SOTAVerified

backdoor defense

Papers

Showing 5175 of 131 papers

TitleStatusHype
Defending Multimodal Backdoored Models by Repulsive Visual Prompt Tuning0
Proactive Adversarial Defense: Harnessing Prompt Tuning in Vision-Language Models to Detect Unseen Backdoored Images0
CopyrightShield: Spatial Similarity Guided Backdoor Defense against Copyright Infringement in Diffusion Models0
Neutralizing Backdoors through Information Conflicts for Large Language Models0
MADE: Graph Backdoor Defense with Masked Unlearning0
FedBlock: A Blockchain Approach to Federated Learning against Backdoor Attacks0
Embedding Watermarks in Diffusion Process for Model Intellectual Property Protection0
Expose Before You Defend: Unifying and Enhancing Backdoor Defenses via Exposed ModelsCode0
BeniFul: Backdoor Defense via Middle Feature Analysis for Deep Neural Networks0
"No Matter What You Do": Purifying GNN Models via Backdoor UnlearningCode0
Efficient Backdoor Defense in Multimodal Contrastive Learning: A Token-Level Unlearning Method for Mitigating Threats0
CleanerCLIP: Fine-grained Counterfactual Semantic Augmentation for Backdoor Defense in Contrastive Learning0
Towards Robust Object Detection: Identifying and Removing Backdoors via Module Inconsistency Analysis0
Adversarial Backdoor Defense in CLIP0
Data-centric NLP Backdoor Defense from the Lens of Memorization0
Obliviate: Neutralizing Task-agnostic Backdoors within the Parameter-efficient Fine-tuning ParadigmCode0
PureDiffusion: Using Backdoor to Counter Backdoor in Generative Diffusion Models0
TERD: A Unified Framework for Safeguarding Diffusion Models Against BackdoorsCode0
Backdoor defense, learnability and obfuscation0
Backdoor Defense through Self-Supervised and Generative Learning0
Fusing Pruned and Backdoored Models: Optimal Transport-based Data-free Backdoor Mitigation0
Defending Text-to-image Diffusion Models: Surprising Efficacy of Textual Perturbations Against Backdoor AttacksCode0
SAB:A Stealing and Robust Backdoor Attack based on Steganographic Algorithm against Federated Learning0
Protecting against simultaneous data poisoning attacks0
Eliminating Backdoors in Neural Code Models for Secure Code Understanding0
Show:102550
← PrevPage 3 of 6Next →

No leaderboard results yet.