SOTAVerified

backdoor defense

Papers

Showing 2650 of 131 papers

TitleStatusHype
CopyrightShield: Spatial Similarity Guided Backdoor Defense against Copyright Infringement in Diffusion Models0
Neutralizing Backdoors through Information Conflicts for Large Language Models0
MADE: Graph Backdoor Defense with Masked Unlearning0
CROW: Eliminating Backdoors from Large Language Models via Internal Consistency RegularizationCode1
BackdoorMBTI: A Backdoor Learning Multimodal Benchmark Tool Kit for Backdoor Defense EvaluationCode1
FedBlock: A Blockchain Approach to Federated Learning against Backdoor Attacks0
Embedding Watermarks in Diffusion Process for Model Intellectual Property Protection0
Expose Before You Defend: Unifying and Enhancing Backdoor Defenses via Exposed ModelsCode0
BeniFul: Backdoor Defense via Middle Feature Analysis for Deep Neural Networks0
Uncovering, Explaining, and Mitigating the Superficial Safety of Backdoor DefenseCode1
"No Matter What You Do": Purifying GNN Models via Backdoor UnlearningCode0
Efficient Backdoor Defense in Multimodal Contrastive Learning: A Token-Level Unlearning Method for Mitigating Threats0
CleanerCLIP: Fine-grained Counterfactual Semantic Augmentation for Backdoor Defense in Contrastive Learning0
Adversarial Backdoor Defense in CLIP0
Towards Robust Object Detection: Identifying and Removing Backdoors via Module Inconsistency Analysis0
Obliviate: Neutralizing Task-agnostic Backdoors within the Parameter-efficient Fine-tuning ParadigmCode0
Data-centric NLP Backdoor Defense from the Lens of Memorization0
PureDiffusion: Using Backdoor to Counter Backdoor in Generative Diffusion Models0
TERD: A Unified Framework for Safeguarding Diffusion Models Against BackdoorsCode0
Backdoor defense, learnability and obfuscation0
Backdoor Defense through Self-Supervised and Generative Learning0
Fisher Information guided Purification against Backdoor AttacksCode1
VFLIP: A Backdoor Defense for Vertical Federated Learning via Identification and PurificationCode1
Fusing Pruned and Backdoored Models: Optimal Transport-based Data-free Backdoor Mitigation0
Defending Text-to-image Diffusion Models: Surprising Efficacy of Textual Perturbations Against Backdoor AttacksCode0
Show:102550
← PrevPage 2 of 6Next →

No leaderboard results yet.