ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2007.08745
  4. Cited By
Backdoor Learning: A Survey
v1v2v3v4v5 (latest)

Backdoor Learning: A Survey

17 July 2020
Yiming Li
Yong Jiang
Zhifeng Li
Shutao Xia
    AAML
ArXiv (abs)PDFHTMLGithub (1107★)

Papers citing "Backdoor Learning: A Survey"

50 / 341 papers shown
Title
Backdoor for Debias: Mitigating Model Bias with Backdoor Attack-based
  Artificial Bias
Backdoor for Debias: Mitigating Model Bias with Backdoor Attack-based Artificial Bias
Shangxi Wu
Qiuyang He
Jitao Sang
Jitao Sang
65
1
0
01 Mar 2023
Mitigating Backdoors in Federated Learning with FLD
Mitigating Backdoors in Federated Learning with FLD
Yi-Wen Lin
Pengyuan Zhou
Zhiqian Wu
Yong Liao
FedML
42
2
0
01 Mar 2023
Backdoor Attacks Against Deep Image Compression via Adaptive Frequency
  Trigger
Backdoor Attacks Against Deep Image Compression via Adaptive Frequency Trigger
Yi Yu
Yufei Wang
Wenhan Yang
Shijian Lu
Yap-Peng Tan
Alex C. Kot
110
44
0
28 Feb 2023
A semantic backdoor attack against Graph Convolutional Networks
A semantic backdoor attack against Graph Convolutional Networks
Jiazhu Dai
Zhipeng Xiong
AAML
104
10
0
28 Feb 2023
Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks
Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks
Jialai Wang
Ziyuan Zhang
Meiqi Wang
Han Qiu
Tianwei Zhang
Qi Li
Zongpeng Li
Tao Wei
Chao Zhang
AAML
84
22
0
27 Feb 2023
Defending Against Backdoor Attacks by Layer-wise Feature Analysis
Defending Against Backdoor Attacks by Layer-wise Feature Analysis
N. Jebreel
J. Domingo-Ferrer
Yiming Li
AAML
84
13
0
24 Feb 2023
Analyzing And Editing Inner Mechanisms Of Backdoored Language Models
Analyzing And Editing Inner Mechanisms Of Backdoored Language Models
Max Lamparth
Anka Reuel
KELM
73
11
0
24 Feb 2023
ASSET: Robust Backdoor Data Detection Across a Multiplicity of Deep
  Learning Paradigms
ASSET: Robust Backdoor Data Detection Across a Multiplicity of Deep Learning Paradigms
Minzhou Pan
Yi Zeng
Lingjuan Lyu
Xinyu Lin
R. Jia
AAML
89
37
0
22 Feb 2023
On Feasibility of Server-side Backdoor Attacks on Split Learning
On Feasibility of Server-side Backdoor Attacks on Split Learning
Behrad Tajalli
Oguzhan Ersoy
S. Picek
FedMLSILM
106
8
0
19 Feb 2023
Backdoor Learning for NLP: Recent Advances, Challenges, and Future
  Research Directions
Backdoor Learning for NLP: Recent Advances, Challenges, and Future Research Directions
Marwan Omar
SILMAAML
73
20
0
14 Feb 2023
Mithridates: Auditing and Boosting Backdoor Resistance of Machine
  Learning Pipelines
Mithridates: Auditing and Boosting Backdoor Resistance of Machine Learning Pipelines
Eugene Bagdasaryan
Vitaly Shmatikov
AAML
92
2
0
09 Feb 2023
Shortcut Detection with Variational Autoencoders
Shortcut Detection with Variational Autoencoders
Nicolas Müller
Simon Roschmann
Shahbaz Khan
Philip Sperl
Konstantin Böttinger
AAMLDRL
65
2
0
08 Feb 2023
Training-free Lexical Backdoor Attacks on Language Models
Training-free Lexical Backdoor Attacks on Language Models
Yujin Huang
Terry Yue Zhuo
Xingliang Yuan
Han Hu
Lizhen Qu
Chunyang Chen
SILM
92
45
0
08 Feb 2023
On Function-Coupled Watermarks for Deep Neural Networks
On Function-Coupled Watermarks for Deep Neural Networks
Xiangyu Wen
Yu Li
Weizhen Jiang
Qian-Lan Xu
AAML
57
1
0
08 Feb 2023
SCALE-UP: An Efficient Black-box Input-level Backdoor Detection via
  Analyzing Scaled Prediction Consistency
SCALE-UP: An Efficient Black-box Input-level Backdoor Detection via Analyzing Scaled Prediction Consistency
Junfeng Guo
Yiming Li
Xun Chen
Hanqing Guo
Lichao Sun
Cong Liu
AAMLMLAU
85
107
0
07 Feb 2023
TextShield: Beyond Successfully Detecting Adversarial Sentences in Text
  Classification
TextShield: Beyond Successfully Detecting Adversarial Sentences in Text Classification
Lingfeng Shen
Ze Zhang
Haiyun Jiang
Ying-Cong Chen
AAML
111
5
0
03 Feb 2023
SoK: A Systematic Evaluation of Backdoor Trigger Characteristics in
  Image Classification
SoK: A Systematic Evaluation of Backdoor Trigger Characteristics in Image Classification
Gorka Abad
Jing Xu
Stefanos Koffas
Behrad Tajalli
S. Picek
Mauro Conti
AAML
104
6
0
03 Feb 2023
BackdoorBox: A Python Toolbox for Backdoor Learning
BackdoorBox: A Python Toolbox for Backdoor Learning
Yiming Li
Mengxi Ya
Yang Bai
Yong Jiang
Shutao Xia
AAML
98
42
0
01 Feb 2023
Salient Conditional Diffusion for Defending Against Backdoor Attacks
Salient Conditional Diffusion for Defending Against Backdoor Attacks
Brandon B. May
N. Joseph Tatro
Dylan Walker
Piyush Kumar
N. Shnidman
DiffM
55
8
0
31 Jan 2023
Towards Adversarial Realism and Robust Learning for IoT Intrusion
  Detection and Classification
Towards Adversarial Realism and Robust Learning for IoT Intrusion Detection and Classification
João Vitorino
Isabel Praça
Eva Maia
AAML
88
28
0
30 Jan 2023
Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering
Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering
Rui Zhu
Di Tang
Siyuan Tang
Guanhong Tao
Shiqing Ma
Xiaofeng Wang
Haixu Tang
DD
59
4
0
29 Jan 2023
BDMMT: Backdoor Sample Detection for Language Models through Model
  Mutation Testing
BDMMT: Backdoor Sample Detection for Language Models through Model Mutation Testing
Jiali Wei
Ming Fan
Wenjing Jiao
Wuxia Jin
Ting Liu
AAML
94
15
0
25 Jan 2023
Threats, Vulnerabilities, and Controls of Machine Learning Based
  Systems: A Survey and Taxonomy
Threats, Vulnerabilities, and Controls of Machine Learning Based Systems: A Survey and Taxonomy
Yusuke Kawamoto
Kazumasa Miyake
K. Konishi
Y. Oiwa
58
4
0
18 Jan 2023
Facial Misrecognition Systems: Simple Weight Manipulations Force DNNs to
  Err Only on Specific Persons
Facial Misrecognition Systems: Simple Weight Manipulations Force DNNs to Err Only on Specific Persons
I. Zehavi
Roee Nitzan
A. Shamir
AAMLCVBM
62
3
0
08 Jan 2023
Silent Killer: A Stealthy, Clean-Label, Black-Box Backdoor Attack
Silent Killer: A Stealthy, Clean-Label, Black-Box Backdoor Attack
Tzvi Lederer
Gallil Maimon
Lior Rokach
AAML
41
2
0
05 Jan 2023
Backdoor Attacks Against Dataset Distillation
Backdoor Attacks Against Dataset Distillation
Yugeng Liu
Zheng Li
Michael Backes
Yun Shen
Yang Zhang
DD
111
30
0
03 Jan 2023
Look, Listen, and Attack: Backdoor Attacks Against Video Action
  Recognition
Look, Listen, and Attack: Backdoor Attacks Against Video Action Recognition
Hasan Hammoud
Shuming Liu
Mohammad Alkhrashi
Fahad Albalawi
Guohao Li
AAML
116
9
0
03 Jan 2023
XMAM:X-raying Models with A Matrix to Reveal Backdoor Attacks for
  Federated Learning
XMAM:X-raying Models with A Matrix to Reveal Backdoor Attacks for Federated Learning
Jianyi Zhang
Fangjiao Zhang
Qichao Jin
Zhiqiang Wang
Xiaodong Lin
X. Hei
AAMLFedML
82
1
0
28 Dec 2022
VSVC: Backdoor attack against Keyword Spotting based on Voiceprint
  Selection and Voice Conversion
VSVC: Backdoor attack against Keyword Spotting based on Voiceprint Selection and Voice Conversion
Hanbo Cai
Pengcheng Zhang
Hai Dong
Yan Xiao
Shunhui Ji
61
6
0
20 Dec 2022
Flareon: Stealthy any2any Backdoor Injection via Poisoned Augmentation
Flareon: Stealthy any2any Backdoor Injection via Poisoned Augmentation
Tianrui Qin
Xianghuan He
Xitong Gao
Yiren Zhao
Kejiang Ye
Chengjie Xu
AAML
65
3
0
20 Dec 2022
AI Security for Geoscience and Remote Sensing: Challenges and Future
  Trends
AI Security for Geoscience and Remote Sensing: Challenges and Future Trends
Yonghao Xu
Tao Bai
Weikang Yu
Shizhen Chang
P. M. Atkinson
Pedram Ghamisi
AAML
89
47
0
19 Dec 2022
Training Data Influence Analysis and Estimation: A Survey
Training Data Influence Analysis and Estimation: A Survey
Zayd Hammoudeh
Daniel Lowd
TDI
117
100
0
09 Dec 2022
Open RAN Security: Challenges and Opportunities
Open RAN Security: Challenges and Opportunities
Madhusanka Liyanage
An Braeken
Shahriar Shahabuddin
Pasika Sashmal Ranaweera
79
88
0
03 Dec 2022
Backdoor Vulnerabilities in Normally Trained Deep Learning Models
Backdoor Vulnerabilities in Normally Trained Deep Learning Models
Guanhong Tao
Zhenting Wang
Shuyang Cheng
Shiqing Ma
Shengwei An
Yingqi Liu
Guangyu Shen
Zhuo Zhang
Yunshu Mao
Xiangyu Zhang
SILM
68
17
0
29 Nov 2022
Be Careful with Rotation: A Uniform Backdoor Pattern for 3D Shape
Be Careful with Rotation: A Uniform Backdoor Pattern for 3D Shape
Linkun Fan
Fazhi He
Qingchen Guo
Wei Tang
Xiaolin Hong
Bing Li
AAML3DPC
74
9
0
28 Nov 2022
Federated Learning Attacks and Defenses: A Survey
Federated Learning Attacks and Defenses: A Survey
Yao Chen
Yijie Gui
Hong Lin
Wensheng Gan
Yongdong Wu
FedML
79
31
0
27 Nov 2022
Don't Watch Me: A Spatio-Temporal Trojan Attack on
  Deep-Reinforcement-Learning-Augment Autonomous Driving
Don't Watch Me: A Spatio-Temporal Trojan Attack on Deep-Reinforcement-Learning-Augment Autonomous Driving
Yinbo Yu
Jiajia Liu
55
2
0
22 Nov 2022
Invisible Backdoor Attack with Dynamic Triggers against Person
  Re-identification
Invisible Backdoor Attack with Dynamic Triggers against Person Re-identification
Wenli Sun
Xinyang Jiang
Shuguang Dou
Dongsheng Li
Duoqian Miao
Cheng Deng
Cairong Zhao
AAML
82
8
0
20 Nov 2022
PBSM: Backdoor attack against Keyword spotting based on pitch boosting
  and sound masking
PBSM: Backdoor attack against Keyword spotting based on pitch boosting and sound masking
Hanbo Cai
Pengcheng Zhang
Hai Dong
Yan Xiao
Shunhui Ji
AAML
35
7
0
16 Nov 2022
Backdoor Attacks for Remote Sensing Data with Wavelet Transform
Backdoor Attacks for Remote Sensing Data with Wavelet Transform
Nikolaus Drager
Yonghao Xu
Pedram Ghamisi
AAML
67
13
0
15 Nov 2022
FedTracker: Furnishing Ownership Verification and Traceability for
  Federated Learning Model
FedTracker: Furnishing Ownership Verification and Traceability for Federated Learning Model
Shuo Shao
Wenyuan Yang
Hanlin Gu
Zhan Qin
Lixin Fan
Qiang Yang
Kui Ren
FedML
71
31
0
14 Nov 2022
Resilience of Wireless Ad Hoc Federated Learning against Model Poisoning
  Attacks
Resilience of Wireless Ad Hoc Federated Learning against Model Poisoning Attacks
Naoya Tezuka
H. Ochiai
Yuwei Sun
Hiroshi Esaki
AAML
65
4
0
07 Nov 2022
Untargeted Backdoor Attack against Object Detection
Untargeted Backdoor Attack against Object Detection
C. Luo
Yiming Li
Yong Jiang
Shutao Xia
AAML
75
32
0
02 Nov 2022
Dormant Neural Trojans
Dormant Neural Trojans
Feisi Fu
Panagiota Kiourti
Wenchao Li
AAML
81
0
0
02 Nov 2022
BATT: Backdoor Attack with Transformation-based Triggers
BATT: Backdoor Attack with Transformation-based Triggers
Tong Xu
Yiming Li
Yong Jiang
Shutao Xia
AAML
93
15
0
02 Nov 2022
Backdoor Defense via Suppressing Model Shortcuts
Backdoor Defense via Suppressing Model Shortcuts
Shengyuan Yang
Yiming Li
Yong Jiang
Shutao Xia
AAML
82
12
0
02 Nov 2022
Watermarking for Out-of-distribution Detection
Watermarking for Out-of-distribution Detection
Qizhou Wang
Feng Liu
Yonggang Zhang
Jing Zhang
Chen Gong
Tongliang Liu
Bo Han
OODD
88
32
0
27 Oct 2022
Backdoor Attack and Defense in Federated Generative Adversarial
  Network-based Medical Image Synthesis
Backdoor Attack and Defense in Federated Generative Adversarial Network-based Medical Image Synthesis
Ruinan Jin
Xiaoxiao Li
FedMLAAMLMedIm
139
23
0
19 Oct 2022
Towards Fair Classification against Poisoning Attacks
Towards Fair Classification against Poisoning Attacks
Han Xu
Xiaorui Liu
Yuxuan Wan
Jiliang Tang
81
2
0
18 Oct 2022
COLLIDER: A Robust Training Framework for Backdoor Data
COLLIDER: A Robust Training Framework for Backdoor Data
H. M. Dolatabadi
S. Erfani
C. Leckie
AAML
47
7
0
13 Oct 2022
Previous
1234567
Next