SOTAVerified

backdoor defense

Papers

Showing 51100 of 131 papers

TitleStatusHype
Defending Multimodal Backdoored Models by Repulsive Visual Prompt Tuning0
Proactive Adversarial Defense: Harnessing Prompt Tuning in Vision-Language Models to Detect Unseen Backdoored Images0
CopyrightShield: Spatial Similarity Guided Backdoor Defense against Copyright Infringement in Diffusion Models0
Neutralizing Backdoors through Information Conflicts for Large Language Models0
MADE: Graph Backdoor Defense with Masked Unlearning0
FedBlock: A Blockchain Approach to Federated Learning against Backdoor Attacks0
Embedding Watermarks in Diffusion Process for Model Intellectual Property Protection0
Expose Before You Defend: Unifying and Enhancing Backdoor Defenses via Exposed ModelsCode0
BeniFul: Backdoor Defense via Middle Feature Analysis for Deep Neural Networks0
"No Matter What You Do": Purifying GNN Models via Backdoor UnlearningCode0
Efficient Backdoor Defense in Multimodal Contrastive Learning: A Token-Level Unlearning Method for Mitigating Threats0
CleanerCLIP: Fine-grained Counterfactual Semantic Augmentation for Backdoor Defense in Contrastive Learning0
Towards Robust Object Detection: Identifying and Removing Backdoors via Module Inconsistency Analysis0
Adversarial Backdoor Defense in CLIP0
Data-centric NLP Backdoor Defense from the Lens of Memorization0
Obliviate: Neutralizing Task-agnostic Backdoors within the Parameter-efficient Fine-tuning ParadigmCode0
PureDiffusion: Using Backdoor to Counter Backdoor in Generative Diffusion Models0
TERD: A Unified Framework for Safeguarding Diffusion Models Against BackdoorsCode0
Backdoor defense, learnability and obfuscation0
Backdoor Defense through Self-Supervised and Generative Learning0
Fusing Pruned and Backdoored Models: Optimal Transport-based Data-free Backdoor Mitigation0
Defending Text-to-image Diffusion Models: Surprising Efficacy of Textual Perturbations Against Backdoor AttacksCode0
SAB:A Stealing and Robust Backdoor Attack based on Steganographic Algorithm against Federated Learning0
Protecting against simultaneous data poisoning attacks0
Eliminating Backdoors in Neural Code Models for Secure Code Understanding0
Diff-Cleanse: Identifying and Mitigating Backdoor Attacks in Diffusion ModelsCode0
Model-agnostic clean-label backdoor mitigation in cybersecurity environments0
Evolutionary Trigger Detection and Lightweight Model Repair Based Backdoor Defense0
Defense Against Syntactic Textual Backdoor Attacks with Token Substitution0
Robustness Inspired Graph Backdoor Defense0
Unveiling and Mitigating Backdoor Vulnerabilities based on Unlearning Weight Changes and Backdoor Activeness0
Magnitude-based Neuron Pruning for Backdoor Defens0
Rethinking Pruning for Backdoor Mitigation: An Optimization Perspective0
Towards Unified Robustness Against Both Backdoor and Adversarial AttacksCode0
Mitigating Backdoor Attack by Injecting Proactive Defensive BackdoorCode0
Breaking the False Sense of Security in Backdoor Defense through Re-Activation Attack0
Interactive Simulations of Backdoors in Neural Networks0
BadActs: A Universal Backdoor Defense in the Activation SpaceCode0
LSP Framework: A Compensatory Model for Defeating Trigger Reverse Engineering via Label Smoothing Poisoning0
Unlearning Backdoor Threats: Enhancing Backdoor Defense in Multimodal Contrastive Learning via Local Token Unlearning0
Backdoor Secrets Unveiled: Identifying Backdoor Data with Optimized Scaled Prediction ConsistencyCode0
Spy-Watermark: Robust Invisible Watermarking for Backdoor AttackCode0
Backdoor Defense via Test-Time Detecting and Repairing0
Is It Possible to Backdoor Face Forgery Detection with Natural Triggers?0
Progressive Poisoned Data Isolation for Training-time Backdoor DefenseCode0
Erasing Self-Supervised Learning Backdoor by Cluster Activation MaskingCode0
OCGEC: One-class Graph Embedding Classification for DNN Backdoor DetectionCode0
Test-time Backdoor Mitigation for Black-Box Large Language Models with Defensive Demonstrations0
From Trojan Horses to Castle Walls: Unveiling Bilateral Data Poisoning Effects in Diffusion ModelsCode0
DFB: A Data-Free, Low-Budget, and High-Efficacy Clean-Label Backdoor AttackCode0
Show:102550
← PrevPage 2 of 3Next →

No leaderboard results yet.