2023 |
NeurIPS 2023 |
Label Poisoning is All You Need |
|
2023 |
ICCV 2023 |
Computation and Data Efficient Backdoor Attacks |
|
2023 |
arXiv |
Boosting backdoor attack with a learnable poisoning sample selection strategy |
|
2023 |
arXiv |
Robust Backdoor Attack with Visible, Semantic, Sample-Specific, and Compatible Triggers |
|
2023 |
CVPR 2023 |
Architectural Backdoors in Neural Networks |
|
2023 |
CVPR 2023 |
Color Backdoor: A Robust Poisoning Attack in Color Space |
|
2023 |
CVPR 2023 |
You Are Catching My Attention: Are Vision Transformers Bad Learners Under Backdoor Attacks? |
|
2023 |
CVPR 2023 |
The Dark Side of Dynamic Routing Neural Networks: Towards Efficiency Backdoor Injection |
|
2023 |
CVPR 2023 |
Backdoor Attacks Against Deep Image Compression via Adaptive Frequency Trigger |
|
2023 |
ICLR 2023 |
Revisiting the Assumption of Latent Separability for Backdoor Defenses |
|
2023 |
ICLR 2023 |
Few-shot Backdoor Attacks via Neural Tangent Kernels |
|
2023 |
ICLR 2023 |
The Dark Side of AutoML: Towards Architectural Backdoor Search |
|
2023 |
ICLR 2023 |
Clean-image Backdoor: Attacking Multi-label Models with Poisoned Labels Only |
|
2022 |
AAAI 2022 |
Backdoor Attacks on the DNN Interpretation System |
|
2022 |
AAAI 2022 |
Faster Algorithms for Weak Backdoors |
|
2022 |
AAAI 2022 |
Finding Backdoors to Integer Programs: A Monte Carlo Tree Search Framework |
|
2022 |
AAAI 2022 |
Hibernated Backdoor: A Mutual Information Empowered Backdoor Attack to Deep Neural Networks |
|
2022 |
AAAI 2022 |
On Probabilistic Generalization of Backdoors in Boolean Satisfiability |
|
2022 |
CCS 2022 |
Backdoor Attacks on Spiking NNs and Neuromorphic Datasets |
|
2022 |
CCS 2022 |
LoneNeuron: A Highly-Effective Feature-Domain Neural Trojan Using Invisible and Polymorphic Watermarks |
|
2022 |
CVPR 2022 |
BppAttack: Stealthy and Efficient Trojan Attacks against Deep Neural Networks via Image Quantization and Contrastive Adversarial Learning |
|
2022 |
CVPR 2022 |
DEFEAT: Deep Hidden Feature Backdoor Attacks by Imperceptible Perturbation and Latent Representation Constraints |
|
2022 |
CVPR 2022 |
FIBA: Frequency-Injection based Backdoor Attack in Medical Image Analysis |
|
2022 |
CVPR 2022 |
Towards Practical Deployment-Stage Backdoor Attack on Deep Neural Networks. |
|
2022 |
ECCV 2022 |
An Invisible Black-Box Backdoor Attack Through Frequency Domain |
|
2022 |
ECCV 2022 |
RIBAC: Towards Robust and Imperceptible Backdoor Attack against Compact DNN |
|
2022 |
EUROSP 2022 |
Dynamic Backdoor Attacks Against Machine Learning Models |
|
2022 |
ICASSP 2022 |
Invisible and Efficient Backdoor Attacks for Compressed Deep Neural Networks |
|
2022 |
ICASSP 2022 |
Stealthy Backdoor Attack with Adversarial Training |
|
2022 |
ICASSP 2022 |
When Does Backdoor Attack Succeed in Image Reconstruction? A Study of Heuristics vs. Bi-Level Solution |
|
2022 |
ICLR 2022 |
How to Inject Backdoors with Better Consistency: Logit Anchoring on Clean Data |
|
2022 |
IJCAI 2022 |
Data-Efficient Backdoor Attacks |
|
2022 |
IJCAI 2022 |
Imperceptible Backdoor Attack: From Input Space to Feature Representation |
|
2022 |
MM 2022 |
BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label |
|
2022 |
NeurIPS 2022 |
Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class |
|
2022 |
NeurIPS 2022 |
Handcrafted Backdoors in Deep Neural Networks |
|
2022 |
NeurIPS 2022 |
Sleeper Agent: Scalable Hidden Trigger Backdoors for Neural Networks Trained from Scratch |
|
2022 |
TDSC 2022 |
One-to-N & N-to-One: Two Advanced Backdoor Attacks Against Deep Learning Models |
|
2022 |
TIFS 2022 |
Dispersed Pixel Perturbation-Based Imperceptible Backdoor Trigger for Image Classifier Models |
|
2022 |
TIFS 2022 |
Stealthy Backdoors as Compression Artifacts |
|
2022 |
TIP 2022 |
Poison Ink: Robust and Invisible Backdoor Attack |
|
2021 |
AAAI 2021 |
Backdoor Decomposable Monotone Circuits and Propagation Complete Encodings |
|
2021 |
AAAI 2021 |
Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification |
|
2021 |
CVPR 2021 |
Backdoor Attacks Against Deep Learning Systems in the Physical World |
|
2021 |
ICCV 2021 |
CLEAR: Clean-up Sample-Targeted Backdoor in Neural Networks |
|
2021 |
ICCV 2021 |
Invisible Backdoor Attack with Sample-Specific Triggers |
|
2021 |
ICCV 2021 |
LIRA: Learnable, Imperceptible and Robust Backdoor Attacks |
|
2021 |
ICCV 2021 |
Rethinking the Backdoor Attacks' Triggers: A Frequency Perspective |
|
2021 |
ICLR 2021 |
WaNet - Imperceptible Warping-based Backdoor Attack |
|
2021 |
ICML 2021 |
Just How Toxic is Data Poisoning? A Unified Benchmark for Backdoor and Data Poisoning Attacks |
|
2021 |
IJCAI 2021 |
Backdoor DNFs |
|
2021 |
NeurIPS 2021 |
Backdoor Attack with Imperceptible Input and Latent Modification |
|
2021 |
NeurIPS 2021 |
Excess Capacity and Backdoor Poisoning |
|
2021 |
TDSC 2021 |
Invisible Backdoor Attacks on Deep Neural Networks Via Steganography and Regularization |
|
2021 |
USS 2021 |
Blind Backdoors in Deep Learning Models |
|
2020 |
AAAI 2020 |
Hidden Trigger Backdoor Attacks |
|
2020 |
CCS 2020 |
Composite Backdoor Attack for Deep Neural Network by Mixing Existing Benign Features |
|
2020 |
CIKM 2020 |
Can Adversarial Weight Perturbations Inject Neural Backdoors |
|
2020 |
CVPR 2020 |
Clean-Label Backdoor Attacks on Video Recognition Models |
|
2020 |
ECCV 2020 |
Reflection Backdoor: A Natural Backdoor Attack on Deep Neural Networks |
|
2020 |
KDD 2020 |
An Embarrassingly Simple Approach for Trojan Attack in Deep Neural Networks |
|
2020 |
MM 2020 |
GangSweep: Sweep out Neural Backdoors by GAN |
|
2020 |
NeurIPS 2020 |
Input-Aware Dynamic Backdoor Attack |
|
2020 |
NeurIPS 2020 |
On the Trade-off between Adversarial and Backdoor Robustness |
|
2019 |
CCS 2019 |
Latent Backdoor Attacks on Deep Neural Networks |
|
2018 |
NDSS 2018 |
Trojaning Attack on Neural Networks |
|