ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2007.08745
  4. Cited By
Backdoor Learning: A Survey
v1v2v3v4v5 (latest)

Backdoor Learning: A Survey

17 July 2020
Yiming Li
Yong Jiang
Zhifeng Li
Shutao Xia
    AAML
ArXiv (abs)PDFHTMLGithub (1107★)

Papers citing "Backdoor Learning: A Survey"

41 / 341 papers shown
Title
Dual-Key Multimodal Backdoors for Visual Question Answering
Dual-Key Multimodal Backdoors for Visual Question Answering
Matthew Walmer
Karan Sikka
Indranil Sur
Abhinav Shrivastava
Susmit Jha
AAML
78
37
0
14 Dec 2021
Spinning Language Models: Risks of Propaganda-As-A-Service and
  Countermeasures
Spinning Language Models: Risks of Propaganda-As-A-Service and Countermeasures
Eugene Bagdasaryan
Vitaly Shmatikov
SILMAAML
106
84
0
09 Dec 2021
Defending against Model Stealing via Verifying Embedded External
  Features
Defending against Model Stealing via Verifying Embedded External Features
Yiming Li
Linghui Zhu
Xiaojun Jia
Yong Jiang
Shutao Xia
Xiaochun Cao
AAML
88
65
0
07 Dec 2021
Test-Time Detection of Backdoor Triggers for Poisoned Deep Neural
  Networks
Test-Time Detection of Backdoor Triggers for Poisoned Deep Neural Networks
Xi Li
Zhen Xiang
David J. Miller
G. Kesidis
AAML
428
13
0
06 Dec 2021
FIBA: Frequency-Injection based Backdoor Attack in Medical Image
  Analysis
FIBA: Frequency-Injection based Backdoor Attack in Medical Image Analysis
Yu Feng
Benteng Ma
Jing Zhang
Shanshan Zhao
Yong-quan Xia
Dacheng Tao
AAML
108
87
0
02 Dec 2021
An Overview of Backdoor Attacks Against Deep Neural Networks and
  Possible Defences
An Overview of Backdoor Attacks Against Deep Neural Networks and Possible Defences
Wei Guo
B. Tondi
Mauro Barni
AAML
110
69
0
16 Nov 2021
Detecting Backdoor Attacks Against Point Cloud Classifiers
Detecting Backdoor Attacks Against Point Cloud Classifiers
Zhen Xiang
David J. Miller
Siheng Chen
Xi Li
G. Kesidis
3DPCAAML
89
15
0
20 Oct 2021
Textual Backdoor Attacks Can Be More Harmful via Two Simple Tricks
Textual Backdoor Attacks Can Be More Harmful via Two Simple Tricks
Yangyi Chen
Fanchao Qi
Hongcheng Gao
Zhiyuan Liu
Maosong Sun
SILM
76
22
0
15 Oct 2021
Fingerprinting Multi-exit Deep Neural Network Models via Inference Time
Fingerprinting Multi-exit Deep Neural Network Models via Inference Time
Tian Dong
Han Qiu
Tianwei Zhang
Jiwei Li
Hewu Li
Jialiang Lu
AAML
74
8
0
07 Oct 2021
BadPre: Task-agnostic Backdoor Attacks to Pre-trained NLP Foundation
  Models
BadPre: Task-agnostic Backdoor Attacks to Pre-trained NLP Foundation Models
Kangjie Chen
Yuxian Meng
Xiaofei Sun
Shangwei Guo
Tianwei Zhang
Jiwei Li
Chun Fan
SILM
84
111
0
06 Oct 2021
Trustworthy AI: From Principles to Practices
Trustworthy AI: From Principles to Practices
Yue Liu
Peng Qi
Bo Liu
Shuai Di
Jingen Liu
Jiquan Pei
Jinfeng Yi
Bowen Zhou
211
380
0
04 Oct 2021
FooBaR: Fault Fooling Backdoor Attack on Neural Network Training
FooBaR: Fault Fooling Backdoor Attack on Neural Network Training
J. Breier
Xiaolu Hou
Martín Ochoa
Jesus Solano
SILMAAML
75
10
0
23 Sep 2021
Backdoor Attack on Hash-based Image Retrieval via Clean-label Data
  Poisoning
Backdoor Attack on Hash-based Image Retrieval via Clean-label Data Poisoning
Kuofeng Gao
Jiawang Bai
Bin Chen
Dongxian Wu
Shutao Xia
AAML
137
10
0
18 Sep 2021
Check Your Other Door! Creating Backdoor Attacks in the Frequency Domain
Check Your Other Door! Creating Backdoor Attacks in the Frequency Domain
Hasan Hammoud
Guohao Li
AAML
89
14
0
12 Sep 2021
TRAPDOOR: Repurposing backdoors to detect dataset bias in machine
  learning-based genomic analysis
TRAPDOOR: Repurposing backdoors to detect dataset bias in machine learning-based genomic analysis
Esha Sarkar
Michail Maniatakos
98
3
0
14 Aug 2021
Poison Ink: Robust and Invisible Backdoor Attack
Poison Ink: Robust and Invisible Backdoor Attack
Jie Zhang
Dongdong Chen
Qidong Huang
Jing Liao
Weiming Zhang
Huamin Feng
G. Hua
Nenghai Yu
AAML
57
89
0
05 Aug 2021
Sleeper Agent: Scalable Hidden Trigger Backdoors for Neural Networks
  Trained from Scratch
Sleeper Agent: Scalable Hidden Trigger Backdoors for Neural Networks Trained from Scratch
Hossein Souri
Liam H. Fowl
Ramalingam Chellappa
Micah Goldblum
Tom Goldstein
SILM
109
130
0
16 Jun 2021
GAL: Gradient Assisted Learning for Decentralized Multi-Organization
  Collaborations
GAL: Gradient Assisted Learning for Decentralized Multi-Organization Collaborations
Enmao Diao
Jie Ding
Vahid Tarokh
FedML
84
17
0
02 Jun 2021
Poisoning MorphNet for Clean-Label Backdoor Attack to Point Clouds
Poisoning MorphNet for Clean-Label Backdoor Attack to Point Clouds
Guiyu Tian
Wenhao Jiang
Wei Liu
Yadong Mu
3DPCAAML
58
14
0
11 May 2021
Adversarial Example Detection for DNN Models: A Review and Experimental
  Comparison
Adversarial Example Detection for DNN Models: A Review and Experimental Comparison
Ahmed Aldahdooh
W. Hamidouche
Sid Ahmed Fezza
Olivier Déforges
AAML
215
127
0
01 May 2021
From Distributed Machine Learning to Federated Learning: A Survey
From Distributed Machine Learning to Federated Learning: A Survey
Ji Liu
Jizhou Huang
Yang Zhou
Xuhong Li
Shilei Ji
Haoyi Xiong
Dejing Dou
FedMLOOD
140
259
0
29 Apr 2021
A Backdoor Attack against 3D Point Cloud Classifiers
A Backdoor Attack against 3D Point Cloud Classifiers
Zhen Xiang
David J. Miller
Siheng Chen
Xi Li
G. Kesidis
3DPCAAML
84
77
0
12 Apr 2021
Backdoor Attack in the Physical World
Backdoor Attack in the Physical World
Yiming Li
Tongqing Zhai
Yong Jiang
Zhifeng Li
Shutao Xia
77
113
0
06 Apr 2021
PointBA: Towards Backdoor Attacks in 3D Point Cloud
PointBA: Towards Backdoor Attacks in 3D Point Cloud
Xinke Li
Zhirui Chen
Yue Zhao
Zekun Tong
Yabang Zhao
A. Lim
Qiufeng Wang
3DPCAAML
160
53
0
30 Mar 2021
MISA: Online Defense of Trojaned Models using Misattributions
MISA: Online Defense of Trojaned Models using Misattributions
Panagiota Kiourti
Wenchao Li
Anirban Roy
Karan Sikka
Susmit Jha
49
10
0
29 Mar 2021
TOP: Backdoor Detection in Neural Networks via Transferability of
  Perturbation
TOP: Backdoor Detection in Neural Networks via Transferability of Perturbation
Todd P. Huster
E. Ekwedike
SILM
83
19
0
18 Mar 2021
EX-RAY: Distinguishing Injected Backdoor from Natural Features in Neural
  Networks by Examining Differential Feature Symmetry
EX-RAY: Distinguishing Injected Backdoor from Natural Features in Neural Networks by Examining Differential Feature Symmetry
Yingqi Liu
Guangyu Shen
Guanhong Tao
Zhenting Wang
Shiqing Ma
Xinming Zhang
AAML
88
8
0
16 Mar 2021
Hidden Backdoor Attack against Semantic Segmentation Models
Hidden Backdoor Attack against Semantic Segmentation Models
Yiming Li
Yanjie Li
Yalei Lv
Yong Jiang
Shutao Xia
AAML
367
31
0
06 Mar 2021
Backdoor Scanning for Deep Neural Networks through K-Arm Optimization
Backdoor Scanning for Deep Neural Networks through K-Arm Optimization
Guangyu Shen
Yingqi Liu
Guanhong Tao
Shengwei An
Qiuling Xu
Shuyang Cheng
Shiqing Ma
Xinming Zhang
AAML
126
119
0
09 Feb 2021
On Provable Backdoor Defense in Collaborative Learning
On Provable Backdoor Defense in Collaborative Learning
Ximing Qiao
Yuhua Bai
S. Hu
Ang Li
Yiran Chen
H. Li
AAMLFedML
20
1
0
19 Jan 2021
Red Alarm for Pre-trained Models: Universal Vulnerability to
  Neuron-Level Backdoor Attacks
Red Alarm for Pre-trained Models: Universal Vulnerability to Neuron-Level Backdoor Attacks
Zhengyan Zhang
Guangxuan Xiao
Yongwei Li
Tian Lv
Fanchao Qi
Zhiyuan Liu
Yasheng Wang
Xin Jiang
Maosong Sun
AAML
153
74
0
18 Jan 2021
Selective Forgetting of Deep Networks at a Finer Level than Samples
Selective Forgetting of Deep Networks at a Finer Level than Samples
Tomohiro Hayase
S. Yasutomi
Takashi Katoh
71
12
0
22 Dec 2020
Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks,
  and Defenses
Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses
Micah Goldblum
Dimitris Tsipras
Chulin Xie
Xinyun Chen
Avi Schwarzschild
Basel Alomair
Aleksander Madry
Yue Liu
Tom Goldstein
SILM
126
282
0
18 Dec 2020
TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural
  Backdoors
TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors
Ren Pang
Zheng Zhang
Xiangshan Gao
Zhaohan Xi
S. Ji
Peng Cheng
Xiapu Luo
Ting Wang
AAML
87
32
0
16 Dec 2020
HaS-Nets: A Heal and Select Mechanism to Defend DNNs Against Backdoor
  Attacks for Data Collection Scenarios
HaS-Nets: A Heal and Select Mechanism to Defend DNNs Against Backdoor Attacks for Data Collection Scenarios
Hassan Ali
Surya Nepal
S. Kanhere
S. Jha
AAML
55
13
0
14 Dec 2020
Privacy and Robustness in Federated Learning: Attacks and Defenses
Privacy and Robustness in Federated Learning: Attacks and Defenses
Lingjuan Lyu
Han Yu
Xingjun Ma
Chen Chen
Lichao Sun
Jun Zhao
Qiang Yang
Philip S. Yu
FedML
329
374
0
07 Dec 2020
Detecting Trojaned DNNs Using Counterfactual Attributions
Detecting Trojaned DNNs Using Counterfactual Attributions
Karan Sikka
Indranil Sur
Susmit Jha
Anirban Roy
Ajay Divakaran
AAML
35
13
0
03 Dec 2020
Deep Serial Number: Computational Watermarking for DNN Intellectual
  Property Protection
Deep Serial Number: Computational Watermarking for DNN Intellectual Property Protection
Ruixiang Tang
Mengnan Du
Helen Zhou
100
4
0
17 Nov 2020
Open-sourced Dataset Protection via Backdoor Watermarking
Open-sourced Dataset Protection via Backdoor Watermarking
Yiming Li
Zi-Mou Zhang
Jiawang Bai
Baoyuan Wu
Yong Jiang
Shutao Xia
67
41
0
12 Oct 2020
Defending against Backdoor Attack on Deep Neural Networks
Defending against Backdoor Attack on Deep Neural Networks
Kaidi Xu
Sijia Liu
Pin-Yu Chen
Pu Zhao
Xinyu Lin
Xue Lin
AAML
91
49
0
26 Feb 2020
Towards Backdoor Attacks and Defense in Robust Machine Learning Models
Towards Backdoor Attacks and Defense in Robust Machine Learning Models
E. Soremekun
Sakshi Udeshi
Sudipta Chattopadhyay
AAML
24
14
0
25 Feb 2020
Previous
1234567