ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2110.08335
  4. Cited By
Trigger Hunting with a Topological Prior for Trojan Detection

Trigger Hunting with a Topological Prior for Trojan Detection

15 October 2021
Xiaoling Hu
Xiaoyu Lin
Michael Cogswell
Yi Yao
Susmit Jha
Chao Chen
    AAML
ArXivPDFHTML

Papers citing "Trigger Hunting with a Topological Prior for Trojan Detection"

39 / 39 papers shown
Title
Prototype Guided Backdoor Defense
Prototype Guided Backdoor Defense
Venkat Adithya Amula
Sunayana Samavedam
Saurabh Saini
Avani Gupta
Narayanan P J
AAML
50
0
0
26 Mar 2025
Scanning Trojaned Models Using Out-of-Distribution Samples
Scanning Trojaned Models Using Out-of-Distribution Samples
Hossein Mirzaei
Ali Ansari
Bahar Dibaei Nia
Mojtaba Nafez
Moein Madadi
...
Kian Shamsaie
Mahdi Hajialilue
Jafar Habibi
Mohammad Sabokrou
M. Rohban
OODD
61
2
0
28 Jan 2025
Expose Before You Defend: Unifying and Enhancing Backdoor Defenses via
  Exposed Models
Expose Before You Defend: Unifying and Enhancing Backdoor Defenses via Exposed Models
Yige Li
Hanxun Huang
Jiaming Zhang
Xingjun Ma
Yu-Gang Jiang
AAML
35
2
0
25 Oct 2024
TERD: A Unified Framework for Safeguarding Diffusion Models Against
  Backdoors
TERD: A Unified Framework for Safeguarding Diffusion Models Against Backdoors
Yichuan Mo
Hui Huang
Mingjie Li
Ang Li
Yisen Wang
AAML
DiffM
32
16
0
09 Sep 2024
Spatial Diffusion for Cell Layout Generation
Spatial Diffusion for Cell Layout Generation
Chen Li
Xiaoling Hu
Shahira Abousamra
Meilong Xu
Chao Chen
MedIm
35
4
0
04 Sep 2024
Flatness-aware Sequential Learning Generates Resilient Backdoors
Flatness-aware Sequential Learning Generates Resilient Backdoors
Hoang Pham
The-Anh Ta
Anh Tran
Khoa D. Doan
FedML
AAML
39
0
0
20 Jul 2024
PSBD: Prediction Shift Uncertainty Unlocks Backdoor Detection
PSBD: Prediction Shift Uncertainty Unlocks Backdoor Detection
Wei Li
Pin-Yu Chen
Sijia Liu
Ren Wang
AAML
46
3
0
09 Jun 2024
Magnitude-based Neuron Pruning for Backdoor Defens
Magnitude-based Neuron Pruning for Backdoor Defens
Nan Li
Haoyu Jiang
Ping Yi
AAML
21
1
0
28 May 2024
Rethinking Pruning for Backdoor Mitigation: An Optimization Perspective
Rethinking Pruning for Backdoor Mitigation: An Optimization Perspective
Nan Li
Haiyang Yu
Ping Yi
AAML
33
0
0
28 May 2024
Unified Neural Backdoor Removal with Only Few Clean Samples through
  Unlearning and Relearning
Unified Neural Backdoor Removal with Only Few Clean Samples through Unlearning and Relearning
Nay Myat Min
Long H. Pham
Jun Sun
MU
AAML
45
0
0
23 May 2024
Learning Topological Representations for Deep Image Understanding
Learning Topological Representations for Deep Image Understanding
Xiaoling Hu
31
2
0
22 Mar 2024
Backdoor Secrets Unveiled: Identifying Backdoor Data with Optimized
  Scaled Prediction Consistency
Backdoor Secrets Unveiled: Identifying Backdoor Data with Optimized Scaled Prediction Consistency
Soumyadeep Pal
Yuguang Yao
Ren Wang
Bingquan Shen
Sijia Liu
AAML
36
8
0
15 Mar 2024
Position: Topological Deep Learning is the New Frontier for Relational
  Learning
Position: Topological Deep Learning is the New Frontier for Relational Learning
Theodore Papamarkou
Tolga Birdal
Michael M. Bronstein
Gunnar Carlsson
Justin Curry
...
Petar Velickovic
Bei Wang
Yusu Wang
Guo-Wei Wei
Ghada Zamzmi
AI4CE
59
26
0
14 Feb 2024
Defenses in Adversarial Machine Learning: A Survey
Defenses in Adversarial Machine Learning: A Survey
Baoyuan Wu
Shaokui Wei
Mingli Zhu
Meixi Zheng
Zihao Zhu
Mingda Zhang
Hongrui Chen
Danni Yuan
Li Liu
Qingshan Liu
AAML
30
14
0
13 Dec 2023
CBD: A Certified Backdoor Detector Based on Local Dominant Probability
CBD: A Certified Backdoor Detector Based on Local Dominant Probability
Zhen Xiang
Zidi Xiong
Bo Li
AAML
37
14
0
26 Oct 2023
TIJO: Trigger Inversion with Joint Optimization for Defending Multimodal
  Backdoored Models
TIJO: Trigger Inversion with Joint Optimization for Defending Multimodal Backdoored Models
Indranil Sur
Karan Sikka
Matthew Walmer
K. Koneripalli
Anirban Roy
Xiaoyu Lin
Ajay Divakaran
Susmit Jha
32
8
0
07 Aug 2023
UMD: Unsupervised Model Detection for X2X Backdoor Attacks
UMD: Unsupervised Model Detection for X2X Backdoor Attacks
Zhen Xiang
Zidi Xiong
Bo-wen Li
AAML
26
20
0
29 May 2023
NOTABLE: Transferable Backdoor Attacks Against Prompt-based NLP Models
NOTABLE: Transferable Backdoor Attacks Against Prompt-based NLP Models
Kai Mei
Zheng Li
Zhenting Wang
Yang Zhang
Shiqing Ma
AAML
SILM
37
48
0
28 May 2023
Reconstructive Neuron Pruning for Backdoor Defense
Reconstructive Neuron Pruning for Backdoor Defense
Yige Li
X. Lyu
Xingjun Ma
Nodens Koren
Lingjuan Lyu
Bo-wen Li
Yugang Jiang
AAML
32
42
0
24 May 2023
UNICORN: A Unified Backdoor Trigger Inversion Framework
UNICORN: A Unified Backdoor Trigger Inversion Framework
Zhenting Wang
Kai Mei
Juan Zhai
Shiqing Ma
LLMSV
32
44
0
05 Apr 2023
Mask and Restore: Blind Backdoor Defense at Test Time with Masked
  Autoencoder
Mask and Restore: Blind Backdoor Defense at Test Time with Masked Autoencoder
Tao Sun
Lu Pang
Chao Chen
Haibin Ling
AAML
43
9
0
27 Mar 2023
Black-box Backdoor Defense via Zero-shot Image Purification
Black-box Backdoor Defense via Zero-shot Image Purification
Yucheng Shi
Mengnan Du
Xuansheng Wu
Zihan Guan
Jin Sun
Ninghao Liu
40
28
0
21 Mar 2023
Single Image Backdoor Inversion via Robust Smoothed Classifiers
Single Image Backdoor Inversion via Robust Smoothed Classifiers
Mingjie Sun
Zico Kolter
AAML
18
12
0
01 Mar 2023
Enhancing Modality-Agnostic Representations via Meta-Learning for Brain
  Tumor Segmentation
Enhancing Modality-Agnostic Representations via Meta-Learning for Brain Tumor Segmentation
Aishik Konwer
Xiaoling Hu
Joseph Bae
Xuanang Xu
Chaoyu Chen
Prateek Prasanna
29
16
0
08 Feb 2023
SCALE-UP: An Efficient Black-box Input-level Backdoor Detection via
  Analyzing Scaled Prediction Consistency
SCALE-UP: An Efficient Black-box Input-level Backdoor Detection via Analyzing Scaled Prediction Consistency
Junfeng Guo
Yiming Li
Xun Chen
Hanqing Guo
Lichao Sun
Cong Liu
AAML
MLAU
21
95
0
07 Feb 2023
Distilling Cognitive Backdoor Patterns within an Image
Distilling Cognitive Backdoor Patterns within an Image
Hanxun Huang
Xingjun Ma
S. Erfani
James Bailey
AAML
34
24
0
26 Jan 2023
Look, Listen, and Attack: Backdoor Attacks Against Video Action
  Recognition
Look, Listen, and Attack: Backdoor Attacks Against Video Action Recognition
Hasan Hammoud
Shuming Liu
Mohammad Alkhrashi
Fahad Albalawi
Guohao Li
AAML
32
8
0
03 Jan 2023
Trap and Replace: Defending Backdoor Attacks by Trapping Them into an
  Easy-to-Replace Subnetwork
Trap and Replace: Defending Backdoor Attacks by Trapping Them into an Easy-to-Replace Subnetwork
Haotao Wang
Junyuan Hong
Aston Zhang
Jiayu Zhou
Zhangyang Wang
AAML
44
12
0
12 Oct 2022
Attention Hijacking in Trojan Transformers
Attention Hijacking in Trojan Transformers
Weimin Lyu
Songzhu Zheng
Teng Ma
Haibin Ling
Chao Chen
35
6
0
09 Aug 2022
Learning Topological Interactions for Multi-Class Medical Image
  Segmentation
Learning Topological Interactions for Multi-Class Medical Image Segmentation
Saumya Gupta
Xiaoling Hu
James H. Kaan
Michael Jin
M. Mpoy
...
Tahsin M. Kurc
Joel H. Saltz
A. Tassiopoulos
Prateek Prasanna
Chao Chen
24
42
0
20 Jul 2022
On the Convergence of Optimizing Persistent-Homology-Based Losses
On the Convergence of Optimizing Persistent-Homology-Based Losses
Yikai Zhang
Jiacheng Yao
Yusu Wang
Chao Chen
18
1
0
06 Jun 2022
Learning Probabilistic Topological Representations Using Discrete Morse
  Theory
Learning Probabilistic Topological Representations Using Discrete Morse Theory
Xiaoling Hu
Dimitris Samaras
Chao Chen
18
20
0
03 Jun 2022
Towards a Defense Against Federated Backdoor Attacks Under Continuous
  Training
Towards a Defense Against Federated Backdoor Attacks Under Continuous Training
Shuai Wang
J. Hayase
Giulia Fanti
Sewoong Oh
FedML
26
5
0
24 May 2022
A Study of the Attention Abnormality in Trojaned BERTs
A Study of the Attention Abnormality in Trojaned BERTs
Weimin Lyu
Songzhu Zheng
Teng Ma
Chao Chen
51
56
0
13 May 2022
Wild Patterns Reloaded: A Survey of Machine Learning Security against
  Training Data Poisoning
Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning
Antonio Emanuele Cinà
Kathrin Grosse
Ambra Demontis
Sebastiano Vascon
Werner Zellinger
Bernhard A. Moser
Alina Oprea
Battista Biggio
Marcello Pelillo
Fabio Roli
AAML
22
116
0
04 May 2022
CatchBackdoor: Backdoor Detection via Critical Trojan Neural Path
  Fuzzing
CatchBackdoor: Backdoor Detection via Critical Trojan Neural Path Fuzzing
Haibo Jin
Ruoxi Chen
Jinyin Chen
Haibin Zheng
Yang Zhang
Haohan Wang
AAML
26
1
0
24 Dec 2021
Backdoor Learning: A Survey
Backdoor Learning: A Survey
Yiming Li
Yong Jiang
Zhifeng Li
Shutao Xia
AAML
45
586
0
17 Jul 2020
SentiNet: Detecting Localized Universal Attacks Against Deep Learning
  Systems
SentiNet: Detecting Localized Universal Attacks Against Deep Learning Systems
Edward Chou
Florian Tramèr
Giancarlo Pellegrino
AAML
168
287
0
02 Dec 2018
Statistical topological data analysis using persistence landscapes
Statistical topological data analysis using persistence landscapes
Peter Bubenik
112
846
0
27 Jul 2012
1