ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1712.05526
  4. Cited By
Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning

Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning

15 December 2017
Xinyun Chen
Chang-rui Liu
Bo-wen Li
Kimberly Lu
D. Song
    AAML
    SILM
ArXivPDFHTML

Papers citing "Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning"

50 / 351 papers shown
Title
Federated Learning based on Defending Against Data Poisoning Attacks in
  IoT
Federated Learning based on Defending Against Data Poisoning Attacks in IoT
Jiayin Li
Wenzhong Guo
Xingshuo Han
Jianping Cai
Ximeng Liu
AAML
83
1
0
14 Sep 2022
Universal Backdoor Attacks Detection via Adaptive Adversarial Probe
Universal Backdoor Attacks Detection via Adaptive Adversarial Probe
Yuhang Wang
Huafeng Shi
Rui Min
Ruijia Wu
Siyuan Liang
Yichao Wu
Ding Liang
Aishan Liu
AAML
39
7
0
12 Sep 2022
Unraveling the Connections between Privacy and Certified Robustness in
  Federated Learning Against Poisoning Attacks
Unraveling the Connections between Privacy and Certified Robustness in Federated Learning Against Poisoning Attacks
Chulin Xie
Yunhui Long
Pin-Yu Chen
Qinbin Li
Arash Nourian
Sanmi Koyejo
Bo Li
FedML
43
13
0
08 Sep 2022
Cerberus: Exploring Federated Prediction of Security Events
Cerberus: Exploring Federated Prediction of Security Events
Mohammad Naseri
Yufei Han
Enrico Mariconti
Yun Shen
Gianluca Stringhini
Emiliano De Cristofaro
FedML
45
14
0
07 Sep 2022
Defending Against Backdoor Attack on Graph Nerual Network by
  Explainability
Defending Against Backdoor Attack on Graph Nerual Network by Explainability
B. Jiang
Zhao Li
AAML
GNN
64
16
0
07 Sep 2022
An Adaptive Black-box Defense against Trojan Attacks (TrojDef)
An Adaptive Black-box Defense against Trojan Attacks (TrojDef)
Guanxiong Liu
Abdallah Khreishah
Fatima Sharadgah
Issa M. Khalil
AAML
21
8
0
05 Sep 2022
SNAP: Efficient Extraction of Private Properties with Poisoning
SNAP: Efficient Extraction of Private Properties with Poisoning
Harsh Chaudhari
John Abascal
Alina Oprea
Matthew Jagielski
Florian Tramèr
Jonathan R. Ullman
MIACV
34
30
0
25 Aug 2022
A simplified convergence theory for Byzantine resilient stochastic
  gradient descent
A simplified convergence theory for Byzantine resilient stochastic gradient descent
Lindon Roberts
E. Smyth
28
3
0
25 Aug 2022
RIBAC: Towards Robust and Imperceptible Backdoor Attack against Compact
  DNN
RIBAC: Towards Robust and Imperceptible Backdoor Attack against Compact DNN
Huy Phan
Cong Shi
Yi Xie
Tian-Di Zhang
Zhuohang Li
Tianming Zhao
Jian-Dong Liu
Yan Wang
Ying-Cong Chen
Bo Yuan
AAML
32
6
0
22 Aug 2022
An anomaly detection approach for backdoored neural networks: face
  recognition as a case study
An anomaly detection approach for backdoored neural networks: face recognition as a case study
A. Unnervik
S´ebastien Marcel
AAML
29
4
0
22 Aug 2022
Byzantines can also Learn from History: Fall of Centered Clipping in
  Federated Learning
Byzantines can also Learn from History: Fall of Centered Clipping in Federated Learning
Kerem Ozfatura
Emre Ozfatura
Alptekin Kupcu
Deniz Gunduz
AAML
FedML
36
13
0
21 Aug 2022
Dispersed Pixel Perturbation-based Imperceptible Backdoor Trigger for
  Image Classifier Models
Dispersed Pixel Perturbation-based Imperceptible Backdoor Trigger for Image Classifier Models
Yulong Wang
Minghui Zhao
Shenghong Li
Xinnan Yuan
W. Ni
18
15
0
19 Aug 2022
Friendly Noise against Adversarial Noise: A Powerful Defense against
  Data Poisoning Attacks
Friendly Noise against Adversarial Noise: A Powerful Defense against Data Poisoning Attacks
Tianwei Liu
Yu Yang
Baharan Mirzasoleiman
AAML
30
27
0
14 Aug 2022
Defense against Backdoor Attacks via Identifying and Purifying Bad
  Neurons
Defense against Backdoor Attacks via Identifying and Purifying Bad Neurons
Mingyuan Fan
Yang Liu
Cen Chen
Ximeng Liu
Wenzhong Guo
AAML
21
4
0
13 Aug 2022
AWEncoder: Adversarial Watermarking Pre-trained Encoders in Contrastive
  Learning
AWEncoder: Adversarial Watermarking Pre-trained Encoders in Contrastive Learning
Tianxing Zhang
Hanzhou Wu
Xiaofeng Lu
Guangling Sun
AAML
27
4
0
08 Aug 2022
Data-free Backdoor Removal based on Channel Lipschitzness
Data-free Backdoor Removal based on Channel Lipschitzness
Runkai Zheng
Rong Tang
Jianze Li
Li Liu
AAML
21
104
0
05 Aug 2022
FRIB: Low-poisoning Rate Invisible Backdoor Attack based on Feature
  Repair
FRIB: Low-poisoning Rate Invisible Backdoor Attack based on Feature Repair
Hui Xia
Xiugui Yang
X. Qian
Rui Zhang
AAML
32
0
0
26 Jul 2022
Explainable Intrusion Detection Systems (X-IDS): A Survey of Current
  Methods, Challenges, and Opportunities
Explainable Intrusion Detection Systems (X-IDS): A Survey of Current Methods, Challenges, and Opportunities
Subash Neupane
Jesse Ables
William Anderson
Sudip Mittal
Shahram Rahimi
I. Banicescu
Maria Seale
AAML
56
71
0
13 Jul 2022
Machine Learning Security in Industry: A Quantitative Survey
Machine Learning Security in Industry: A Quantitative Survey
Kathrin Grosse
L. Bieringer
Tarek R. Besold
Battista Biggio
Katharina Krombholz
34
32
0
11 Jul 2022
Defense Against Multi-target Trojan Attacks
Defense Against Multi-target Trojan Attacks
Haripriya Harikumar
Santu Rana
Kien Do
Sunil R. Gupta
W. Zong
Willy Susilo
Svetha Venkatesh
AAML
16
3
0
08 Jul 2022
Backdoor Attack is a Devil in Federated GAN-based Medical Image
  Synthesis
Backdoor Attack is a Devil in Federated GAN-based Medical Image Synthesis
Ruinan Jin
Xiaoxiao Li
AAML
FedML
MedIm
39
12
0
02 Jul 2022
Natural Backdoor Datasets
Natural Backdoor Datasets
Emily Wenger
Roma Bhattacharjee
A. Bhagoji
Josephine Passananti
Emilio Andere
Haitao Zheng
Ben Y. Zhao
AAML
33
4
0
21 Jun 2022
DECK: Model Hardening for Defending Pervasive Backdoors
DECK: Model Hardening for Defending Pervasive Backdoors
Guanhong Tao
Yingqi Liu
Shuyang Cheng
Shengwei An
Zhuo Zhang
Qiuling Xu
Guangyu Shen
Xiangyu Zhang
AAML
26
7
0
18 Jun 2022
Backdoor Attacks on Vision Transformers
Backdoor Attacks on Vision Transformers
Akshayvarun Subramanya
Aniruddha Saha
Soroush Abbasi Koohpayegani
Ajinkya Tejankar
Hamed Pirsiavash
ViT
AAML
21
16
0
16 Jun 2022
Neurotoxin: Durable Backdoors in Federated Learning
Neurotoxin: Durable Backdoors in Federated Learning
Zhengming Zhang
Ashwinee Panda
Linyue Song
Yaoqing Yang
Michael W. Mahoney
Joseph E. Gonzalez
Kannan Ramchandran
Prateek Mittal
FedML
38
130
0
12 Jun 2022
On the Permanence of Backdoors in Evolving Models
On the Permanence of Backdoors in Evolving Models
Huiying Li
A. Bhagoji
Yuxin Chen
Haitao Zheng
Ben Y. Zhao
AAML
29
2
0
08 Jun 2022
A temporal chrominance trigger for clean-label backdoor attack against
  anti-spoof rebroadcast detection
A temporal chrominance trigger for clean-label backdoor attack against anti-spoof rebroadcast detection
Wei Guo
B. Tondi
Mauro Barni
AAML
8
13
0
02 Jun 2022
Hide and Seek: on the Stealthiness of Attacks against Deep Learning
  Systems
Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems
Zeyan Liu
Fengjun Li
Jingqiang Lin
Zhu Li
Bo Luo
AAML
15
1
0
31 May 2022
Integrity Authentication in Tree Models
Integrity Authentication in Tree Models
Weijie Zhao
Yingjie Lao
Ping Li
59
5
0
30 May 2022
BadDet: Backdoor Attacks on Object Detection
BadDet: Backdoor Attacks on Object Detection
Shih-Han Chan
Yinpeng Dong
Junyi Zhu
Xiaolu Zhang
Jun Zhou
AAML
24
56
0
28 May 2022
VeriFi: Towards Verifiable Federated Unlearning
VeriFi: Towards Verifiable Federated Unlearning
Xiangshan Gao
Xingjun Ma
Jingyi Wang
Youcheng Sun
Bo Li
S. Ji
Peng Cheng
Jiming Chen
MU
67
46
0
25 May 2022
WeDef: Weakly Supervised Backdoor Defense for Text Classification
WeDef: Weakly Supervised Backdoor Defense for Text Classification
Lesheng Jin
Zihan Wang
Jingbo Shang
AAML
29
14
0
24 May 2022
Backdoor Attacks on Bayesian Neural Networks using Reverse Distribution
Backdoor Attacks on Bayesian Neural Networks using Reverse Distribution
Zhixin Pan
Prabhat Mishra
AAML
15
4
0
18 May 2022
Verifying Neural Networks Against Backdoor Attacks
Verifying Neural Networks Against Backdoor Attacks
Long H. Pham
Jun Sun
AAML
26
5
0
14 May 2022
PoisonedEncoder: Poisoning the Unlabeled Pre-training Data in
  Contrastive Learning
PoisonedEncoder: Poisoning the Unlabeled Pre-training Data in Contrastive Learning
Hongbin Liu
Jinyuan Jia
Neil Zhenqiang Gong
25
34
0
13 May 2022
Backdooring Explainable Machine Learning
Backdooring Explainable Machine Learning
Maximilian Noppel
Lukas Peter
Christian Wressnegger
AAML
16
5
0
20 Apr 2022
Indiscriminate Data Poisoning Attacks on Neural Networks
Indiscriminate Data Poisoning Attacks on Neural Networks
Yiwei Lu
Gautam Kamath
Yaoliang Yu
AAML
43
24
0
19 Apr 2022
Narcissus: A Practical Clean-Label Backdoor Attack with Limited
  Information
Narcissus: A Practical Clean-Label Backdoor Attack with Limited Information
Yi Zeng
Minzhou Pan
H. Just
Lingjuan Lyu
M. Qiu
R. Jia
AAML
20
168
0
11 Apr 2022
FederatedScope: A Flexible Federated Learning Platform for Heterogeneity
FederatedScope: A Flexible Federated Learning Platform for Heterogeneity
Yuexiang Xie
Zhen Wang
Dawei Gao
Daoyuan Chen
Liuyi Yao
Weirui Kuang
Yaliang Li
Bolin Ding
Jingren Zhou
FedML
21
88
0
11 Apr 2022
Semi-Targeted Model Poisoning Attack on Federated Learning via Backward
  Error Analysis
Semi-Targeted Model Poisoning Attack on Federated Learning via Backward Error Analysis
Yuwei Sun
H. Ochiai
Jun Sakuma
AAML
FedML
37
15
0
22 Mar 2022
Robustly-reliable learners under poisoning attacks
Robustly-reliable learners under poisoning attacks
Maria-Florina Balcan
Avrim Blum
Steve Hanneke
Dravyansh Sharma
AAML
OOD
26
14
0
08 Mar 2022
Low-Loss Subspace Compression for Clean Gains against Multi-Agent
  Backdoor Attacks
Low-Loss Subspace Compression for Clean Gains against Multi-Agent Backdoor Attacks
Siddhartha Datta
N. Shadbolt
AAML
32
6
0
07 Mar 2022
Dynamic Backdoors with Global Average Pooling
Dynamic Backdoors with Global Average Pooling
Stefanos Koffas
S. Picek
Mauro Conti
AAML
16
8
0
04 Mar 2022
Physical Backdoor Attacks to Lane Detection Systems in Autonomous
  Driving
Physical Backdoor Attacks to Lane Detection Systems in Autonomous Driving
Xingshuo Han
Guowen Xu
Yuanpu Zhou
Xuehuan Yang
Jiwei Li
Tianwei Zhang
AAML
30
43
0
02 Mar 2022
On the Effectiveness of Adversarial Training against Backdoor Attacks
On the Effectiveness of Adversarial Training against Backdoor Attacks
Yinghua Gao
Dongxian Wu
Jingfeng Zhang
Guanhao Gan
Shutao Xia
Gang Niu
Masashi Sugiyama
AAML
32
22
0
22 Feb 2022
Poisoning Attacks and Defenses on Artificial Intelligence: A Survey
Poisoning Attacks and Defenses on Artificial Intelligence: A Survey
M. A. Ramírez
Song-Kyoo Kim
H. A. Hamadi
Ernesto Damiani
Young-Ji Byon
Tae-Yeon Kim
C. Cho
C. Yeun
AAML
25
37
0
21 Feb 2022
Constrained Optimization with Dynamic Bound-scaling for Effective
  NLPBackdoor Defense
Constrained Optimization with Dynamic Bound-scaling for Effective NLPBackdoor Defense
Guangyu Shen
Yingqi Liu
Guanhong Tao
Qiuling Xu
Zhuo Zhang
Shengwei An
Shiqing Ma
Xinming Zhang
AAML
18
33
0
11 Feb 2022
Understanding Rare Spurious Correlations in Neural Networks
Understanding Rare Spurious Correlations in Neural Networks
Yao-Yuan Yang
Chi-Ning Chou
Kamalika Chaudhuri
AAML
16
25
0
10 Feb 2022
Identifying Backdoor Attacks in Federated Learning via Anomaly Detection
Identifying Backdoor Attacks in Federated Learning via Anomaly Detection
Yuxi Mi
Yiheng Sun
Jihong Guan
Shuigeng Zhou
AAML
FedML
13
1
0
09 Feb 2022
Redactor: A Data-centric and Individualized Defense Against Inference
  Attacks
Redactor: A Data-centric and Individualized Defense Against Inference Attacks
Geon Heo
Steven Euijong Whang
AAML
23
2
0
07 Feb 2022
Previous
12345678
Next