ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2204.09975
  4. Cited By
Eliminating Backdoor Triggers for Deep Neural Networks Using Attention
  Relation Graph Distillation
v1v2 (latest)

Eliminating Backdoor Triggers for Deep Neural Networks Using Attention Relation Graph Distillation

21 April 2022
Jun Xia
Ting Wang
Jiepin Ding
Xian Wei
Mingsong Chen
    AAML
ArXiv (abs)PDFHTML

Papers citing "Eliminating Backdoor Triggers for Deep Neural Networks Using Attention Relation Graph Distillation"

18 / 18 papers shown
Title
BadScan: An Architectural Backdoor Attack on Visual State Space Models
BadScan: An Architectural Backdoor Attack on Visual State Space Models
Om Suhas Deshmukh
Sankalp Nagaonkar
A. Tripathi
Ashish Mishra
Mamba
126
0
0
26 Nov 2024
Understanding the Gains from Repeated Self-Distillation
Understanding the Gains from Repeated Self-Distillation
Divyansh Pareek
Simon S. Du
Sewoong Oh
109
6
0
05 Jul 2024
NBA: defensive distillation for backdoor removal via neural behavior
  alignment
NBA: defensive distillation for backdoor removal via neural behavior alignment
Zonghao Ying
Bin Wu
AAML
50
10
0
16 Jun 2024
Mutual Information Guided Backdoor Mitigation for Pre-trained Encoders
Mutual Information Guided Backdoor Mitigation for Pre-trained Encoders
Tingxu Han
Weisong Sun
Ziqi Ding
Chunrong Fang
Hanwei Qian
Jiaxun Li
Zhenyu Chen
Xiangyu Zhang
AAML
95
7
0
05 Jun 2024
Robust Knowledge Distillation Based on Feature Variance Against
  Backdoored Teacher Model
Robust Knowledge Distillation Based on Feature Variance Against Backdoored Teacher Model
Jinyin Chen
Xiaoming Zhao
Haibin Zheng
Xiao Li
Sheng Xiang
Haifeng Guo
AAML
52
5
0
01 Jun 2024
Invisible Backdoor Attack Through Singular Value Decomposition
Invisible Backdoor Attack Through Singular Value Decomposition
Wenmin Chen
Xiaowei Xu
AAML
70
1
0
18 Mar 2024
On the Effectiveness of Distillation in Mitigating Backdoors in
  Pre-trained Encoder
On the Effectiveness of Distillation in Mitigating Backdoors in Pre-trained Encoder
Tingxu Han
Shenghan Huang
Ziqi Ding
Weisong Sun
Yebo Feng
...
Hanwei Qian
Cong Wu
Quanjun Zhang
Yang Liu
Zhenyu Chen
54
8
0
06 Mar 2024
BackdoorBench: A Comprehensive Benchmark and Analysis of Backdoor
  Learning
BackdoorBench: A Comprehensive Benchmark and Analysis of Backdoor Learning
Baoyuan Wu
Hongrui Chen
Ruotong Wang
Zihao Zhu
Shaokui Wei
Danni Yuan
Mingli Zhu
Ke Xu
Li Liu
Chaoxiao Shen
AAMLELM
127
11
0
26 Jan 2024
Label Poisoning is All You Need
Label Poisoning is All You Need
Rishi Jha
J. Hayase
Sewoong Oh
AAML
86
31
0
29 Oct 2023
WaveAttack: Asymmetric Frequency Obfuscation-based Backdoor Attacks
  Against Deep Neural Networks
WaveAttack: Asymmetric Frequency Obfuscation-based Backdoor Attacks Against Deep Neural Networks
Jun Xia
Zhihao Yue
Yingbo Zhou
Zhiwei Ling
Xian Wei
Mingsong Chen
AAML
58
1
0
17 Oct 2023
Leveraging Diffusion-Based Image Variations for Robust Training on
  Poisoned Data
Leveraging Diffusion-Based Image Variations for Robust Training on Poisoned Data
Lukas Struppek
Martin Hentschel
Clifton A. Poth
Dominik Hintersdorf
Kristian Kersting
SILMDiffM
54
4
0
10 Oct 2023
Temporal-Distributed Backdoor Attack Against Video Based Action
  Recognition
Temporal-Distributed Backdoor Attack Against Video Based Action Recognition
Xi Li
Songhe Wang
Rui Huang
Mahanth K. Gowda
G. Kesidis
AAML
111
6
0
21 Aug 2023
Backdoor Mitigation by Correcting the Distribution of Neural Activations
Backdoor Mitigation by Correcting the Distribution of Neural Activations
Xi Li
Zhen Xiang
David J. Miller
G. Kesidis
AAML
50
0
0
18 Aug 2023
Backdoor Attacks against Voice Recognition Systems: A Survey
Backdoor Attacks against Voice Recognition Systems: A Survey
Baochen Yan
Jiahe Lan
Zheng Yan
AAML
80
12
0
23 Jul 2023
Privacy Inference-Empowered Stealthy Backdoor Attack on Federated
  Learning under Non-IID Scenarios
Privacy Inference-Empowered Stealthy Backdoor Attack on Federated Learning under Non-IID Scenarios
Haochen Mei
Gaolei Li
Jun Wu
Longfei Zheng
SILMAAML
81
12
0
13 Jun 2023
SATBA: An Invisible Backdoor Attack Based On Spatial Attention
SATBA: An Invisible Backdoor Attack Based On Spatial Attention
Huasong Zhou
Xiaowei Xu
Zhenyu Wang
Leon Bevan Bullock
AAML
75
2
0
25 Feb 2023
SCALE-UP: An Efficient Black-box Input-level Backdoor Detection via
  Analyzing Scaled Prediction Consistency
SCALE-UP: An Efficient Black-box Input-level Backdoor Detection via Analyzing Scaled Prediction Consistency
Junfeng Guo
Yiming Li
Xun Chen
Hanqing Guo
Lichao Sun
Cong Liu
AAMLMLAU
89
110
0
07 Feb 2023
Backdoor Cleansing with Unlabeled Data
Backdoor Cleansing with Unlabeled Data
Lu Pang
Tao Sun
Haibin Ling
Chao Chen
AAML
118
19
0
22 Nov 2022
1