDet: Backdoor Attacks on Object DetectionCode0
Contributor-Aware Defenses Against Adversarial Backdoor Attacks0
BagFlip: A Certified Defense against Data PoisoningCode0
BITE: Textual Backdoor Attacks with Iterative Trigger InjectionCode0
SafeNet: The Unreasonable Effectiveness of Ensembles in Private Collaborative Learning0
Backdoor Attacks on Bayesian Neural Networks using Reverse Distribution0
Model-Contrastive Learning for Backdoor DefenseCode0
A Temporal-Pattern Backdoor Attack to Deep Reinforcement Learning0
Pass off Fish Eyes for Pearls: Attacking Model Selection of Pre-trained ModelsCode0
AdaTest:Reinforcement Learning and Adaptive Sampling for On-chip Hardware Trojan Detection0
Backdoor Attack against NLP models with Robustness-Aware Perturbation defense0
Trojan Horse Training for Breaking Defenses against Backdoor Attacks in Deep Learning0
Semi-Targeted Model Poisoning Attack on Federated Learning via Backward Error AnalysisCode0
PiDAn: A Coherence Optimization Approach for Backdoor Attack Detection and Mitigation in Deep Neural Networks0
Low-Loss Subspace Compression for Clean Gains against Multi-Agent Backdoor Attacks0
Physical Backdoor Attacks to Lane Detection Systems in Autonomous Driving0
Under-confidence Backdoors Are Resilient and Stealthy BackdoorsCode0
Debiasing Backdoor Attack: A Benign Application of Backdoor Attack in Eliminating Data Bias0
Show:102550
← PrevPage 9 of 11Next →

No leaderboard results yet.