SOTAVerified

backdoor defense

Papers

Showing 101131 of 131 papers

TitleStatusHype
FedBlock: A Blockchain Approach to Federated Learning against Backdoor Attacks0
Fedward: Flexible Federated Backdoor Defense Framework with Non-IID Data0
Few-shot Backdoor Defense Using Shapley Estimation0
Fusing Pruned and Backdoored Models: Optimal Transport-based Data-free Backdoor Mitigation0
Gradient Norm-based Fine-Tuning for Backdoor Defense in Automatic Speech Recognition0
Heterogeneous Graph Backdoor Attack0
Imperceptible and Multi-channel Backdoor Attack against Deep Neural Networks0
Interactive Simulations of Backdoors in Neural Networks0
InverTune: Removing Backdoors from Multimodal Contrastive Learning Models via Trigger Inversion and Activation Tuning0
Is It Possible to Backdoor Face Forgery Detection with Natural Triggers?0
LSP Framework: A Compensatory Model for Defeating Trigger Reverse Engineering via Label Smoothing Poisoning0
MADE: Graph Backdoor Defense with Masked Unlearning0
Magnitude-based Neuron Pruning for Backdoor Defens0
Model-agnostic clean-label backdoor mitigation in cybersecurity environments0
NCL: Textual Backdoor Defense Using Noise-augmented Contrastive Learning0
Neutralizing Backdoors through Information Conflicts for Large Language Models0
On Provable Backdoor Defense in Collaborative Learning0
PCAP-Backdoor: Backdoor Poisoning Generator for Network Traffic in CPS/IoT Environments0
PECAN: A Deterministic Certified Defense Against Backdoor Attacks0
Proactive Adversarial Defense: Harnessing Prompt Tuning in Vision-Language Models to Detect Unseen Backdoored Images0
Protecting against simultaneous data poisoning attacks0
Prototype Guided Backdoor Defense0
PureDiffusion: Using Backdoor to Counter Backdoor in Generative Diffusion Models0
Rethinking Pruning for Backdoor Mitigation: An Optimization Perspective0
Rethinking the Trigger of Backdoor Attack0
Robust Anti-Backdoor Instruction Tuning in LVLMs0
Versatile Backdoor Attack with Visible, Semantic, Sample-Specific, and Compatible Triggers0
Robustness Inspired Graph Backdoor Defense0
SAB:A Stealing and Robust Backdoor Attack based on Steganographic Algorithm against Federated Learning0
SATBA: An Invisible Backdoor Attack Based On Spatial Attention0
Spectral Insights into Data-Oblivious Critical Layers in Large Language Models0
Show:102550
← PrevPage 3 of 3Next →

No leaderboard results yet.