| FedBlock: A Blockchain Approach to Federated Learning against Backdoor Attacks | Nov 5, 2024 | backdoor defenseFederated Learning | —Unverified | 0 | 0 |
| Fedward: Flexible Federated Backdoor Defense Framework with Non-IID Data | Jul 1, 2023 | backdoor defenseClustering | —Unverified | 0 | 0 |
| Few-shot Backdoor Defense Using Shapley Estimation | Dec 30, 2021 | Autonomous Drivingbackdoor defense | —Unverified | 0 | 0 |
| Fusing Pruned and Backdoored Models: Optimal Transport-based Data-free Backdoor Mitigation | Aug 28, 2024 | backdoor defense | —Unverified | 0 | 0 |
| Gradient Norm-based Fine-Tuning for Backdoor Defense in Automatic Speech Recognition | Feb 3, 2025 | Automatic Speech Recognitionbackdoor defense | —Unverified | 0 | 0 |
| Heterogeneous Graph Backdoor Attack | May 30, 2025 | Backdoor Attackbackdoor defense | —Unverified | 0 | 0 |
| Imperceptible and Multi-channel Backdoor Attack against Deep Neural Networks | Jan 31, 2022 | Backdoor Attackbackdoor defense | —Unverified | 0 | 0 |
| Interactive Simulations of Backdoors in Neural Networks | May 21, 2024 | backdoor defense | —Unverified | 0 | 0 |
| InverTune: Removing Backdoors from Multimodal Contrastive Learning Models via Trigger Inversion and Activation Tuning | Jun 14, 2025 | backdoor defenseContrastive Learning | —Unverified | 0 | 0 |
| Is It Possible to Backdoor Face Forgery Detection with Natural Triggers? | Dec 31, 2023 | Backdoor Attackbackdoor defense | —Unverified | 0 | 0 |
| LSP Framework: A Compensatory Model for Defeating Trigger Reverse Engineering via Label Smoothing Poisoning | Apr 19, 2024 | Backdoor Attackbackdoor defense | —Unverified | 0 | 0 |
| MADE: Graph Backdoor Defense with Masked Unlearning | Nov 26, 2024 | backdoor defenseDrug Discovery | —Unverified | 0 | 0 |
| Magnitude-based Neuron Pruning for Backdoor Defens | May 28, 2024 | backdoor defense | —Unverified | 0 | 0 |
| Model-agnostic clean-label backdoor mitigation in cybersecurity environments | Jul 11, 2024 | backdoor defenseClassification | —Unverified | 0 | 0 |
| NCL: Textual Backdoor Defense Using Noise-augmented Contrastive Learning | Mar 3, 2023 | backdoor defenseContrastive Learning | —Unverified | 0 | 0 |
| Neutralizing Backdoors through Information Conflicts for Large Language Models | Nov 27, 2024 | backdoor defense | —Unverified | 0 | 0 |
| On Provable Backdoor Defense in Collaborative Learning | Jan 19, 2021 | backdoor defense | —Unverified | 0 | 0 |
| PCAP-Backdoor: Backdoor Poisoning Generator for Network Traffic in CPS/IoT Environments | Jan 26, 2025 | backdoor defenseDeep Learning | —Unverified | 0 | 0 |
| PECAN: A Deterministic Certified Defense Against Backdoor Attacks | Jan 27, 2023 | backdoor defenseimage-classification | —Unverified | 0 | 0 |
| Proactive Adversarial Defense: Harnessing Prompt Tuning in Vision-Language Models to Detect Unseen Backdoored Images | Dec 11, 2024 | Adversarial Defensebackdoor defense | —Unverified | 0 | 0 |
| Protecting against simultaneous data poisoning attacks | Aug 23, 2024 | backdoor defenseData Poisoning | —Unverified | 0 | 0 |
| Prototype Guided Backdoor Defense | Mar 26, 2025 | backdoor defense | —Unverified | 0 | 0 |
| PureDiffusion: Using Backdoor to Counter Backdoor in Generative Diffusion Models | Sep 20, 2024 | backdoor defense | —Unverified | 0 | 0 |
| Rethinking Pruning for Backdoor Mitigation: An Optimization Perspective | May 28, 2024 | backdoor defenseGraph Neural Network | —Unverified | 0 | 0 |
| Rethinking the Trigger of Backdoor Attack | Apr 9, 2020 | Backdoor Attackbackdoor defense | —Unverified | 0 | 0 |
| Robust Anti-Backdoor Instruction Tuning in LVLMs | Jun 4, 2025 | backdoor defenseInstruction Following | —Unverified | 0 | 0 |
| Versatile Backdoor Attack with Visible, Semantic, Sample-Specific, and Compatible Triggers | Jun 1, 2023 | Backdoor Attackbackdoor defense | —Unverified | 0 | 0 |
| Robustness Inspired Graph Backdoor Defense | Jun 14, 2024 | backdoor defenseGraph Classification | —Unverified | 0 | 0 |
| SAB:A Stealing and Robust Backdoor Attack based on Steganographic Algorithm against Federated Learning | Aug 25, 2024 | Backdoor Attackbackdoor defense | —Unverified | 0 | 0 |
| SATBA: An Invisible Backdoor Attack Based On Spatial Attention | Feb 25, 2023 | Backdoor Attackbackdoor defense | —Unverified | 0 | 0 |
| Spectral Insights into Data-Oblivious Critical Layers in Large Language Models | May 31, 2025 | backdoor defenseDomain Adaptation | —Unverified | 0 | 0 |