Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
2204.09975
Cited By
v1
v2 (latest)
Eliminating Backdoor Triggers for Deep Neural Networks Using Attention Relation Graph Distillation
21 April 2022
Jun Xia
Ting Wang
Jiepin Ding
Xian Wei
Mingsong Chen
AAML
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"Eliminating Backdoor Triggers for Deep Neural Networks Using Attention Relation Graph Distillation"
18 / 18 papers shown
Title
BadScan: An Architectural Backdoor Attack on Visual State Space Models
Om Suhas Deshmukh
Sankalp Nagaonkar
A. Tripathi
Ashish Mishra
Mamba
126
0
0
26 Nov 2024
Understanding the Gains from Repeated Self-Distillation
Divyansh Pareek
Simon S. Du
Sewoong Oh
109
6
0
05 Jul 2024
NBA: defensive distillation for backdoor removal via neural behavior alignment
Zonghao Ying
Bin Wu
AAML
50
10
0
16 Jun 2024
Mutual Information Guided Backdoor Mitigation for Pre-trained Encoders
Tingxu Han
Weisong Sun
Ziqi Ding
Chunrong Fang
Hanwei Qian
Jiaxun Li
Zhenyu Chen
Xiangyu Zhang
AAML
95
7
0
05 Jun 2024
Robust Knowledge Distillation Based on Feature Variance Against Backdoored Teacher Model
Jinyin Chen
Xiaoming Zhao
Haibin Zheng
Xiao Li
Sheng Xiang
Haifeng Guo
AAML
50
5
0
01 Jun 2024
Invisible Backdoor Attack Through Singular Value Decomposition
Wenmin Chen
Xiaowei Xu
AAML
70
1
0
18 Mar 2024
On the Effectiveness of Distillation in Mitigating Backdoors in Pre-trained Encoder
Tingxu Han
Shenghan Huang
Ziqi Ding
Weisong Sun
Yebo Feng
...
Hanwei Qian
Cong Wu
Quanjun Zhang
Yang Liu
Zhenyu Chen
54
8
0
06 Mar 2024
BackdoorBench: A Comprehensive Benchmark and Analysis of Backdoor Learning
Baoyuan Wu
Hongrui Chen
Ruotong Wang
Zihao Zhu
Shaokui Wei
Danni Yuan
Mingli Zhu
Ke Xu
Li Liu
Chaoxiao Shen
AAML
ELM
127
11
0
26 Jan 2024
Label Poisoning is All You Need
Rishi Jha
J. Hayase
Sewoong Oh
AAML
86
31
0
29 Oct 2023
WaveAttack: Asymmetric Frequency Obfuscation-based Backdoor Attacks Against Deep Neural Networks
Jun Xia
Zhihao Yue
Yingbo Zhou
Zhiwei Ling
Xian Wei
Mingsong Chen
AAML
58
1
0
17 Oct 2023
Leveraging Diffusion-Based Image Variations for Robust Training on Poisoned Data
Lukas Struppek
Martin Hentschel
Clifton A. Poth
Dominik Hintersdorf
Kristian Kersting
SILM
DiffM
54
4
0
10 Oct 2023
Temporal-Distributed Backdoor Attack Against Video Based Action Recognition
Xi Li
Songhe Wang
Rui Huang
Mahanth K. Gowda
G. Kesidis
AAML
111
6
0
21 Aug 2023
Backdoor Mitigation by Correcting the Distribution of Neural Activations
Xi Li
Zhen Xiang
David J. Miller
G. Kesidis
AAML
48
0
0
18 Aug 2023
Backdoor Attacks against Voice Recognition Systems: A Survey
Baochen Yan
Jiahe Lan
Zheng Yan
AAML
80
12
0
23 Jul 2023
Privacy Inference-Empowered Stealthy Backdoor Attack on Federated Learning under Non-IID Scenarios
Haochen Mei
Gaolei Li
Jun Wu
Longfei Zheng
SILM
AAML
81
12
0
13 Jun 2023
SATBA: An Invisible Backdoor Attack Based On Spatial Attention
Huasong Zhou
Xiaowei Xu
Zhenyu Wang
Leon Bevan Bullock
AAML
75
2
0
25 Feb 2023
SCALE-UP: An Efficient Black-box Input-level Backdoor Detection via Analyzing Scaled Prediction Consistency
Junfeng Guo
Yiming Li
Xun Chen
Hanqing Guo
Lichao Sun
Cong Liu
AAML
MLAU
89
110
0
07 Feb 2023
Backdoor Cleansing with Unlabeled Data
Lu Pang
Tao Sun
Haibin Ling
Chao Chen
AAML
118
19
0
22 Nov 2022
1