Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
2007.08745
Cited By
v1
v2
v3
v4
v5 (latest)
Backdoor Learning: A Survey
17 July 2020
Yiming Li
Yong Jiang
Zhifeng Li
Shutao Xia
AAML
Re-assign community
ArXiv (abs)
PDF
HTML
Github (1107★)
Papers citing
"Backdoor Learning: A Survey"
50 / 341 papers shown
Title
Understanding Impacts of Task Similarity on Backdoor Attack and Detection
Di Tang
Rui Zhu
Xiaofeng Wang
Haixu Tang
Yi Chen
AAML
105
5
0
12 Oct 2022
Backdoor Attacks in the Supply Chain of Masked Image Modeling
Xinyue Shen
Xinlei He
Zheng Li
Yun Shen
Michael Backes
Yang Zhang
78
8
0
04 Oct 2022
ImpNet: Imperceptible and blackbox-undetectable backdoors in compiled neural networks
Eleanor Clifford
Ilia Shumailov
Yiren Zhao
Ross J. Anderson
Robert D. Mullins
93
14
0
30 Sep 2022
Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protection
Yiming Li
Yang Bai
Yong Jiang
Yong-Liang Yang
Shutao Xia
Bo Li
AAML
130
108
0
27 Sep 2022
BadRes: Reveal the Backdoors through Residual Connection
Min He
Tianyu Chen
Haoyi Zhou
Shanghang Zhang
Jianxin Li
52
1
0
15 Sep 2022
Reducing Certified Regression to Certified Classification for General Poisoning Attacks
Zayd Hammoudeh
Daniel Lowd
AAML
82
10
0
29 Aug 2022
Imperceptible and Robust Backdoor Attack in 3D Point Cloud
Kuofeng Gao
Jiawang Bai
Baoyuan Wu
Mengxi Ya
Shutao Xia
AAML
3DPC
91
33
0
17 Aug 2022
Attention Hijacking in Trojan Transformers
Weimin Lyu
Songzhu Zheng
Teng Ma
Haibin Ling
Chao Chen
83
8
0
09 Aug 2022
Data-free Backdoor Removal based on Channel Lipschitzness
Runkai Zheng
Rong Tang
Jianze Li
Li Liu
AAML
84
109
0
05 Aug 2022
Black-box Dataset Ownership Verification via Backdoor Watermarking
Yiming Li
Mingyan Zhu
Xue Yang
Yong Jiang
Tao Wei
Shutao Xia
AAML
82
81
0
04 Aug 2022
MOVE: Effective and Harmless Ownership Verification via Embedded External Features
Yiming Li
Linghui Zhu
Xiaojun Jia
Yang Bai
Yong Jiang
Shutao Xia
Xiaochun Cao
Kui Ren
AAML
97
14
0
04 Aug 2022
Hardly Perceptible Trojan Attack against Neural Networks with Bit Flips
Jiawang Bai
Kuofeng Gao
Dihong Gong
Shutao Xia
Zhifeng Li
Wen Liu
AAML
80
29
0
27 Jul 2022
FRIB: Low-poisoning Rate Invisible Backdoor Attack based on Feature Repair
Hui Xia
Xiugui Yang
X. Qian
Rui Zhang
AAML
49
1
0
26 Jul 2022
Versatile Weight Attack via Flipping Limited Bits
Jiawang Bai
Baoyuan Wu
Zhifeng Li
Shutao Xia
AAML
64
19
0
25 Jul 2022
Just Rotate it: Deploying Backdoor Attacks via Rotation Transformation
Tong Wu
Tianhao Wang
Vikash Sehwag
Saeed Mahloujifar
Prateek Mittal
AAML
93
39
0
22 Jul 2022
Backdoor Attacks on Crowd Counting
Yuhua Sun
Tailai Zhang
Xingjun Ma
Pan Zhou
Jian Lou
Zichuan Xu
Xing Di
Yu Cheng
Lichao
AAML
76
15
0
12 Jul 2022
Auditing Visualizations: Transparency Methods Struggle to Detect Anomalous Behavior
Jean-Stanislas Denain
Jacob Steinhardt
AAML
104
7
0
27 Jun 2022
BackdoorBench: A Comprehensive Benchmark of Backdoor Learning
Baoyuan Wu
Hongrui Chen
Ruotong Wang
Zihao Zhu
Shaokui Wei
Danni Yuan
Chaoxiao Shen
ELM
AAML
138
146
0
25 Jun 2022
Transferable Graph Backdoor Attack
Shuiqiao Yang
Bao Gia Doan
Paul Montague
O. Vel
Tamas Abraham
S. Çamtepe
Damith C. Ranasinghe
S. Kanhere
AAML
96
39
0
21 Jun 2022
A Unified Evaluation of Textual Backdoor Learning: Frameworks and Benchmarks
Ganqu Cui
Lifan Yuan
Bingxiang He
Yangyi Chen
Zhiyuan Liu
Maosong Sun
AAML
ELM
SILM
95
73
0
17 Jun 2022
Edge Security: Challenges and Issues
Xin Jin
Charalampos Katsis
Fan Sang
Jiahao Sun
A. Kundu
Ramana Rao Kompella
86
9
0
14 Jun 2022
Membership Inference via Backdooring
Hongsheng Hu
Z. Salcic
Gillian Dobbie
Jinjun Chen
Lichao Sun
Xuyun Zhang
MIACV
67
31
0
10 Jun 2022
CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences
Shang Wang
Yansong Gao
Anmin Fu
Zhi-Li Zhang
Yuqing Zhang
W. Susilo
Dongxi Liu
AAML
115
12
0
31 May 2022
Towards A Proactive ML Approach for Detecting Backdoor Poison Samples
Xiangyu Qi
Tinghao Xie
Jiachen T. Wang
Tong Wu
Saeed Mahloujifar
Prateek Mittal
AAML
95
52
0
26 May 2022
Circumventing Backdoor Defenses That Are Based on Latent Separability
Xiangyu Qi
Tinghao Xie
Yiming Li
Saeed Mahloujifar
Prateek Mittal
AAML
125
11
0
26 May 2022
On Collective Robustness of Bagging Against Data Poisoning
Ruoxin Chen
Zenan Li
Jie Li
Chentao Wu
Junchi Yan
100
23
0
26 May 2022
WeDef: Weakly Supervised Backdoor Defense for Text Classification
Lesheng Jin
Zihan Wang
Jingbo Shang
AAML
98
15
0
24 May 2022
Towards a Defense Against Federated Backdoor Attacks Under Continuous Training
Shuai Wang
J. Hayase
Giulia Fanti
Sewoong Oh
FedML
83
5
0
24 May 2022
MM-BD: Post-Training Detection of Backdoor Attacks with Arbitrary Backdoor Pattern Types Using a Maximum Margin Statistic
Hang Wang
Zhen Xiang
David J. Miller
G. Kesidis
AAML
96
44
0
13 May 2022
Model-Contrastive Learning for Backdoor Defense
Zhihao Yue
Jun Xia
Zhiwei Ling
Ming Hu
Ting Wang
Xian Wei
Mingsong Chen
AAML
43
3
0
09 May 2022
A Temporal-Pattern Backdoor Attack to Deep Reinforcement Learning
Yinbo Yu
Jiajia Liu
Shouqing Li
Ke Huang
Xudong Feng
AAML
80
13
0
05 May 2022
Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning
Antonio Emanuele Cinà
Kathrin Grosse
Ambra Demontis
Sebastiano Vascon
Werner Zellinger
Bernhard A. Moser
Alina Oprea
Battista Biggio
Marcello Pelillo
Fabio Roli
AAML
89
127
0
04 May 2022
Data-Efficient Backdoor Attacks
Pengfei Xia
Ziqiang Li
Wei Zhang
Bin Li
AAML
FedML
47
32
0
22 Apr 2022
Narcissus: A Practical Clean-Label Backdoor Attack with Limited Information
Yi Zeng
Minzhou Pan
H. Just
Lingjuan Lyu
M. Qiu
R. Jia
AAML
96
180
0
11 Apr 2022
Low-Loss Subspace Compression for Clean Gains against Multi-Agent Backdoor Attacks
Siddhartha Datta
N. Shadbolt
AAML
79
6
0
07 Mar 2022
Physical Backdoor Attacks to Lane Detection Systems in Autonomous Driving
Xingshuo Han
Guowen Xu
Yuanpu Zhou
Xuehuan Yang
Jiwei Li
Tianwei Zhang
AAML
104
47
0
02 Mar 2022
On the Effectiveness of Adversarial Training against Backdoor Attacks
Yinghua Gao
Dongxian Wu
Jingfeng Zhang
Guanhao Gan
Shutao Xia
Gang Niu
Masashi Sugiyama
AAML
83
23
0
22 Feb 2022
Debiasing Backdoor Attack: A Benign Application of Backdoor Attack in Eliminating Data Bias
Shangxi Wu
Qi He
Yi Zhang
Jitao Sang
AAML
98
2
0
18 Feb 2022
A Survey of Neural Trojan Attacks and Defenses in Deep Learning
Jie Wang
Ghulam Mubashar Hassan
Naveed Akhtar
AAML
74
26
0
15 Feb 2022
Progressive Backdoor Erasing via connecting Backdoor and Adversarial Attacks
Bingxu Mu
Zhenxing Niu
Le Wang
Xue Wang
Rong Jin
G. Hua
AAML
42
16
0
13 Feb 2022
PolicyCleanse: Backdoor Detection and Mitigation in Reinforcement Learning
Junfeng Guo
Ang Li
Cong Liu
AAML
102
17
0
08 Feb 2022
Backdoor Defense via Decoupling the Training Process
Kunzhe Huang
Yiming Li
Baoyuan Wu
Zhan Qin
Kui Ren
AAML
FedML
71
194
0
05 Feb 2022
Few-Shot Backdoor Attacks on Visual Object Tracking
Yiming Li
Haoxiang Zhong
Xingjun Ma
Yong Jiang
Shutao Xia
AAML
111
55
0
31 Jan 2022
Backdoors Stuck At The Frontdoor: Multi-Agent Backdoor Attacks That Backfire
Siddhartha Datta
N. Shadbolt
AAML
99
7
0
28 Jan 2022
Identifying a Training-Set Attack's Target Using Renormalized Influence Estimation
Zayd Hammoudeh
Daniel Lowd
TDI
110
29
0
25 Jan 2022
Post-Training Detection of Backdoor Attacks for Two-Class and Multi-Attack Scenarios
Zhen Xiang
David J. Miller
G. Kesidis
AAML
83
47
0
20 Jan 2022
Towards Adversarial Evaluations for Inexact Machine Unlearning
Shashwat Goel
Ameya Prabhu
Amartya Sanyal
Ser-Nam Lim
Philip Torr
Ponnurangam Kumaraguru
AAML
ELM
MU
115
59
0
17 Jan 2022
Neighboring Backdoor Attacks on Graph Convolutional Network
Liang Chen
Qibiao Peng
Jintang Li
Yang Liu
Jiawei Chen
Yong Li
Zibin Zheng
GNN
AAML
78
11
0
17 Jan 2022
Rethink the Evaluation for Attack Strength of Backdoor Attacks in Natural Language Processing
Lingfeng Shen
Haiyun Jiang
Lemao Liu
Shuming Shi
ELM
24
1
0
09 Jan 2022
Few-shot Backdoor Defense Using Shapley Estimation
Jiyang Guan
Zhuozhuo Tu
Ran He
Dacheng Tao
AAML
90
54
0
30 Dec 2021
Previous
1
2
3
4
5
6
7
Next