ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2303.12175
  4. Cited By
Black-box Backdoor Defense via Zero-shot Image Purification

Black-box Backdoor Defense via Zero-shot Image Purification

21 March 2023
Yucheng Shi
Mengnan Du
Xuansheng Wu
Zihan Guan
Jin Sun
Ninghao Liu
ArXivPDFHTML

Papers citing "Black-box Backdoor Defense via Zero-shot Image Purification"

21 / 21 papers shown
Title
Towards Trustworthy GUI Agents: A Survey
Towards Trustworthy GUI Agents: A Survey
Yucheng Shi
Wenhao Yu
Wenlin Yao
Wenhu Chen
Ninghao Liu
52
4
0
30 Mar 2025
BadToken: Token-level Backdoor Attacks to Multi-modal Large Language Models
BadToken: Token-level Backdoor Attacks to Multi-modal Large Language Models
Zenghui Yuan
Jiawen Shi
Pan Zhou
Neil Zhenqiang Gong
Lichao Sun
AAML
70
1
0
20 Mar 2025
Poisoned-MRAG: Knowledge Poisoning Attacks to Multimodal Retrieval Augmented Generation
Yinuo Liu
Zenghui Yuan
Guiyao Tie
Jiawen Shi
Lichao Sun
Lichao Sun
Neil Zhenqiang Gong
53
1
0
08 Mar 2025
REFINE: Inversion-Free Backdoor Defense via Model Reprogramming
REFINE: Inversion-Free Backdoor Defense via Model Reprogramming
Yuxiao Chen
Shuo Shao
Enhao Huang
Yiming Li
Pin-Yu Chen
Zhanyue Qin
Kui Ren
AAML
61
3
0
22 Feb 2025
CopyrightShield: Spatial Similarity Guided Backdoor Defense against
  Copyright Infringement in Diffusion Models
CopyrightShield: Spatial Similarity Guided Backdoor Defense against Copyright Infringement in Diffusion Models
Zhixiang Guo
Siyuan Liang
Aishan Liu
Dacheng Tao
AAML
86
1
0
02 Dec 2024
LADDER: Multi-objective Backdoor Attack via Evolutionary Algorithm
LADDER: Multi-objective Backdoor Attack via Evolutionary Algorithm
Dazhuang Liu
Yanqi Qiao
Rui Wang
K. Liang
Georgios Smaragdakis
AAML
82
0
0
28 Nov 2024
Defending Text-to-image Diffusion Models: Surprising Efficacy of Textual
  Perturbations Against Backdoor Attacks
Defending Text-to-image Diffusion Models: Surprising Efficacy of Textual Perturbations Against Backdoor Attacks
Oscar Chew
Po-Yi Lu
Jayden Lin
Hsuan-Tien Lin
AAML
49
4
0
28 Aug 2024
Diffusion-based Adversarial Purification for Intrusion Detection
Diffusion-based Adversarial Purification for Intrusion Detection
Mohamed Amine Merzouk
Erwan Beurier
Reda Yaich
Nora Boulahia-Cuppens
Frédéric Cuppens
AAML
39
0
0
25 Jun 2024
Breaking the False Sense of Security in Backdoor Defense through
  Re-Activation Attack
Breaking the False Sense of Security in Backdoor Defense through Re-Activation Attack
Mingli Zhu
Siyuan Liang
Baoyuan Wu
AAML
52
14
0
25 May 2024
BDetCLIP: Multimodal Prompting Contrastive Test-Time Backdoor Detection
BDetCLIP: Multimodal Prompting Contrastive Test-Time Backdoor Detection
Yuwei Niu
Shuo He
Qinglai Wei
Feng Liu
Lei Feng
AAML
37
2
0
24 May 2024
Efficient Availability Attacks against Supervised and Contrastive
  Learning Simultaneously
Efficient Availability Attacks against Supervised and Contrastive Learning Simultaneously
Yihan Wang
Yifan Zhu
Xiao-Shan Gao
AAML
41
6
0
06 Feb 2024
BackdoorBench: A Comprehensive Benchmark and Analysis of Backdoor
  Learning
BackdoorBench: A Comprehensive Benchmark and Analysis of Backdoor Learning
Baoyuan Wu
Hongrui Chen
Ruotong Wang
Zihao Zhu
Shaokui Wei
Danni Yuan
Mingli Zhu
Ke Xu
Li Liu
Chaoxiao Shen
AAML
ELM
78
10
0
26 Jan 2024
Defenses in Adversarial Machine Learning: A Survey
Defenses in Adversarial Machine Learning: A Survey
Baoyuan Wu
Shaokui Wei
Mingli Zhu
Meixi Zheng
Zihao Zhu
Ruotong Wang
Hongrui Chen
Danni Yuan
Li Liu
Qingshan Liu
AAML
37
14
0
13 Dec 2023
Trustworthy Large Models in Vision: A Survey
Trustworthy Large Models in Vision: A Survey
Ziyan Guo
Li Xu
Jun Liu
MU
66
0
0
16 Nov 2023
From Trojan Horses to Castle Walls: Unveiling Bilateral Data Poisoning
  Effects in Diffusion Models
From Trojan Horses to Castle Walls: Unveiling Bilateral Data Poisoning Effects in Diffusion Models
Zhuoshi Pan
Yuguang Yao
Gaowen Liu
Bingquan Shen
H. Vicky Zhao
Ramana Rao Kompella
Sijia Liu
DiffM
AAML
40
3
0
04 Nov 2023
Mask and Restore: Blind Backdoor Defense at Test Time with Masked
  Autoencoder
Mask and Restore: Blind Backdoor Defense at Test Time with Masked Autoencoder
Tao Sun
Lu Pang
Chao Chen
Haibin Ling
AAML
48
9
0
27 Mar 2023
TrojText: Test-time Invisible Textual Trojan Insertion
TrojText: Test-time Invisible Textual Trojan Insertion
Qiang Lou
Ye Liu
Bo Feng
44
23
0
03 Mar 2023
Diffusion Models for Adversarial Purification
Diffusion Models for Adversarial Purification
Weili Nie
Brandon Guo
Yujia Huang
Chaowei Xiao
Arash Vahdat
Anima Anandkumar
WIGM
221
424
0
16 May 2022
Few-Shot Backdoor Attacks on Visual Object Tracking
Few-Shot Backdoor Attacks on Visual Object Tracking
Yiming Li
Haoxiang Zhong
Xingjun Ma
Yong Jiang
Shutao Xia
AAML
38
53
0
31 Jan 2022
Denoising Diffusion Restoration Models
Denoising Diffusion Restoration Models
Bahjat Kawar
Michael Elad
Stefano Ermon
Jiaming Song
DiffM
220
795
0
27 Jan 2022
Clean-Label Backdoor Attacks on Video Recognition Models
Clean-Label Backdoor Attacks on Video Recognition Models
Shihao Zhao
Xingjun Ma
Xiang Zheng
James Bailey
Jingjing Chen
Yu-Gang Jiang
AAML
200
252
0
06 Mar 2020
1