SOTAVerified

backdoor defense

Papers

Showing 76100 of 131 papers

TitleStatusHype
PCAP-Backdoor: Backdoor Poisoning Generator for Network Traffic in CPS/IoT Environments0
PECAN: A Deterministic Certified Defense Against Backdoor Attacks0
Proactive Adversarial Defense: Harnessing Prompt Tuning in Vision-Language Models to Detect Unseen Backdoored Images0
Protecting against simultaneous data poisoning attacks0
Prototype Guided Backdoor Defense0
PureDiffusion: Using Backdoor to Counter Backdoor in Generative Diffusion Models0
Rethinking Pruning for Backdoor Mitigation: An Optimization Perspective0
Rethinking the Trigger of Backdoor Attack0
Robust Anti-Backdoor Instruction Tuning in LVLMs0
Versatile Backdoor Attack with Visible, Semantic, Sample-Specific, and Compatible Triggers0
Robustness Inspired Graph Backdoor Defense0
SAB:A Stealing and Robust Backdoor Attack based on Steganographic Algorithm against Federated Learning0
SATBA: An Invisible Backdoor Attack Based On Spatial Attention0
Spectral Insights into Data-Oblivious Critical Layers in Large Language Models0
SRD: Reinforcement-Learned Semantic Perturbation for Backdoor Defense in VLMs0
CleanerCLIP: Fine-grained Counterfactual Semantic Augmentation for Backdoor Defense in Contrastive Learning0
Test-time Backdoor Mitigation for Black-Box Large Language Models with Defensive Demonstrations0
Towards Robust Object Detection: Identifying and Removing Backdoors via Module Inconsistency Analysis0
Towards Understanding How Self-training Tolerates Data Backdoor Poisoning0
Unlearning Backdoor Threats: Enhancing Backdoor Defense in Multimodal Contrastive Learning via Local Token Unlearning0
Unveiling and Mitigating Backdoor Vulnerabilities based on Unlearning Weight Changes and Backdoor Activeness0
Fusing Pruned and Backdoored Models: Optimal Transport-based Data-free Backdoor Mitigation0
Gradient Norm-based Fine-Tuning for Backdoor Defense in Automatic Speech Recognition0
From Shortcuts to Triggers: Backdoor Defense with Denoised PoECode0
From Trojan Horses to Castle Walls: Unveiling Bilateral Data Poisoning Effects in Diffusion ModelsCode0
Show:102550
← PrevPage 4 of 6Next →

No leaderboard results yet.