Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1910.03137
Cited By
Detecting AI Trojans Using Meta Neural Analysis
8 October 2019
Xiaojun Xu
Qi Wang
Huichen Li
Nikita Borisov
Carl A. Gunter
Bo-wen Li
Re-assign community
ArXiv
PDF
HTML
Papers citing
"Detecting AI Trojans Using Meta Neural Analysis"
50 / 196 papers shown
Title
OCGEC: One-class Graph Embedding Classification for DNN Backdoor Detection
Haoyu Jiang
Haiyang Yu
Nan Li
Ping Yi
33
0
0
04 Dec 2023
A Unified Hardware-based Threat Detector for AI Accelerators
Xiaobei Yan
Han Qiu
Tianwei Zhang
16
2
0
28 Nov 2023
Elijah: Eliminating Backdoors Injected in Diffusion Models via Distribution Shift
Shengwei An
Sheng-Yen Chou
Kaiyuan Zhang
Qiuling Xu
Guanhong Tao
...
Shuyang Cheng
Shiqing Ma
Pin-Yu Chen
Tsung-Yi Ho
Xiangyu Zhang
DiffM
AAML
41
28
0
27 Nov 2023
Magmaw: Modality-Agnostic Adversarial Attacks on Machine Learning-Based Wireless Communication Systems
Jung-Woo Chang
Ke Sun
Nasimeh Heydaribeni
Seira Hidano
Xinyu Zhang
F. Koushanfar
AAML
17
1
0
01 Nov 2023
Setting the Trap: Capturing and Defeating Backdoors in Pretrained Language Models through Honeypots
Ruixiang Tang
Jiayi Yuan
Yiming Li
Zirui Liu
Rui Chen
Xia Hu
AAML
36
13
0
28 Oct 2023
Large Language Models Are Better Adversaries: Exploring Generative Clean-Label Backdoor Attacks Against Text Classifiers
Wencong You
Zayd Hammoudeh
Daniel Lowd
AAML
32
12
0
28 Oct 2023
CBD: A Certified Backdoor Detector Based on Local Dominant Probability
Zhen Xiang
Zidi Xiong
Bo Li
AAML
42
14
0
26 Oct 2023
Poison is Not Traceless: Fully-Agnostic Detection of Poisoning Attacks
Xinglong Chang
Katharina Dost
Gill Dobbie
Jörg Simon Wicker
AAML
28
0
0
24 Oct 2023
FLTracer: Accurate Poisoning Attack Provenance in Federated Learning
Xinyu Zhang
Qingyu Liu
Zhongjie Ba
Yuan Hong
Tianhang Zheng
Feng Lin
Liwang Lu
Kui Ren
AAML
46
10
0
20 Oct 2023
Prompt Backdoors in Visual Prompt Learning
Hai Huang
Zhengyu Zhao
Michael Backes
Yun Shen
Yang Zhang
VLM
VPVLM
AAML
SILM
43
2
0
11 Oct 2023
Watch Out! Simple Horizontal Class Backdoor Can Trivially Evade Defense
Hua Ma
Shang Wang
Yansong Gao
Zhi-Li Zhang
Huming Qiu
Minhui Xue
A. Abuadbba
Anmin Fu
Surya Nepal
Derek Abbott
AAML
29
6
0
01 Oct 2023
Backdoor Attacks and Countermeasures in Natural Language Processing Models: A Comprehensive Security Review
Pengzhou Cheng
Zongru Wu
Wei Du
Haodong Zhao
Wei Lu
Gongshen Liu
SILM
AAML
37
18
0
12 Sep 2023
Dropout Attacks
Andrew Yuan
Alina Oprea
Cheng Tan
30
0
0
04 Sep 2023
MDTD: A Multi Domain Trojan Detector for Deep Neural Networks
Arezoo Rajabi
Surudhi Asokraj
Feng-Shr Jiang
Luyao Niu
Bhaskar Ramasubramanian
J. Ritcey
Radha Poovendran
AAML
29
1
0
30 Aug 2023
BaDExpert: Extracting Backdoor Functionality for Accurate Backdoor Input Detection
Tinghao Xie
Xiangyu Qi
Ping He
Yiming Li
Jiachen T. Wang
Prateek Mittal
AAML
28
9
0
23 Aug 2023
Backdoor Mitigation by Correcting the Distribution of Neural Activations
Xi Li
Zhen Xiang
David J. Miller
G. Kesidis
AAML
13
0
0
18 Aug 2023
Improved Activation Clipping for Universal Backdoor Mitigation and Test-Time Detection
Hang Wang
Zhen Xiang
David J. Miller
G. Kesidis
AAML
11
2
0
08 Aug 2023
"Do Anything Now": Characterizing and Evaluating In-The-Wild Jailbreak Prompts on Large Language Models
Xinyue Shen
Zhenpeng Chen
Michael Backes
Yun Shen
Yang Zhang
SILM
40
250
0
07 Aug 2023
ParaFuzz: An Interpretability-Driven Technique for Detecting Poisoned Samples in NLP
Lu Yan
Zhuo Zhang
Guanhong Tao
Kaiyuan Zhang
Xuan Chen
Guangyu Shen
Xiangyu Zhang
AAML
SILM
62
16
0
04 Aug 2023
Backdoor Attacks against Voice Recognition Systems: A Survey
Baochen Yan
Jiahe Lan
Zheng Yan
AAML
30
8
0
23 Jul 2023
Towards Deep Network Steganography: From Networks to Networks
Guobiao Li
Sheng Li
Meiling Li
Zhenxing Qian
Xinpeng Zhang
FedML
30
5
0
07 Jul 2023
Tools for Verifying Neural Models' Training Data
Dami Choi
Yonadav Shavit
David Duvenaud
MIALM
24
14
0
02 Jul 2023
DHBE: Data-free Holistic Backdoor Erasing in Deep Neural Networks via Restricted Adversarial Distillation
Zhicong Yan
Shenghong Li
Ruijie Zhao
Yuan Tian
Yuanyuan Zhao
AAML
39
11
0
13 Jun 2023
UMD: Unsupervised Model Detection for X2X Backdoor Attacks
Zhen Xiang
Zidi Xiong
Bo-wen Li
AAML
32
20
0
29 May 2023
Reconstructive Neuron Pruning for Backdoor Defense
Yige Li
X. Lyu
Xingjun Ma
Nodens Koren
Lingjuan Lyu
Bo-wen Li
Yugang Jiang
AAML
37
43
0
24 May 2023
Backdoor Attack with Sparse and Invisible Trigger
Yinghua Gao
Yiming Li
Xueluan Gong
Zhifeng Li
Shutao Xia
Qianqian Wang
AAML
13
20
0
11 May 2023
Evil from Within: Machine Learning Backdoors through Hardware Trojans
Alexander Warnecke
Julian Speith
Janka Möller
Konrad Rieck
C. Paar
AAML
24
3
0
17 Apr 2023
UNICORN: A Unified Backdoor Trigger Inversion Framework
Zhenting Wang
Kai Mei
Juan Zhai
Shiqing Ma
LLMSV
39
44
0
05 Apr 2023
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency
Xiaogeng Liu
Minghui Li
Haoyu Wang
Shengshan Hu
Dengpan Ye
Hai Jin
Libing Wu
Chaowei Xiao
AAML
27
38
0
27 Mar 2023
Detecting Backdoors in Pre-trained Encoders
Shiwei Feng
Guanhong Tao
Shuyang Cheng
Guangyu Shen
Xiangzhe Xu
Yingqi Liu
Kaiyuan Zhang
Shiqing Ma
Xiangyu Zhang
82
48
0
23 Mar 2023
Manipulating Transfer Learning for Property Inference
Yulong Tian
Fnu Suya
Anshuman Suri
Fengyuan Xu
David Evans
AAML
31
6
0
21 Mar 2023
STDLens: Model Hijacking-Resilient Federated Learning for Object Detection
Ka-Ho Chow
Ling Liu
Wenqi Wei
Fatih Ilhan
Yanzhao Wu
AAML
FedML
19
10
0
21 Mar 2023
Backdoor Defense via Deconfounded Representation Learning
Zaixin Zhang
Qi Liu
Zhicai Wang
Zepu Lu
Qingyong Hu
AAML
57
40
0
13 Mar 2023
FreeEagle: Detecting Complex Neural Trojans in Data-Free Cases
Chong Fu
Xuhong Zhang
S. Ji
Ting Wang
Peng Lin
Yanghe Feng
Jianwei Yin
AAML
43
10
0
28 Feb 2023
Poisoning Web-Scale Training Datasets is Practical
Nicholas Carlini
Matthew Jagielski
Christopher A. Choquette-Choo
Daniel Paleka
Will Pearce
Hyrum S. Anderson
Andreas Terzis
Kurt Thomas
Florian Tramèr
SILM
31
182
0
20 Feb 2023
Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering
Rui Zhu
Di Tang
Siyuan Tang
Guanhong Tao
Shiqing Ma
Xiaofeng Wang
Haixu Tang
DD
23
3
0
29 Jan 2023
Distilling Cognitive Backdoor Patterns within an Image
Hanxun Huang
Xingjun Ma
S. Erfani
James Bailey
AAML
34
24
0
26 Jan 2023
BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense
Shuyang Cheng
Guanhong Tao
Yingqi Liu
Shengwei An
Xiangzhe Xu
...
Guangyu Shen
Kaiyuan Zhang
Qiuling Xu
Shiqing Ma
Xiangyu Zhang
AAML
24
15
0
16 Jan 2023
Stealthy Backdoor Attack for Code Models
Zhou Yang
Bowen Xu
Jie M. Zhang
Hong Jin Kang
Jieke Shi
Junda He
David Lo
AAML
26
65
0
06 Jan 2023
TrojanPuzzle: Covertly Poisoning Code-Suggestion Models
H. Aghakhani
Wei Dai
Andre Manoel
Xavier Fernandes
Anant Kharkar
Christopher Kruegel
Giovanni Vigna
David Evans
B. Zorn
Robert Sim
SILM
29
33
0
06 Jan 2023
Backdoor Attacks Against Dataset Distillation
Yugeng Liu
Zheng Li
Michael Backes
Yun Shen
Yang Zhang
DD
42
28
0
03 Jan 2023
"Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice
Giovanni Apruzzese
Hyrum S. Anderson
Savino Dambra
D. Freeman
Fabio Pierazzi
Kevin A. Roundy
AAML
33
75
0
29 Dec 2022
XMAM:X-raying Models with A Matrix to Reveal Backdoor Attacks for Federated Learning
Jianyi Zhang
Fangjiao Zhang
Qichao Jin
Zhiqiang Wang
Xiaodong Lin
X. Hei
AAML
FedML
38
1
0
28 Dec 2022
Learned Systems Security
R. Schuster
Jinyi Zhou
Thorsten Eisenhofer
Paul Grubbs
Nicolas Papernot
AAML
14
2
0
20 Dec 2022
Fine-Tuning Is All You Need to Mitigate Backdoor Attacks
Zeyang Sha
Xinlei He
Pascal Berrang
Mathias Humbert
Yang Zhang
AAML
13
34
0
18 Dec 2022
Holistic risk assessment of inference attacks in machine learning
Yang Yang
SILM
AAML
MIACV
30
2
0
15 Dec 2022
Dissecting Distribution Inference
Anshuman Suri
Yifu Lu
Yanjin Chen
David Evans
30
14
0
15 Dec 2022
AI Model Utilization Measurements For Finding Class Encoding Patterns
P. Bajcsy
Antonio Cardone
Chenyi Ling
Philippe Dessauw
Michael Majurski
Timothy Blattner
D. Juba
Walid Keyrouz
35
0
0
12 Dec 2022
Selective Amnesia: On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned Machine Learning Models
Rui Zhu
Di Tang
Siyuan Tang
Xiaofeng Wang
Haixu Tang
AAML
FedML
37
13
0
09 Dec 2022
CorruptEncoder: Data Poisoning based Backdoor Attacks to Contrastive Learning
Jinghuai Zhang
Hongbin Liu
Jinyuan Jia
Neil Zhenqiang Gong
AAML
35
20
0
15 Nov 2022
Previous
1
2
3
4
Next