- Backdoor Learning Papers
- Other Research Topics
- Backdoor Learning Papers with Code
- Data Sources
- Contributing
- Support
This GitHub repository contains an updated list of Backdoor Learning papers as of December 03, 2025.
- Total Papers: Updated regularly with latest publications
- Coverage: Papers from 2016 to present
- Sources: Collected from arXiv, NeurIPS, ICML, ICLR, ACL, EMNLP, AAAI, IJCAI, KDD, CVPR, ICCV, ECCV, IEEE, ACM, Springer, ScienceDirect, Nature, and other top AI/ML conferences and journals
- Interactive Search: For a better reading experience, visit the Shinyapps website
- 📊 Comprehensive Coverage: Papers from major AI/ML venues
- 🔍 Advanced Search: Filter by title, author, venue, year
- 📅 Regular Updates: Automated collection of new papers
- 💻 Code Availability: Identifies papers with available code
- 📈 Trending Research: Focus on cutting-edge developments
Explore additional research papers on the following topics:
- Large Language Models - LLM research and applications
- Federated Learning - Distributed machine learning
- Backdoor Learning - Adversarial machine learning
- Machine Unlearning - Data removal and privacy
- Serverless Computing - Cloud computing architectures
- Multi-Modal Learning - Multi-modal AI systems
- Research Papers App - Search and explore all papers
- Paper Collections - Main repository with all datasets
The papers are collected from the following sources:
- arXiv (1991-present) - Preprints and published papers
- OpenReview - Conference submissions and peer reviews
- ACM Digital Library - Computer science publications
- Springer - Academic journals and conferences
- ScienceDirect - Elsevier publications
- Nature - High-impact research papers
- DBLP - Computer science bibliography
- Google Scholar - Academic search engine
- CrossRef - DOI registration agency
- OpenAlex - Open scholarly data
- Machine Learning: NeurIPS, ICML, ICLR, JMLR, TMLR
- Natural Language Processing: ACL, EMNLP, NAACL, COLING
- Computer Vision: CVPR, ICCV, ECCV, PAMI, IJCV
- Artificial Intelligence: AAAI, IJCAI, AAMAS
- Data Mining: KDD, ICDM, SDM, TKDD
- Security & Privacy: CCS, USENIX Security, NDSS
- And many more...
Due to GitHub repository limitations, this section includes only those papers that provide accompanying code, sorted by publication date. For access to the full list of papers, please visit the Shinyapps website.
We welcome contributions to improve this paper collection:
- Add Missing Papers: Submit papers that should be included
- Improve Metadata: Help enhance paper information
- Report Issues: Identify bugs or missing features
- Suggest Improvements: Propose new features or enhancements
- Email: tuannm0312@gmail.com
- GitHub Issues: Create an issue
- Discussions: Join the discussion
If you find this application helpful and would like to support its development, you can buy me a coffee using one of the following methods:
- Techcombank (Vietnam): 5877 5555 55 (Nguyen Thi Lan Phuong)
- PayPal or Credit/Debit Card: https://ko-fi.com/miutheladycat
Your support helps maintain and improve:
- 🤖 Automated paper collection pipeline
- 🌐 Interactive web application
- 📊 Regular data updates
- 🔧 System maintenance and improvements
- 📚 New research area coverage
Note: This repository is regularly updated with new papers. For the most current data, check the Shinyapps website or the individual topic repositories linked above.
| No. | Title | Authors | Publish Date | Venue | Code | URL |
|---|---|---|---|---|---|---|
| 1 | Exploring Dynamic Properties of Backdoor Training Through Information Bottleneck | Liu Xin-yu, Zhang Xu, Chen Can, Wang Ren | 2025-11-26 | arXiv (Cornell University) | https://github.com/XinyuLiu71/Information_Bottleneck_Backdoor.git. | https://doi.org/10.48550/arxiv.2511.21923 |
| 2 | BackdoorVLM: A Benchmark for Backdoor Attacks on Vision-Language Models | Li Juncheng, Li Yige, Huang, Hanxun, Chen Yunhao, Wang Xin, Wang YiXu, Ma, Xingjun, Jiang, Yu-Gang | 2025-11-24 | arXiv (Cornell University) | https://github.com/bin015/BackdoorVLM | https://doi.org/10.48550/arxiv.2511.18921 |
| 3 | AutoBackdoor: Automating Backdoor Attacks via LLM Agents | Li, Yige, Li Zhe, Zhao Wei, Min, Nay Myat, Huang, Hanxun, Ma, Xingjun, Sun Jun | 2025-11-20 | arXiv (Cornell University) | https://github.com/bboylyg/BackdoorLLM. | https://doi.org/10.48550/arxiv.2511.16709 |
| 4 | Enhancing All-to-X Backdoor Attacks with Optimized Target Class Mapping | Wang Lei, Tian Yu-long, Han Hao, Xu Fengyuan | 2025-11-17 | arXiv (Cornell University) | https://github.com/kazefjj/A2X-backdoor | https://doi.org/10.48550/arxiv.2511.13356 |
| 5 | MTAttack: Multi-Target Backdoor Attacks against Large Vision-Language Models | Wang Zihan, Pang, Guansong, Miao Wenjun, Zheng Jin, Bai Xiao | 2025-11-13 | arXiv (Cornell University) | https://github.com/mala-lab/MTAttack. | https://doi.org/10.48550/arxiv.2511.10098 |
| 6 | Flareon: Stealthy all2all Backdoor Injection via Poisoned Augmentation | Tianrui Qin, Xuan Wang, Xianghuan He, Yiren Zhao, Kejiang Ye, Chengzhong Xu, Xitong Gao | 2025-11-03 | ACM Transactions on Knowledge Discovery from Data | https://github.com/lafeat/flareon. | https://openreview.net/pdf/8f5e6d6b8c53b5115dfb5e4950961efed881feaa.pdf |
| 7 | Forgetting to Forget: Attention Sink as A Gateway for Backdooring LLM Unlearning | Bingqi Shang, Yiwei Chen, Yihua Zhang, Bingquan Shen, Sijia Liu | 2025-10-19 | arXiv | https://github.com/OPTML-Group/Unlearn-Backdoor. | https://doi.org/10.48550/arXiv.2510.17021 |
| 8 | CTCC: A Robust and Stealthy Fingerprinting Framework for Large Language Models via Cross-Turn Contextual Correlation Backdoor | Association for Computational Linguistics 2025, Han Meng, Lin Changting, Tian Shengwei, Xu Zhenhua, Yue Xubin, Zhao Xi-x... | 2025-10-10 | Underline Science Inc. | https://github.com/Xuzhenhua55/CTCC | https://doi.org/10.48550/arXiv.2509.09703 |
| 9 | On the Out-of-Distribution Backdoor Attack for Federated Learning | Jin-Sen Xu, Zikai Zhang, Rui Hu | 2025-09-16 | OpenAlex | https://github.com/JiiahaoXU/SoDa-BNGuard. | https://doi.org/10.48550/arXiv.2509.13219 |
| 10 | PNAct: Crafting Backdoor Attacks in Safe Reinforcement Learning | Weiran Guo, Guanjun Liu, Ziyuan Zhou, Ling Wang | 2025-09-01 | OpenAlex | https://github.com/azure-123/PNAct. | https://doi.org/10.48550/arXiv.2507.00485 |
| 11 | FedDLAD: A Federated Learning Dual-Layer Anomaly Detection Framework for Enhancing Resilience Against Backdoor Attacks | Binbin Ding, Penghui Yang, Sheng-Jun Huang | 2025-09-01 | OpenAlex | https://github.com/dingbinb/FedDLAD. | https://doi.org/10.24963/ijcai.2025/559 |
| 12 | CABIN: Debiasing Vision-Language Models Using Backdoor Adjustments | B. Y. Pang, Tingrui Qiao, Caroline Walker, Chris Cunningham, Yun Sing Koh | 2025-09-01 | OpenAlex | https://github.com/ipangbo/causal-debias | https://doi.org/10.24963/ijcai.2025/55 |
| 13 | BackFed: An Efficient & Standardized Benchmark Suite for Backdoor Attacks in Federated Learning | Thinh Dao, Dung Thuy Nguyen, Khoa D. Doan, Kok-Seng Wong | 2025-07-01 | arXiv | https://github.com/thinh-dao/BackFed. | https://doi.org/10.48550/arXiv.2507.04903 |
| 14 | CLIP-Guided Backdoor Defense through Entropy-Based Poisoned Dataset Separation | Binyan Xu, Fan Yang, Xilin Dai, Di Tang, Kehuan Zhang | 2025-07-01 | OpenAlex | https://github.com/binyxu/CGD. | https://doi.org/10.48550/arXiv.2507.05113 |
| 15 | Invisible Backdoor Attack against Self-supervised Learning | Hanrong Zhang, Zhenting Wang, Boheng Li, Fulin Lin, Tingxu Han, Mingyu Jin, Chenlu Zhan, Mengnan Du, Hongwei Wang, Shiqi... | 2025-06-10 | 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) | https://github.com/Zhang-Henry/INACTIVE. | https://openaccess.thecvf.com/content/CVPR2025/html/Zhang_Invisible_Backdoor_Attack_against_Self-supervised_Learning_CVPR_2025_paper.html |
| 16 | TooBadRL: Trigger Optimization to Boost Effectiveness of Backdoor Attacks on Deep Reinforcement Learning | Songze Li, Mingxuan Zhang, Kang Wei, Shouling Ji | 2025-06-01 | arXiv | https://github.com/S3IC-Lab/TooBadRL. | https://doi.org/10.48550/arXiv.2506.09562 |
| 17 | Dynamic Attention Analysis for Backdoor Detection in Text-to-Image Diffusion Models | Zhongqi Wang, Jie Zhang, Shiguang Shan, Xilin Chen | 2025-04-01 | arXiv | https://github.com/Robin-WZQ/DAA. | https://doi.org/10.48550/arXiv.2504.20518 |
| 18 | Propaganda via AI? A Study on Semantic Backdoors in Large Language Models | Nay Myat Min, Long H. Pham, Yige Li, Jun Sun | 2025-04-01 | arXiv | https://github.com/NayMyatMin/RAVEN. | https://doi.org/10.48550/arXiv.2504.12344 |
| 19 | Detecting Backdoor Attacks in Federated Learning via Direction Alignment Inspection | Jiahao Xu, Zikai Zhang, Rui Hu | 2025-03-01 | 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) | https://github.com/JiiahaoXU/AlignIns. | https://openaccess.thecvf.com/content/CVPR2025/html/Xu_Detecting_Backdoor_Attacks_in_Federated_Learning_via_Direction_Alignment_Inspection_CVPR_2025_paper.html |
| 20 | CBW: Towards Dataset Ownership Verification for Speaker Verification via Clustering-based Backdoor Watermarking | Yiming Li, Kaiying Yan, Shuo Shao, Tongqing Zhai, Shu-Tao Xia, Zhan Qin, Dacheng Tao | 2025-03-01 | arXiv | https://github.com/Radiant0726/CBW | https://doi.org/10.48550/arXiv.2503.05794 |
| 21 | DemonAgent: Dynamically Encrypted Multi-Backdoor Implantation Attack on LLM-based Agent | Pengyu Zhu, Zhenhong Zhou, Yuanhe Zhang, Shilinlu Yan, Kun Wang, Sen Su | 2025-02-18 | arXiv | https://github.com/whfeLingYu/DemonAgent. | https://doi.org/10.48550/arXiv.2502.12575 |
| 22 | BackdoorDM: A Comprehensive Benchmark for Backdoor Learning in Diffusion Model | Weilin Lin, Nanjun Zhou, Yanyun Wang, Jianze Li, Hui Xiong, Li Liu | 2025-02-17 | arXiv | https://github.com/linweiii/BackdoorDM. | https://doi.org/10.48550/arXiv.2502.11798 |
| 23 | BoT: Breaking Long Thought Processes of o1-like Large Language Models through Backdoor Attack | Zihao Zhu, Hongbao Zhang, Mingda Zhang, Ruotong Wang, Guanzong Wu, Ke Xu, Baoyuan Wu | 2025-02-16 | arXiv | https://github.com/zihao-ai/BoT | https://doi.org/10.48550/arXiv.2502.12202 |
| 24 | Revisiting the Auxiliary Data in Backdoor Purification | Shaokui Wei, Shanchao Yang, Jiayin Liu, Hongyuan Zha | 2025-02-10 | arXiv | https://github.com/shawkui/BackdoorBenchER. | https://doi.org/10.48550/arXiv.2502.07231 |
| 25 | BadRefSR: Backdoor Attacks Against Reference-based Image Super Resolution | Xue Yang, Tao Chen, Lei Guo, Wenbo Jiang, Ji Guo, Yongming Li, Jiaming He | 2025-02-01 | ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) | https://github.com/xuefusiji/BadRefSR. | https://doi.org/10.1109/icassp49660.2025.10889523 |
| 26 | Char-mander Use mBackdoor! A Study of Cross-lingual Backdoor Attacks in Multilingual LLMs | Himanshu Beniwal, Sailesh Panda, Birudugadda Srivibhav, Mayank Singh | 2025-02-01 | arXiv | https://github.com/himanshubeniwal/X-BAT. | https://doi.org/10.48550/arXiv.2502.16901 |
| 27 | Detecting Backdoor Samples in Contrastive Language Image Pretraining | Hanxun Huang, Sarah Monazam Erfani, Yige Li, Xingjun Ma, James Bailey | 2025-02-01 | arXiv | https://github.com/HanxunH/Detect-CLIP-Backdoor-Samples | https://openreview.net/forum?id=KmQEsIfhr9 |
| 28 | Gungnir: Exploiting Stylistic Features in Images for Backdoor Attacks on Diffusion Models | Yu Pan, Jiahao Chen, Bingrong Dai, Lin Wang, Yi Du, Jiao Liu | 2025-02-01 | arXiv | https://github.com/paoche11/Gungnir. | https://doi.org/10.48550/arXiv.2502.20650 |
| 29 | UNIDOOR: A Universal Framework for Action-Level Backdoor Attacks in Deep Reinforcement Learning | Oubo Ma, Linkang Du, Yang Dai, Chunyi Zhou, Qingming Li, Yuwen Pu, Shouling Ji | 2025-01-26 | arXiv | https://github.com/maoubo/UNIDOOR. | https://doi.org/10.48550/arXiv.2501.15529 |
| 30 | Vertical Federated Unlearning via Backdoor Certification | Mengde Han, Tianqing Zhu, Lefeng Zhang, Huan Huo, Wanlei Zhou | 2025-01-01 | IEEE Transactions on Services Computing | https://github.com/mengde-han/VFL-unlearn. | https://doi.org/10.48550/arXiv.2412.11476 |
| 31 | UFID: A Unified Framework for Black-box Input-level Backdoor Detection on Diffusion Models | Zihan Guan, Mengxuan Hu, Sheng Li, Anil Kumar S. Vullikanti | 2025-01-01 | Proceedings of the AAAI Conference on Artificial Intelligence | https://github.com/GuanZihan/official_UFID. | https://doi.org/10.1609/aaai.v39i26.34941 |
| 32 | ToxicTextCLIP: Text-Based Poisoning and Backdoor Attacks on CLIP Pre-training | Xin Yao, Haiyang Zhao, Yimin Chen, Jiawei Guo, Kecheng Huang, Ming Zhao | 2025-01-01 | arXiv | https://github.com/xinyaocse/ToxicTextCLIP | https://doi.org/10.48550/arXiv.2511.00446 |
| 33 | Towards Invisible Backdoor Attack on Text-to-Image Diffusion Model | Jie Zhang, Zhongqi Wang, Shiguang Shan, Xilin Chen | 2025-01-01 | arXiv | https://github.com/Robin-WZQ/IBA. | https://doi.org/10.48550/arXiv.2503.17724 |
| 34 | The Ripple Effect: On Unforeseen Complications of Backdoor Attacks | Rui Zhang, Yun Shen, Hongwei Li, Wenbo Jiang, Hanxiao Chen, Yuan Zhang, Guowen Xu, Yang Zhang | 2025-01-01 | arXiv | https://github.com/zhangrui4041/Backdoor_Complications. | https://doi.org/10.48550/arXiv.2505.11586 |
| 35 | Taught Well Learned Ill: Towards Distillation-conditional Backdoor Attack | Yukun Chen, Boheng Li, Yu Yuan, Leyi Qi, Yiming Li, Tianwei Zhang, Zhan Qin, Kui Ren | 2025-01-01 | arXiv | https://github.com/WhitolfChen/SCAR. | https://doi.org/10.48550/arXiv.2509.23871 |
| 36 | Invisible Backdoor Triggers in Image Editing Model via Deep Watermarking | Yu-Feng Chen, Tzuhsuan Huang, Pin-Yen Chiu, Jun-Cheng Chen | 2025-01-01 | arXiv | https://github.com/aiiu-lab/BackdoorImageEditing | https://doi.org/10.1109/AVSS65446.2025.11149824 |
| 37 | REFINE: Inversion-Free Backdoor Defense via Model Reprogramming | Yukun Chen, Shuo Shao, Enhao Huang, Yiming Li, Pin-Yu Chen, Zhan Qin, Kui Ren | 2025-01-01 | ICLR | https://github.com/THUYimingLi/BackdoorBox | https://openreview.net/forum?id=4IYdCws9fc |
| 38 | Exploring Backdoor Vulnerabilities of Chat Models | Wenkai Yang, Yunzhuo Hao, Yankai Lin | 2025-01-01 | COLING | https://github.com/hychaochao/Chat-Models-Backdoor-Attacking | https://aclanthology.org/2025.coling-main.62/ |
| 39 | FLARE: Towards Universal Dataset Purification against Backdoor Attacks | Linshan Hou, Wei Luo, Zhongyun Hua, Songhua Chen, Leo Yu Zhang, Yiming Li | 2025-01-01 | IEEE Transactions on Information Forensics and Security | https://github.com/THUYimingLi/BackdoorBox | https://doi.org/10.1109/TIFS.2025.3581719 |
| 40 | Energy Backdoor Attack to Deep Neural Networks | Hanene F. Z. Brachemi Meftah, Wassim Hamidouche, Sid Ahmed Fezza, Olivier Déforges, Kassem Kallas | 2025-01-01 | ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) | https://github.com/hbrachemi/energy_backdoor. | https://doi.org/10.1109/icassp49660.2025.10888330 |
| 41 | Claim-Guided Textual Backdoor Attack for Practical Applications | Minkyoo Song, Hanna Kim, Jaehan Kim, Youngjin Jin, Seungwon Shin | 2025-01-01 | Findings of the Association for Computational Linguistics: NAACL 2022 | https://github.com/PaperCGBA/CGBA. | https://doi.org/10.18653/v1/2025.findings-naacl.64 |
| 42 | Circumventing Backdoor Space via Weight Symmetry | Jie Peng, Hongwei Yang, Jing Zhao, Hengji Dong, Hui He, Weizhe Zhang, Haoyu He | 2025-01-01 | arXiv | https://github.com/JiePeng104/TSC. | https://doi.org/10.48550/arXiv.2506.07467 |
| 43 | Cert-SSB: Toward Certified Sample-Specific Backdoor Defense | Ting Qiao, Yingjia Wang, Xing Liu, Sixing Wu, Jianbing Li, Yiming Li | 2025-01-01 | arXiv | https://github.com/NcepuQiaoTing/Cert-SSB. | https://doi.org/10.48550/arXiv.2504.21730 |
| 44 | Backdooring Self-Supervised Contrastive Learning by Noisy Alignment | Tuo Chen, Jie Gui, Minjing Dong, Ju Jia, Lanting Fang, Jian Liu | 2025-01-01 | arXiv | https://github.com/jsrdcht/Noisy-Alignment. | https://doi.org/10.48550/arXiv.2508.14015 |
| 45 | Backdoor Token Unlearning: Exposing and Defending Backdoors in Pretrained Language Models | Peihai Jiang, Xixiang Lyu, Yige Li, Jing Ma | 2025-01-01 | Proceedings of the AAAI Conference on Artificial Intelligence | https://github.com/XDJPH/BTU. | https://doi.org/10.1609/aaai.v39i23.34605 |
| 46 | Gracefully Filtering Backdoor Samples for Generative Large Language Models without Retraining | Zongru Wu, Pengzhou Cheng, Lingyong Fang, Zhuosheng Zhang, Gongshen Liu | 2024-12-03 | COLING | https://github.com/ZrW00/GraceFul. | https://aclanthology.org/2025.coling-main.220/ |
| 47 | BadMerging: Backdoor Attacks Against Model Merging | Jinghuai Zhang, Jianfeng Chi, Zheng Li, Kunlin Cai, Yang Zhang, Yuan Tian | 2024-12-02 | OpenAlex | https://github.com/jzhang538/BadMerging. | https://doi.org/10.48550/arXiv.2408.07362 |
| 48 | Fisher Information guided Purification against Backdoor Attacks | Nazmul Karim, Abdullah Al Arafat, Adnan Siraj Rakin, Zhishan Guo, Nazanin Rahnavard | 2024-12-02 | OpenAlex | https://github.com/nazmul-karim170/FIP-Fisher-Backdoor-Removal | https://doi.org/10.48550/arXiv.2409.00863 |
| 49 | Backdoor Attacks against No-Reference Image Quality Assessment Models via a Scalable Trigger | Yi Yu, Song Xia, Xun Lin, Wenhan Yang, Shijian Lu, Yap‐Peng Tan, Alex C. Kot | 2024-12-01 | Proceedings of the AAAI Conference on Artificial Intelligence | https://github.com/yuyi-sd/BAIQA. | https://doi.org/10.48550/arXiv.2412.07277 |
| 50 | Invisible Textual Backdoor Attacks based on Dual-Trigger | Yang Hou, Qiuling Yue, Lujia Chai, Guozhao Liao, Wenbao Han, Wei Ou | 2024-12-01 | arXiv | https://github.com/HoyaAm/Double-Landmines. | http://arxiv.org/abs/2412.17531v3 |
| 51 | Perturb and Recover: Fine-tuning for Effective Backdoor Removal from CLIP | Naman Deep Singh, Francesco Croce, Matthias Hein | 2024-12-01 | arXiv | https://github.com/nmndeep/PerturbAndRecover. | https://doi.org/10.48550/arXiv.2412.00727 |
| 52 | T2IShield: Defending Against Backdoors on Text-to-Image Diffusion Models | Zhongqi Wang, Jie Zhang, Shiguang Shan, Xilin Chen | 2024-11-26 | Lecture notes in computer science | https://github.com/Robin-WZQ/T2IShield. | https://doi.org/10.1007/978-3-031-73013-9_7 |
| 53 | BackdoorMBTI: A Backdoor Learning Multimodal Benchmark Tool Kit for Backdoor Defense Evaluation | Haiyang Yu, Tian Xie, Jiaping Gui, Pengyang Wang, Pengzhou Cheng, Ping Yi, Yue Wu | 2024-11-17 | OpenAlex | https://github.com/SJTUHaiyangYu/BackdoorMBTI. | https://doi.org/10.48550/arXiv.2411.11006 |
| 54 | Your Semantic-Independent Watermark is Fragile: A Semantic Perturbation Attack against EaaS Watermark | Zekun Fei, Biao Yi, Jianing Geng, Ruiqi He, Lihai Nie, Zheli Liu | 2024-11-01 | arXiv | https://github.com/Zk4-ps/EaaS-Embedding-Watermark. | http://arxiv.org/abs/2411.09359v2 |
| 55 | Identify Backdoored Model in Federated Learning via Individual Unlearning | Jiahao Xu, Zikai Zhang, Rui Hu | 2024-11-01 | arXiv | https://github.com/JiiahaoXU/MASA | https://doi.org/10.1109/WACV61041.2025.00773 |
| 56 | UNIT: Backdoor Mitigation via Automated Neural Distribution Tightening | Siyuan Cheng, Guangyu Shen, Kaiyuan Zhang, Guanhong Tao, Shengwei An, Hanxi Guo, Shiqing Ma, Xiangyu Zhang | 2024-10-31 | Lecture notes in computer science | https://github.com/Megum1/UNIT. | https://doi.org/10.1007/978-3-031-73033-7_15 |
| 57 | Mitigating the Backdoor Effect for Multi-Task Model Merging via Safety-Aware Subspace | Jinluan Yang, Anke Tang, Didi Zhu, Zhengyu Chen, Li Shen, Fei Wu | 2024-10-16 | arXiv | https://github.com/Yangjinluan/DAM. | https://openreview.net/forum?id=dqMqAaw7Sq |
| 58 | Adversarially Guided Stateful Defense Against Backdoor Attacks in Federated Deep Learning | Hassan Ali, Surya Nepal, Salil S. Kanhere, Sanjay K. Jha | 2024-10-01 | OpenAlex | https://github.com/hassanalikhatim/AGSD. | https://doi.org/10.1109/ACSAC63791.2024.00070 |
| 59 | Agent Security Bench (ASB): Formalizing and Benchmarking Attacks and Defenses in LLM-based Agents | Hanrong Zhang, Jingyuan Huang, Kai Mei, Yifei Yao, Zhenting Wang, Chenlu Zhan, Hongwei Wang, Yongfeng Zhang | 2024-10-01 | arXiv | https://github.com/agiresearch/ASB. | http://arxiv.org/abs/2410.02644v4 |
| 60 | Expose Before You Defend: Unifying and Enhancing Backdoor Defenses via Exposed Models | Yige Li, Hanxun Huang, Jiaming Zhang, Xingjun Ma, Yu-Gang Jiang | 2024-10-01 | arXiv | https://github.com/bboylyg/Expose-Before-You-Defend. | https://doi.org/10.48550/arXiv.2410.19427 |
| 61 | Event Trojan: Asynchronous Event-Based Backdoor Attacks | Ruofei Wang, Qing Guo, Haoliang Li, Renjie Wan | 2024-09-28 | Lecture notes in computer science | https://github.com/rfww/EventTrojan. | https://doi.org/10.1007/978-3-031-72667-5_18 |
| 62 | Mask-Based Invisible Backdoor Attacks on Object Detection | Shin Jeong Jin | 2024-09-27 | 2022 IEEE International Conference on Image Processing (ICIP) | https://github.com/jeongjin0/invisible-backdoor-object-detection | https://doi.org/10.36227/techrxiv.171440796.64142276/v1 |
| 63 | Obliviate: Neutralizing Task-agnostic Backdoors within the Parameter-efficient Fine-tuning Paradigm | Jaehan Kim, Minkyoo Song, Seung Ho Na, Seungwon Shin | 2024-09-21 | Findings of the Association for Computational Linguistics: NAACL 2022 | https://github.com/obliviateARR/Obliviate. | https://doi.org/10.18653/v1/2025.findings-naacl.71 |
| 64 | TERD: A Unified Framework for Safeguarding Diffusion Models Against Backdoors | Yichuan Mo, Hui Huang, Mingjie Li, Ang Li, Yisen Wang | 2024-09-08 | International Conference on Machine Learning 2024 | https://github.com/PKU-ML/TERD. | https://openreview.net/forum?id=lpHjmPvxW1 |
| 65 | Exploiting the Vulnerability of Large Language Models via Defense-Aware Architectural Backdoor | Abdullah Arafat Miah, Yu Bi | 2024-09-03 | arXiv | https://github.com/SiSL-URI/Arch_Backdoor_LLM. | https://doi.org/10.48550/arXiv.2409.01952 |
| 66 | NoiseAttack: An Evasive Sample-Specific Multi-Targeted Backdoor Attack Through White Gaussian Noise | Abdullah Arafat Miah, Kaan Icer, Resit Sendag, Yu Bi | 2024-09-03 | arXiv | https://github.com/SiSL-URI/NoiseAttack | https://doi.org/10.48550/arXiv.2409.02251 |
| 67 | Defending Text-to-image Diffusion Models: Surprising Efficacy of Textual Perturbations Against Backdoor Attacks | Oscar Chew, Po-Yi Lu, Jayden Lin, Hsuan-Tien Lin | 2024-08-28 | arXiv | https://github.com/oscarchew/t2i-backdoor-defense. | https://doi.org/10.48550/arXiv.2408.15721 |
| 68 | VFLIP: A Backdoor Defense for Vertical Federated Learning via Identification and Purification | Yungi Cho, Woorim Han, Miseon Yu, Younghan Lee, Ho Bae, Yunheung Paek | 2024-08-28 | Lecture notes in computer science | https://github.com/blingcho/VFLIP-esorics24 | https://doi.org/10.1007/978-3-031-70903-6_15 |
| 69 | MakeupAttack: Feature Space Black-box Backdoor Attack on Face Recognition via Makeup Transfer | Ming Sun, Lihua Jing, Zixuan Zhu, Rui Wang | 2024-08-22 | Frontiers in artificial intelligence and applications | https://github.com/AaronSun2000/MakeupAttack. | https://doi.org/10.48550/arXiv.2408.12312 |
| 70 | MEGen: Generative Backdoor into Large Language Models via Model Editing | Jiyang Qiu, Xinbei Ma, Zhuosheng Zhang, Hai Zhao, Yun Li, Qianren Wang | 2024-08-20 | Findings of the Association for Computational Linguistics: ACL 2022 | https://github.com/MonoQ-hub/MEGen. | https://doi.org/10.18653/v1/2025.findings-acl.584 |
| 71 | BackdoorLLM: A Comprehensive Benchmark for Backdoor Attacks and Defenses on Large Language Models | Yige Li, Hanxun Huang, Yunhan Zhao, Xingjun Ma, Jun Sun | 2024-08-01 | arXiv | https://github.com/bboylyg/BackdoorLLM. | https://doi.org/10.48550/arXiv.2408.12798 |
| 72 | Diff-Cleanse: Identifying and Mitigating Backdoor Attacks in Diffusion Models | Hao Jiang, Jin Xiao, Xiaoguang Hu, Chen Tianyou, Zhao Jiajia | 2024-07-30 | ICME | https://github.com/shymuel/diff-cleanse. | https://doi.org/10.1109/ICME59968.2025.11210014 |
| 73 | BackdoorBench: A Comprehensive Benchmark and Analysis of Backdoor Learning | Baoyuan Wu, Hongrui Chen, Mingda Zhang, Zihao Zhu, Shaokui Wei, Danni Yuan, Mingli Zhu, Ruotong Wang, Li Liu, Chao Shen | 2024-07-29 | International Journal of Computer Vision | http://papers.nips.cc/paper_files/paper/2022/hash/4491ea1c91aa2b22c373e5f1dfce234f-Abstract-Datasets_and_Benchmarks.html | |
| 74 | Flatness-aware Sequential Learning Generates Resilient Backdoors | Hoang N. Pham, The-Anh Ta, Anh Tran, Khoa D. Doan | 2024-07-19 | Lecture notes in computer science | https://github.com/mail-research/SBL-resilient-backdoors | https://doi.org/10.1007/978-3-031-73021-4_6 |
| 75 | Provable Robustness of (Graph) Neural Networks Against Data Poisoning and Backdoor Attacks | Lukas Gosch, Mahalakshmi Sabanayagam, Debarghya Ghoshdastidar, Stephan Günnemann | 2024-07-15 | Trans. Mach. Learn. Res. | https://github.com/saper0/qpcert | https://openreview.net/forum?id=jIAPLDdGVx |
| 76 | Distributed Backdoor Attacks on Federated Graph Learning and Certified Defenses | Yuxin Yang, Qiang Li, Jinyuan Jia, Yuan Hong, Binghui Wang | 2024-07-11 | OpenAlex | https://github.com/Yuxin104/Opt-GDBA. | https://doi.org/10.48550/arXiv.2407.08935 |
| 77 | Future Events as Backdoor Triggers: Investigating Temporal Vulnerabilities in LLMs | Sara Price, Arjun Panickssery, Samuel R. Bowman, Asa Cooper Stickland | 2024-07-04 | arXiv | https://github.com/sbp354/Future_triggered_backdoors | https://doi.org/10.48550/arXiv.2407.04108 |
| 78 | ShadowCode: Towards (Automatic) External Prompt Injection Attack against Code LLMs | Yuchen Yang, Yiming Li, Hongwei Yao, Bingrun Yang, Yiling He, Tianwei Zhang, Dacheng Tao, Zhan Qin | 2024-07-01 | arXiv | https://github.com/LianPing-cyber/ShadowCodeEPI. | http://arxiv.org/abs/2407.09164v6 |
| 79 | Venomancer: Towards Imperceptible and Target-on-Demand Backdoor Attacks in Federated Learning | Son Nguyen, Thinh Viet Nguyen, Khoa D. Doan, Kok‐Seng Wong | 2024-07-01 | arXiv | https://github.com/nguyenhongson1902/Venomancer. | https://doi.org/10.48550/arXiv.2407.03144 |
| 80 | Towards Clean-Label Backdoor Attacks in the Physical World | Thinh Dao, Cuong Phan Minh Le, Khoa D. Doan, Kok‐Seng Wong | 2024-07-01 | arXiv | https://github.com/21thinh/Clean-Label-Physical-Backdoor-Attacks. | https://doi.org/10.48550/arXiv.2407.19203 |
| 81 | Defending Against Repetitive-based Backdoor Attacks on Semi-supervised Learning through Lens of Rate-Distortion-Perception Trade-off | Cheng-Yi Lee, Ching-Chia Kao, Cheng-Han Yeh, Chun-Shien Lu, Chia-Mu Yu, Chu-Song Chen | 2024-07-01 | 2022 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV) | https://github.com/chengyi-chris/UPure | https://doi.org/10.1109/WACV61041.2025.00630 |
| 82 | IPA-NeRF: Illusory Poisoning Attack Against Neural Radiance Fields | Wenxiang Jiang, Hanwei Zhang, Shuo Zhao, Zhongwen Guo, Hao Wang | 2024-07-01 | arXiv | https://github.com/jiang-wenxiang/IPA-NeRF. | http://arxiv.org/abs/2407.11921v2 |
| 83 | Clean-Label Physical Backdoor Attacks with Data Distillation | Thinh Dao, Khoa D Doan, Kok-Seng Wong | 2024-07-01 | arXiv | https://github.com/thinh-dao/Clean-Label-Physical-Backdoor-Attacks. | http://arxiv.org/abs/2407.19203v4 |
| 84 | Backdoor Graph Condensation | Jiahao Wu, Ning Lu, Zeiyu Dai, Kun Wang, Wenqi Fan, Shengcai Liu, Qing Li, Ke Tang | 2024-07-01 | arXiv | https://github.com/JiahaoWuGit/BGC. | https://doi.org/10.1109/ICDE65448.2025.00172 |
| 85 | A Whole-Process Certifiably Robust Aggregation Method Against Backdoor Attacks in Federated Learning | Anqi Zhou, Yezheng Liu, Yidong Chai, Hongyi Zhu, Xinyue Ge, Yuanchun Jiang, Meng Wang | 2024-06-30 | arXiv | https://github.com/brick-brick/WPCRAM. | https://doi.org/10.48550/arXiv.2407.00719 |
| 86 | Lotus: Evasive and Resilient Backdoor Attacks through Sub-Partitioning | Siyuan Cheng, Guanhong Tao, Yingqi Liu, Guangyu Shen, Shengwei An, Shiwei Feng, Xiangzhe Xu, Kaiyuan Zhang, Shiqing Ma, ... | 2024-06-16 | 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) | https://github.com/Megum1/LOTUS. | https://doi.org/10.1109/cvpr52733.2024.02342 |
| 87 | BadAgent: Inserting and Activating Backdoor Attacks in LLM Agents | Yifei Wang, Dizhan Xue, Shengjie Zhang, Shengsheng Qian | 2024-06-05 | OpenAlex | https://github.com/DPamK/BadAgent | https://doi.org/10.18653/v1/2024.acl-long.530 |
| 88 | Invisible Backdoor Attacks on Diffusion Models | Sen Li, Junchi Ma, Minhao Cheng | 2024-06-02 | arXiv | https://github.com/invisibleTriggerDiffusion/invisible_triggers_for_diffusion. | https://doi.org/10.48550/arXiv.2406.00816 |
| 89 | Let the Noise Speak: Harnessing Noise for a Unified Defense Against Adversarial and Backdoor Attacks | Md Hasan Shahriar, Ning Wang, Naren Ramakrishnan, Y. Thomas Hou, Wenjing Lou | 2024-06-01 | Lecture notes in computer science | https://github.com/shahriar0651/NoiSec. | https://doi.org/10.1007/978-3-032-07884-1_19 |
| 90 | BAN: Detecting Backdoors Activated by Adversarial Neuron Noise | Xiaoyun Xu, Zhuoran Liu, Stefanos Koffas, Shujian Yu, Stjepan Picek | 2024-05-30 | NeurIPS | https://github.com/xiaoyunxxy/ban | http://papers.nips.cc/paper_files/paper/2024/hash/cfaccbd9b5e62562779351ebcb140c94-Abstract-Conference.html |
| 91 | Mitigating Backdoor Attack by Injecting Proactive Defensive Backdoor | Shaokui Wei, Hongyuan Zha, Baoyuan Wu | 2024-05-25 | NeurIPS | https://github.com/shawkui/Proactive_Defensive_Backdoor. | http://papers.nips.cc/paper_files/paper/2024/hash/9374af323abb65ce551168d44b09ad5f-Abstract-Conference.html |
| 92 | Towards Imperceptible Backdoor Attack in Self-supervised Learning | Hanrong Zhang, Zhenting Wang, Tingxu Han, Mingyu Jin, Chenlu Zhan, Mengnan Du, Hongwei Wang, Shiqing Ma | 2024-05-23 | arXiv | https://github.com/Zhang-Henry/IMPERATIVE. | https://doi.org/10.48550/arXiv.2405.14672 |
| 93 | IBD-PSC: Input-level Backdoor Detection via Parameter-oriented Scaling Consistency | Linshan Hou, Ruili Feng, Zhongyun Hua, Wei Luo, Leo Yu Zhang, Yiming Li | 2024-05-15 | ICML | https://github.com/THUYimingLi/BackdoorBox | https://openreview.net/forum?id=YCzbfs2few |
| 94 | EmInspector: Combating Backdoor Attacks in Federated Self-Supervised Learning Through Embedding Inspection | Yuwen Qian, Shuchi Wu, Kang Wei, Ming Ding, Di Xiao, Tao Xiang, Chuan Ma, Song Guo | 2024-05-01 | arXiv | https://github.com/ShuchiWu/EmInspector. | https://doi.org/10.48550/arXiv.2405.13080 |
| 95 | Nearest is Not Dearest: Towards Practical Defense against Quantization-conditioned Backdoor Attacks | Boheng Li, Yishuo Cai, Haowei Li, Feng Xue, Zhifeng Li, Yiming Li | 2024-05-01 | 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) | https://github.com/AntigoneRandy/QuantBackdoor_EFRAP. | https://doi.org/10.1109/CVPR52733.2024.02315 |
| 96 | Not All Prompts Are Secure: A Switchable Backdoor Attack Against Pre-trained Vision Transformers | Sheng Yang, Jiawang Bai, Kuofeng Gao, Yong Yang, Yiming Li, Shu-tao Xia | 2024-05-01 | 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) | https://github.com/20000yshust/SWARM. | https://doi.org/10.1109/CVPR52733.2024.02306 |
| 97 | Test-Time Multimodal Backdoor Detection by Contrastive Prompting | Yuwei Niu, Shuo He, Qi Wei, Zongyu Wu, Feng Liu, Lei Feng | 2024-05-01 | arXiv | https://github.com/Purshow/BDetCLIP. | http://arxiv.org/abs/2405.15269v3 |
| 98 | Beyond Traditional Threats: A Persistent Backdoor Attack on Federated Learning | Tao Liu, Yuhang Zhang, Feng Zhu, Zhiqin Yang, Chen Xu, Dapeng Man, Wu Yang | 2024-04-26 | https://github.com/PhD-TaoLiu/FCBA. | https://doi.org/10.1609/aaai.v38i19.30131 | |
| 99 | Privacy Backdoors: Stealing Data with Corrupted Pretrained Models | Shanglun Feng, Florian Tramèr | 2024-03-30 | ICML | https://github.com/ShanglunFengatETHZ/PrivacyBackdoor | https://openreview.net/forum?id=7yixJXmzb8 |
| 100 | BadRL: Sparse Targeted Backdoor Attack against Reinforcement Learning | Jing Cui, Yufei Han, Yuzhe Ma, Jianbin Jiao, Junge Zhang | 2024-03-24 | Proceedings of the AAAI Conference on Artificial Intelligence | https://github.com/7777777cc/code. | https://doi.org/10.1609/aaai.v38i10.29052 |
| 101 | COMBAT: Alternated Training for Near-Perfect Clean-Label Backdoor Attacks | Tran Ngoc Huynh, Dang Minh Nguyen, Tung Pham, Anh Tuan Tran | 2024-03-24 | Proceedings of the AAAI Conference on Artificial Intelligence | https://github.com/VinAIResearch/COMBAT. | https://openreview.net/pdf/c182fdd518fe8ec0aeafeb8d1b2b55bb8e46a463.pdf |
| 102 | Generating Potent Poisons and Backdoors from Scratch with Guided Diffusion | Hossein Souri, Arpit Bansal, Hamid Kazemi, Liam Fowl, Aniruddha Saha, Jonas Geiping, Andrew Gordon Wilson, Rama Chellapp... | 2024-03-24 | arXiv | https://github.com/hsouri/GDP | https://doi.org/10.48550/arXiv.2403.16365 |
| 103 | Invisible Backdoor Attack against 3D Point Cloud Classifier in Graph Spectral Domain | Linkun Fan, Fazhi He, Tongzhen Si, Wei Tang, Bing Li | 2024-03-24 | Proceedings of the AAAI Conference on Artificial Intelligence | https://github.com/f-lk/IBAPC. | https://doi.org/10.1609/aaai.v38i19.30099 |
| 104 | Progressive Poisoned Data Isolation for Training-Time Backdoor Defense | Yiming Chen, Haiwei Wu, Jiantao Zhou | 2024-03-24 | Proceedings of the AAAI Conference on Artificial Intelligence | https://github.com/RorschachChen/PIPD.git. | https://doi.org/10.1609/aaai.v38i10.29023 |
| 105 | An Embarrassingly Simple Defense Against Backdoor Attacks On SSL | Aryan Satpathy, Nilaksh Nilaksh, Dhruva Rajwade | 2024-03-23 | arXiv | https://github.com/Aryan-Satpathy/Backdoor. | https://doi.org/10.48550/arXiv.2403.15918 |
| 106 | PoisonPrompt: Backdoor Attack on Prompt-Based Large Language Models | Hongwei Yao, Jian Lou, Zhan Qin | 2024-03-18 | ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) | https://github.com/grasses/PoisonPrompt | https://doi.org/10.1109/icassp48485.2024.10446267 |
| 107 | Invisible Black-Box Backdoor Attack against Deep Cross-Modal Hashing Retrieval | Tianshi Wang, Fengling Li, Lei Zhu, Jingjing Li, Zheng Zhang, Heng Tao Shen | 2024-03-02 | ACM transactions on office information systems | https://github.com/tswang0116/IB3A. | https://doi.org/10.1145/3650205 |
| 108 | Backdoor Secrets Unveiled: Identifying Backdoor Data with Optimized Scaled Prediction Consistency | Soumyadeep Pal, Yuguang Yao, Ren Wang, Bingquan Shen, Sijia Liu | 2024-03-01 | ICLR | https://github.com/OPTML-Group/BackdoorMSPC. | https://openreview.net/forum?id=1OfAO2mes1 |
| 109 | BapFL: You can Backdoor Personalized Federated Learning | Tiandi Ye, Cen Chen, Yinggui Wang, Xiang Li, Ming Gao | 2024-02-23 | ACM Transactions on Knowledge Discovery from Data | https://github.com/BapFL/code | https://doi.org/10.1145/3649316 |
| 110 | Acquiring Clean Language Models from Backdoor Poisoned Datasets by Downscaling Frequency Space | Zongru Wu, Zhuosheng Zhang, Pengzhou Cheng, Gongshen Liu | 2024-02-19 | OpenReview | https://github.com/ZrW00/MuScleLoRA. | https://openreview.net/pdf/9eb71f0c75e3630c53671cf8b0175e95463726f1.pdf |
| 111 | Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection | Jiawei Liang, Siyuan Liang, Aishan Liu, Xiaojun Jia, Junhao Kuang, Xiaochun Cao | 2024-02-18 | ICLR | https://github.com/JWLiang007/PFF | https://openreview.net/forum?id=8iTpB4RNvP |
| 112 | Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents | Wenkai Yang, Xiaohan Bi, Yankai Lin, Sishuo Chen, Jie Zhou, Xu Sun | 2024-02-17 | NeurIPS | https://github.com/lancopku/agent-backdoor-attacks | http://papers.nips.cc/paper_files/paper/2024/hash/b6e9d6f4f3428cd5f3f9e9bbae2cab10-Abstract-Conference.html |
| 113 | OrderBkd: Textual backdoor attack through repositioning | Irina Alekseevskaia, Konstantin Arkhipenko | 2024-02-12 | OpenAlex | https://github.com/alekseevskaia/OrderBkd. | https://doi.org/10.1109/ispras60948.2023.10508175 |
| 114 | Backdoor Attacks on Dense Retrieval via Public and Unintentional Triggers | Quanyu Long, Yue Deng, LeiLei Gan, Wenya Wang, Sinno Jialin Pan | 2024-02-01 | arXiv | https://github.com/ruyue0001/Backdoor_DPR. | http://arxiv.org/abs/2402.13532v3 |
| 115 | SynGhost: Invisible and Universal Task-agnostic Backdoor Attack via Syntactic Transfer | Pengzhou Cheng, Wei Du, Zongru Wu, Fengwei Zhang, Libo Chen, Zhuosheng Zhang, Gongshen Liu | 2024-02-01 | Findings of the Association for Computational Linguistics: NAACL 2022 | https://github.com/Zhou-CyberSecurity-AI/SynGhost. | https://doi.org/10.18653/v1/2025.findings-naacl.196 |
| 116 | TransTroj: Transferable Backdoor Attacks to Pre-trained Models via Embedding Indistinguishability | Hao Wang, Tao Xiang, Shangwei Guo, Jialing He, Hangcheng Liu, Tianwei Zhang | 2024-01-28 | arXiv | https://github.com/haowang-cqu/TransTroj | https://doi.org/10.48550/arXiv.2401.15883 |
| 117 | A Closer Look at Robustness of Vision Transformers to Backdoor Attacks | Akshayvarun Subramanya, Soroush Abbasi Koohpayegani, Aniruddha Saha, Ajinkya Tejankar, Hamed Pirsiavash | 2024-01-03 | 2022 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV) | https://github.com/UCDvision/backdoor_transformer.git | https://doi.org/10.1109/wacv57701.2024.00383 |
| 118 | Toward Stealthy Backdoor Attacks Against Speech Recognition via Elements of Sound | Hanbo Cai, Pengcheng Zhang, Hai Dong, Yan Xiao, Stefanos Koffas, Yiming Li | 2024-01-01 | IEEE Transactions on Information Forensics and Security | https://github.com/HanboCai/BadSpeech_SoE. | https://doi.org/10.1109/tifs.2024.3404885 |
| 119 | Shortcuts Everywhere and Nowhere: Exploring Multi-Trigger Backdoor Attacks | Yige Li, Jiabo He, Hanxun Huang, Jun Sun, Xingjun Ma, Yu-Gang Jiang | 2024-01-01 | arXiv | https://github.com/bboylyg/Multi-Trigger-Backdoor-Attacks. | http://arxiv.org/abs/2401.15295v3 |
| 120 | PSBD: Prediction Shift Uncertainty Unlocks Backdoor Detection | Wei Li, Pin-Yu Chen, Sijia Liu, Ren Wang | 2024-01-01 | 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) | https://github.com/WL-619/PSBD. | https://openaccess.thecvf.com/content/CVPR2025/html/Li_PSBD_Prediction_Shift_Uncertainty_Unlocks_Backdoor_Detection_CVPR_2025_paper.html |
| 121 | PBP: Post-training Backdoor Purification for Malware Classifiers | Dung Thuy Nguyen, Ngoc N. Tran, Taylor T. Johnson, Kevin Leach | 2024-01-01 | OpenAlex | https://github.com/judydnguyen/pbp-backdoor-purification-official | https://www.ndss-symposium.org/ndss-paper/pbp-post-training-backdoor-purification-for-malware-classifiers/ |
| 122 | Model Supply Chain Poisoning: Backdooring Pre-trained Models via Embedding Indistinguishability | Hao Wang, Shangwei Guo, Jialing He, Hangcheng Liu, Tianwei Zhang, Tao Xiang | 2024-01-01 | WWW | https://github.com/haowang-cqu/TransTroj | https://doi.org/10.1145/3696410.3714624 |
| 123 | How to Craft Backdoors with Unlabeled Data Alone? | Yifei Wang, Wenhan Ma, Stefanie Jegelka, Yisen Wang | 2024-01-01 | arXiv | https://github.com/PKU-ML/nlb. | https://doi.org/10.48550/arXiv.2404.06694 |
| 124 | How to Backdoor Consistency Models? | Chengen Wang, Murat Kantarcioglu | 2024-01-01 | Lecture notes in computer science | https://github.com/chengenw/backdoorCM | https://doi.org/10.1007/978-981-96-8295-9_23 |
| 125 | Defending Against Backdoor Attacks by Quarantine Training | Chengxu Yu, Yulai Zhang | 2024-01-01 | IEEE Access | https://github.com/Chengx-Yu/Quarantine-Training. | https://doi.org/10.1109/access.2024.3354385 |
| 126 | BadCM: Invisible Backdoor Attack Against Cross-Modal Learning | Zheng Zhang, Xu Yuan, Lei Zhu, Jingkuan Song, Liqiang Nie | 2024-01-01 | https://github.com/xandery-geek/BadCM. | https://doi.org/10.48550/arXiv.2410.02182 | |
| 127 | Backdoor Contrastive Learning via Bi-level Trigger Optimization | Weiyu Sun, Xinyu Zhang, Hao Lu, Ying-Cong Chen, Ting Wang, Jinghui Chen, Lu Lin | 2024-01-01 | ICLR | https://github.com/SWY666/SSL-backdoor-BLTO. | https://openreview.net/forum?id=oxjeePpgSP |
| 128 | BackTime: Backdoor Attacks on Multivariate Time Series Forecasting | Xiaola Lin, Zhining Liu, Dongqi Fu, Ruizhong Qiu, Hanghang Tong | 2024-01-01 | NeurIPS | https://github.com/xiaolin-cs/BackTime | http://papers.nips.cc/paper_files/paper/2024/hash/ed3cd2520148b577039adfade82a5566-Abstract-Conference.html |
| 129 | Adversarial Feature Map Pruning for Backdoor | Dong Huang, Qingwen Bu | 2024-01-01 | ICLR | https://github.com/retsuh-bqw/FMP. | https://openreview.net/forum?id=IOEEDkla96 |
| 130 | UltraClean: A Simple Framework to Train Robust Neural Networks against Backdoor Attacks | Bingyin Zhao, Yingjie Lao | 2023-12-01 | arXiv | https://github.com/bxz9200/UltraClean. | https://doi.org/10.48550/arXiv.2312.10657 |
| 131 | OCGEC: One-class Graph Embedding Classification for DNN Backdoor Detection | Haoyu Jiang, Haiyang Yu, Nan Li, Ping Yi | 2023-12-01 | 2022 International Joint Conference on Neural Networks (IJCNN) | https://github.com/jhy549/OCGEC. | https://doi.org/10.1109/ijcnn60899.2024.10650468 |
| 132 | Erasing Self-Supervised Learning Backdoor by Cluster Activation Masking | Shengsheng Qian, Dizhan Xue, Yifei Wang, Shengjie Zhang, Huaiwen Zhang, Changsheng Xu | 2023-12-01 | arXiv | https://github.com/LivXue/PoisonCAM. | https://doi.org/10.48550/arXiv.2312.07955 |
| 133 | Activation Gradient based Poisoned Sample Detection Against Backdoor Attacks | Danni Yuan, Shaokui Wei, Mingda Zhang, Li Liu, Baoyuan Wu | 2023-12-01 | ICLR | https://github.com/SCLBD/bdzoo2 | https://openreview.net/forum?id=VNMJfBBUd5 |
| 134 | A Practical Clean-Label Backdoor Attack with Limited Information in Vertical Federated Learning | Peng Chen, Jirui Yang, Junxiong Lin, Zhihui Lu, Qiang Duan, Hongfeng Chai | 2023-12-01 | 2021 IEEE International Conference on Data Mining (ICDM) | https://github.com/13thDayOLunarMay/TECB-attack | https://doi.org/10.1109/icdm58522.2023.00013 |
| 135 | TextGuard: Provable Defense against Backdoor Attacks on Text Classification | Hengzhi Pei, Jinyuan Jia, Wenbo Guo, Bo Li, Dawn Song | 2023-11-01 | OpenAlex | https://github.com/AI-secure/TextGuard. | https://www.ndss-symposium.org/ndss-paper/textguard-provable-defense-against-backdoor-attacks-on-text-classification/ |
| 136 | ACQ: Few-shot Backdoor Defense via Activation Clipping and Quantizing | Yulin Jin, Xiaoyu Zhang, Jian Lou, Xiaofeng Chen | 2023-10-26 | ACM Multimedia | https://github.com/Backdoor-defense/ACQ | https://doi.org/10.1145/3581783.3612410 |
| 137 | Attacking Neural Networks with Neural Networks: Towards Deep Synchronization for Backdoor Attacks | Zihan Guan, Lichao Sun, Mengnan Du, Ninghao Liu | 2023-10-21 | OpenAlex | https://github.com/GuanZihan/Deep-Backdoor-Attack. | https://doi.org/10.1145/3583780.3614784 |
| 138 | An Embarrassingly Simple Backdoor Attack on Self-supervised Learning | Changjiang Li, Ren Pang, Zhaohan Xi, Tianyu Du, Shouling Ji, Yuan Yao, Ting Wang | 2023-10-01 | 2021 IEEE/CVF International Conference on Computer Vision (ICCV) | https://github.com/meet-cjli/CTRL | https://doi.org/10.1109/iccv51070.2023.00403 |
| 139 | Computation and Data Efficient Backdoor Attacks | Yutong Wu, Xingshuo Han, Han Qiu, Tianwei Zhang | 2023-10-01 | 2021 IEEE/CVF International Conference on Computer Vision (ICCV) | https://github.com/WU-YU-TONG/computational_efficient_backdoor | https://doi.org/10.1109/iccv51070.2023.00443 |
| 140 | FLTracer: Accurate Poisoning Attack Provenance in Federated Learning | Xinyu Zhang, Qingyu Liu, Zhongjie Ba, Yuan Hong, Tianhang Zheng, Feng Lin, Li Lu, Kui Ren | 2023-10-01 | arXiv | https://github.com/Eyr3/FLTracer | http://arxiv.org/abs/2310.13424v1 |
| 141 | XGBD: Explanation-Guided Graph Backdoor Detection | Zihan Guan, Mengnan Du, Ninghao Liu | 2023-09-28 | Frontiers in artificial intelligence and applications | https://github.com/GuanZihan/GNN_backdoor_detection. | https://doi.org/10.48550/arXiv.2308.04406 |
| 142 | Resisting Backdoor Attacks in Federated Learning via Bidirectional Elections and Individual Perspective | Zhen Qin, Feiyi Chen, Chen Zhi, Xueqiang Yan, Shuiguang Deng | 2023-09-01 | Proceedings of the AAAI Conference on Artificial Intelligence | https://github.com/zhenqincn/Snowball | https://doi.org/10.48550/arXiv.2309.16456 |
| 143 | TIJO: Trigger Inversion with Joint Optimization for Defending Multimodal Backdoored Models | Indranil Sur, Karan Sikka, Matthew Walmer, Kaushik Koneripalli, Anirban Roy, Xiao Lin, Ajay Divakaran, Susmit Jha | 2023-08-01 | 2021 IEEE/CVF International Conference on Computer Vision (ICCV) | https://github.com/SRI-CSL/TIJO. | https://doi.org/10.1109/iccv51070.2023.00022 |
| 144 | Towards Stealthy Backdoor Attacks against Speech Recognition via Elements of Sound | Hanbo Cai, Pengcheng Zhang, Hai Dong, Yan Xiao, Stefanos Koffas, Yiming Li | 2023-07-01 | arXiv | https://github.com/HanboCai/BadSpeech_SoE | https://doi.org/10.48550/arXiv.2307.08208 |
| 145 | Backdoor Defense via Deconfounded Representation Learning | Zaixi Zhang, Qi Liu, Zhicai Wang, Zepu Lu, Qingyong Hu | 2023-06-01 | 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) | https://github.com/zaixizhang/CBD. | https://doi.org/10.1109/cvpr52729.2023.01177 |
| 146 | Bkd-FedGNN: A Benchmark for Classification Backdoor Attacks on Federated Graph Neural Network | Fan Liu, Siqi Lai, Yansong Ning, Hao Liu | 2023-06-01 | Lecture notes in computer science | https://github.com/usail-hkust/BkdFedGCN. | https://doi.org/10.1007/978-3-032-05981-9_22 |
| 147 | DHBE: Data-free Holistic Backdoor Erasing in Deep Neural Networks via Restricted Adversarial Distillation | Zhicong Yan, Shenghong Li, Ruijie Zhao, Yuan Tian, Yuanyuan Zhao | 2023-06-01 | OpenAlex | https://github.com/yanzhicong/DHBE | https://doi.org/10.48550/arXiv.2306.08009 |
| 148 | Detecting Backdoors in Pre-trained Encoders | Shiwei Feng, Guanhong Tao, Siyuan Cheng, Guangyu Shen, Xiangzhe Xu, Yingqi Liu, Kaiyuan Zhang, Shiqing Ma, Xiangyu Zhang | 2023-06-01 | 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) | https://github.com/GiantSeaweed/DECREE. | https://doi.org/10.1109/cvpr52729.2023.01569 |
| 149 | Efficient Backdoor Attacks for Deep Neural Networks in Real-world Scenarios | Ziqiang Li, Hong Sun, Pengfei Xia, Heng Li, Beihao Xia, Yi Wu, Bin Li | 2023-06-01 | arXiv | https://github.com/sunh1113/Efficient-backdoor-attacks-for-deep-neural-networks-in-real-world-scenarios | https://openreview.net/forum?id=vRyp2dhEQp |
| 150 | Single Image Backdoor Inversion via Robust Smoothed Classifiers | Mingjie Sun, J. Zico Kolter | 2023-06-01 | 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) | https://github.com/locuslab/smoothinv. | https://doi.org/10.1109/cvpr52729.2023.00784 |
| 151 | VillanDiffusion: A Unified Backdoor Attack Framework for Diffusion Models | Sheng-Yen Chou, Pin-Yu Chen, Tsung-Yi Ho | 2023-06-01 | NeurIPS | https://github.com/IBM/villandiffusion | http://papers.nips.cc/paper_files/paper/2023/hash/6b055b95d689b1f704d8f92191cdb788-Abstract-Conference.html |
| 152 | Backdoor Cleansing with Unlabeled Data | Lu Pang, Tong Sun, Haibin Ling, Chao Chen | 2023-06-01 | 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) | https://github.com/luluppang/BCU. | https://openreview.nethttps://arxiv.org/pdf/2211.12044 |
| 153 | Going in Style: Audio Backdoors Through Stylistic Transformations | Stefanos Koffas, Luca Pajola, Stjepan Picek, Mauro Conti | 2023-05-05 | ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) | https://github.com/skoffas/going-in-style. | https://doi.org/10.1109/icassp49357.2023.10096332 |
| 154 | An Empirical Study of Backdoor Attacks on Masked Auto Encoders | Shuli Zhuang, Pengfei Xia, Bin Li | 2023-05-05 | ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) | https://github.com/zhuangshuli/MAE-Backdoor. | https://doi.org/10.1109/icassp49357.2023.10095201 |
| 155 | Text-to-Image Diffusion Models can be Easily Backdoored through Multimodal Data Poisoning | Shengfang Zhai, Yinpeng Dong, Qingni Shen, Shi Pu, Yuejian Fang, Hang Su | 2023-05-01 | ACM Multimedia | https://github.com/sf-zhai/BadT2I. | https://doi.org/10.48550/arXiv.2305.04175 |
| 156 | Training-free Lexical Backdoor Attacks on Language Models | Yujin Huang, Terry Yue Zhuo, Qiongkai Xu, Han Hu, Xingliang Yuan, Chunyang Chen | 2023-04-26 | Proceedings of the ACM Web Conference 2022 | https://github.com/Jinxhy/TFLexAttack. | https://doi.org/10.48550/arXiv.2302.04116 |
| 157 | Defending Against Patch-based Backdoor Attacks on Self-Supervised Learning | Ajinkya Tejankar, Maziar Sanjabi, Qifan Wang, Sinong Wang, Hamed Firooz, Hamed Pirsiavash, Liang Tan | 2023-04-01 | 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) | https://github.com/UCDvision/PatchSearch | https://doi.org/10.1109/cvpr52729.2023.01178 |
| 158 | Enhancing Fine-Tuning Based Backdoor Defense with Sharpness-Aware Minimization | Mingli Zhu, Shaokui Wei, Li Shen, Yanbo Fan, Baoyuan Wu | 2023-04-01 | 2021 IEEE/CVF International Conference on Computer Vision (ICCV) | https://github.com/SCLBD/BackdoorBench. | https://doi.org/10.1109/iccv51070.2023.00412 |
| 159 | Link-Backdoor: Backdoor Attack on Link Prediction via Node Injection | Haibin Zheng, Haiyang Xiong, Haonan Ma, Guohan Huang, Jinyin Chen | 2023-03-30 | IEEE Transactions on Computational Social Systems | https://github.com/Seaocn/Link-Backdoor. | https://doi.org/10.1109/tcss.2023.3260833 |
| 160 | CleanCLIP: Mitigating Data Poisoning Attacks in Multimodal Contrastive Learning | Hritik Bansal, Nishad Singhi, Yu Yang, Fan Yin, Aditya Grover, Kai-Wei Chang | 2023-03-01 | RTML Workshop 2023 | https://openreview.net/pdf/6a86afb6f0e0ce8a38d619097336004f6f0b6a73.pdf | |
| 161 | Mask and Restore: Blind Backdoor Defense at Test Time with Masked Autoencoder | Tao Sun, Lu Pang, Weimin Lyu, Chao Chen, Haibin Ling | 2023-03-01 | arXiv | https://github.com/tsun/BDMAE. | https://doi.org/10.48550/arXiv.2303.15564 |
| 162 | Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency | Xiaogeng Liu, Minghui Li, Haoyu Wang, Shengshan Hu, Dengpan Ye, Hai Jin, Libing Wu, Chaowei Xiao | 2023-03-01 | 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) | https://github.com/CGCL-codes/TeCo | https://doi.org/10.1109/cvpr52729.2023.01570 |
| 163 | Backdoor for Debias: Mitigating Model Bias with Backdoor Attack-based Artificial Bias | Shangxi Wu, Qiuyang He, Fangzhao Wu, Jitao Sang, Yaowei Wang, Changsheng Xu | 2023-03-01 | IEEE Transactions on Circuits and Systems for Video Technology | https://github.com/KirinNg/DBA. | https://doi.org/10.1109/tcsvt.2025.3548657 |
| 164 | AdaptGuard: Defending Against Universal Attacks for Model Adaptation | Lijun Sheng, Jian Liang, Ran He, Zilei Wang, Tieniu Tan | 2023-03-01 | arXiv | https://github.com/TomSheng21/AdaptGuard. | http://arxiv.org/abs/2303.10594v2 |
| 165 | ASSET: Robust Backdoor Data Detection Across a Multiplicity of Deep Learning Paradigms | Minzhou Pan, Yi Zeng, Lingjuan Lyu, Xue Lin, Ruoxi Jia | 2023-02-01 | USENIX Security Symposium | https://github.com/ruoxi-jia-group/ASSET. | https://www.usenix.org/conference/usenixsecurity23/presentation/pan |
| 166 | Backdoor Attacks on Time Series: A Generative Approach | Yujing Jiang, Xingjun Ma, Sarah Monazam Erfani, James Bailey | 2023-02-01 | SaTML 2023 | https://openreview.net/pdf/b15b1e53dab0744f34198d60d727ddab895c8074.pdf | |
| 167 | Backdoor Learning for NLP: Recent Advances, Challenges, and Future Research Directions | Marwan Omar | 2023-02-01 | arXiv | https://github.com/marwanomar1/Backdoor-Learning-for-NLP. | https://doi.org/10.48550/arXiv.2302.06801 |
| 168 | Revisiting Personalized Federated Learning: Robustness Against Backdoor Attacks | Zeyu Qin, Liuyi Yao, Daoyuan Chen, Yaliang Li, Bolin Ding, Minhao Cheng | 2023-02-01 | Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining | https://github.com/alibaba/FederatedScope | https://openreview.nethttps://arxiv.org/pdf/2302.01677.pdf |
| 169 | SCALE-UP: An Efficient Black-box Input-level Backdoor Detection via Analyzing Scaled Prediction Consistency | Junfeng Guo, Yiming Li, Xun Chen, Hanqing Guo, Lichao Sun, Cong Liu | 2023-02-01 | ICLR 2023 poster | https://github.com/JunfengGo/SCALE-UP. | https://openreview.net/pdf/341ae2d07a7459242b24bb6e6ff7e2aec7a756e1.pdf |
| 170 | Towards Robust Model Watermark via Reducing Parametric Vulnerability | Guanhao Gan, Yiming Li, Dongxian Wu, Shu-Tao Xia | 2023-02-01 | Submitted to ICLR 2023 | https://openreview.net/pdf/c3ea0d03202ba1e2fbf2a003a936364bb447ce98.pdf | |
| 171 | TrojText: Test-time Invisible Textual Trojan Insertion | Qian Lou, Yepeng Liu, Bo Feng | 2023-02-01 | ICLR 2023 poster | https://openreview.net/pdf/090c1fa0cc728fa6eb032fe3c74b8b5125be7e94.pdf | |
| 172 | Learning to Backdoor Federated Learning | Henger Li, Wu Chen, Senchun Zhu, Zizhan Zheng | 2023-01-01 | ICLR 2023 BANDS Spotlight | https://openreview.net/pdf/b3222725885adf97fe0f200feabe9bbd3df94344.pdf | |
| 173 | SafeNet: The Unreasonable Effectiveness of Ensembles in Private Collaborative Learning | Harsh Chaudhari, Matthew Jagielski, Alina Oprea | 2023-01-01 | SaTML 2023 | https://openreview.net/pdf/512a5c7a02310e8ac2b28531e9e0c6518ad1c4e6.pdf | |
| 174 | Reconstructive Neuron Pruning for Backdoor Defense | Yige Li, Xixiang Lyu, Xingjun Ma, Nodens Koren, Lingjuan Lyu, Bo Li, Yu-Gang Jiang | 2023-01-01 | ICML | https://github.com/bboylyg/RNP | https://proceedings.mlr.press/v202/li23v.html |
| 175 | Removing Backdoors in Pre-trained Models by Regularized Continual Pre-training | Biru Zhu, Ganqu Cui, Yangyi Chen, Yujia Qin, Lifan Yuan, Chong Fu, Yangdong Deng, Zhiyuan Liu, Maosong Sun, Ming Gu | 2023-01-01 | Transactions of the Association for Computational Linguistics | https://github.com/thunlp/RECIPE. | https://openreview.net/pdf/b90599e4935794e4f111f07737fb0e5a485048f3.pdf |
| 176 | RobustNLP: A Technique to Defend NLP Models Against Backdoor Attacks | Marwan Omar | 2023-01-01 | arXiv | https://github.com/marwanomar1/Backdoor-Learning-for-NLP | https://doi.org/10.48550/arXiv.2302.09420 |
| 177 | Universal Backdoor Attacks | Benjamin Schneider, Nils Lukas, Florian Kerschbaum | 2023-01-01 | arXiv | https://github.com/Ben-Schneider-code/Universal-Backdoor-Attacks. | https://openreview.net/forum?id=3QkzYBSWqL |
| 178 | The "Beatrix" Resurrections: Robust Backdoor Detection via Gram Matrices | Wanlun Ma, Derui Wang, Ruoxi Sun, Minhui Xue, Sheng Wen, Yang Xiang | 2023-01-01 | OpenAlex | https://github.com/wanlunsec/Beatrix | https://www.ndss-symposium.org/ndss-paper/the-beatrix-resurrections-robust-backdoor-detection-via-gram-matrices/ |
| 179 | Towards Stable Backdoor Purification through Feature Shift Tuning | Rui Min, Zeyu Qin, Li Shen, Minhao Cheng | 2023-01-01 | NeurIPS | https://github.com/AISafety-HKUST/stable_backdoor_purification. | http://papers.nips.cc/paper_files/paper/2023/hash/ee37d51b3c003d89acba2363dde256af-Abstract-Conference.html |
| 180 | UNICORN: A Unified Backdoor Trigger Inversion Framework | Zhenting Wang, Kai Mei, Juan Zhai, Shiqing Ma | 2023-01-01 | ICLR 2023 notable top 25% | https://openreview.net/pdf/edd35173abda536a0bd486d49c34c8ce04e56652.pdf | |
| 181 | You Can Backdoor Personalized Federated Learning | Tiandi Ye, Cen Chen, Yinggui Wang, Xiang Li, Ming Gao | 2023-01-01 | ACM Trans. Knowl. Discov. Data 2024 | https://github.com/BapFL/code. | https://doi.org/10.48550/arXiv.2307.15971 |
| 182 | NOTABLE: Transferable Backdoor Attacks Against Prompt-based NLP Models | Kai Mei, Zheng Li, Zhenting Wang, Yang Zhang, Shiqing Ma | 2023-01-01 | OpenAlex | https://github.com/RU-System-Software-and-Security/Notable. | https://doi.org/10.18653/v1/2023.acl-long.867 |
| 183 | Beating Backdoor Attack at Its Own Game | Min Liu, Alberto L. Sangiovanni-Vincentelli, Xiangyu Yue | 2023-01-01 | 2021 IEEE/CVF International Conference on Computer Vision (ICCV) | https://github.com/damianliumin/non-adversarial_backdoor. | https://doi.org/10.1109/ICCV51070.2023.00426 |
| 184 | From Trojan Horses to Castle Walls: Unveiling Bilateral Backdoor Effects in Diffusion Models | Zhuoshi Pan, Yuguang Yao, Gaowen Liu, Bingquan Shen, H. Vicky Zhao, Ramana Rao Kompella, Sijia Liu | 2023-01-01 | arXiv | https://github.com/OPTML-Group/BiBadDiff. | https://doi.org/10.48550/arXiv.2311.02373 |
| 185 | Backdoor Attacks for Remote Sensing Data With Wavelet Transform | Nikolaus Dräger, Yonghao Xu, Pedram Ghamisi | 2023-01-01 | IEEE Trans. Geos. Remote Sens., vol. 61, pp. 1-15, 2023 | https://github.com/ndraeger/waba. | https://doi.org/10.1109/tgrs.2023.3289307 |
| 186 | FMT: Removing Backdoor Feature Maps via Feature Map Testing in Deep Neural Networks | Dong Huang, Qingwen Bu, Yahao Qing, Yichao Fu, Heming Cui | 2023-01-01 | arXiv | https://github.com/retsuh-bqw/FMP. | https://doi.org/10.48550/arXiv.2307.11565 |
| 187 | BAGM: A Backdoor Attack for Manipulating Text-to-Image Generative Models | J Kerekes Vice, Naveed Akhtar, Richard Hartley, Ajmal Mian | 2023-01-01 | IEEE Transactions on Information Forensics and Security | https://github.com/JJ-Vice/BAGM | https://doi.org/10.1109/tifs.2024.3386058 |
| 188 | Backdoor Activation Attack: Attack Large Language Models using Activation Steering for Safety-Alignment | Haoran Wang, Kai Shu | 2023-01-01 | arXiv | https://github.com/wang2226/Backdoor-Activation-Attack | https://doi.org/10.48550/arXiv.2311.09433 |
| 189 | Backdoor Attack with Sparse and Invisible Trigger | Yinghua Gao, Yiming Li, Xueluan Gong, Zhifeng Li, Shu-Tao Xia, Qian Wang | 2023-01-01 | IEEE Transactions on Information Forensics and Security | https://github.com/YinghuaGao/SIBA | https://doi.org/10.48550/arXiv.2306.06209 |
| 190 | BackdoorBox: A Python Toolbox for Backdoor Learning | Yiming Li, Mengxi Ya, Yang Bai, Yong Jiang, Shu-Tao Xia | 2023-01-01 | ICLR 2023 BANDS Spotlight | https://openreview.net/pdf/81b89920b0128744bafa5c1943ac1ed8b0a871c7.pdf | |
| 191 | Backdoor Defense via Adaptively Splitting Poisoned Dataset | Kuofeng Gao, Yang Bai, Jindong Gu, Yong Yang, Shu-Tao Xia | 2023-01-01 | 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) | https://github.com/KuofengGao/ASD. | https://doi.org/10.1109/CVPR52729.2023.00390 |
| 192 | Distilling Cognitive Backdoor Patterns within an Image | Hanxun Huang, Xingjun Ma, Sarah Monazam Erfani, James Bailey | 2023-01-01 | ICLR 2023 poster | https://openreview.net/pdf/9582391717db932771feaf1c877a1ff5a58478f5.pdf | |
| 193 | Black-box Backdoor Defense via Zero-shot Image Purification | Yucheng Shi, Mengnan Du, Xuansheng Wu, Zihan Guan, Jin Sun, Ninghao Liu | 2023-01-01 | NeurIPS | https://github.com/sycny/ZIP. | http://papers.nips.cc/paper_files/paper/2023/hash/b36554b97da741b1c48c9de05c73993e-Abstract-Conference.html |
| 194 | Rethinking Backdoor Data Poisoning Attacks in the Context of Semi-Supervised Learning | Marissa Catherine Connor, Vincent Emanuele | 2022-12-01 | Submitted to ICLR 2023 | https://openreview.net/pdf/1e8864ea33570efedf181847e8e700fc3a7e8855.pdf | |
| 195 | CorruptEncoder: Data Poisoning based Backdoor Attacks to Contrastive Learning | Jinghuai Zhang, Hongbin Liu, Jinyuan Jia, Neil Zhenqiang Gong | 2022-11-01 | OpenReview | https://openreview.net/pdf/a71769013eb8042087131d5a81891020c7af2964.pdf | |
| 196 | Rickrolling the Artist: Injecting Backdoors into Text Encoders for Text-to-Image Synthesis | Lukas Struppek, Dominik Hintersdorf, Kristian Kersting | 2022-11-01 | 2021 IEEE/CVF International Conference on Computer Vision (ICCV) | https://github.com/LukasStruppek/Rickrolling-the-Artist. | https://doi.org/10.1109/iccv51070.2023.00423 |
| 197 | Towards Out-of-Distribution Sequential Event Prediction: A Causal Treatment | Chenxiao Yang, Qitian Wu, Qingsong Wen, Zhiqiang Zhou, Liang Sun, Junchi Yan | 2022-10-31 | NeurIPS 2022 Accept | https://openreview.net/pdf/b5224a60869a26365b6e70239acbac055a762b08.pdf | |
| 198 | Rethinking the Reverse-engineering of Trojan Triggers | Zhenting Wang, Kai Mei, Hailun Ding, Juan Zhai, Shiqing Ma | 2022-10-31 | NeurIPS 2022 Accept | https://openreview.net/pdf/e8ad6cc8620c4cec22babbe51c8f36d680dcd00c.pdf | |
| 199 | BagFlip: A Certified Defense Against Data Poisoning | Yuhao Zhang, Aws Albarghouthi, Loris D'Antoni | 2022-10-31 | NeurIPS 2022 Accept | https://openreview.net/pdf/960044f35c0a2651737dc6ac8644ffd315d6a2dc.pdf | |
| 200 | Opportunistic Backdoor Attacks: Exploring Human-imperceptible Vulnerabilities on Speech Recognition Systems | Qiang Liu, Tongqing Zhou, Zhiping Cai, Yonghao Tang | 2022-10-10 | Proceedings of the 30th ACM International Conference on Multimedia | https://github.com/lqsunshine/DABA. | https://openreview.nethttps://dl.acm.org/doi/abs/10.1145/3503161.3548261 |
| 201 | Expose Backdoors on the Way: A Feature-Based Efficient Defense against Textual Backdoor Attacks | Sishuo Chen, Wenkai Yang, Zhiyuan Zhang, Xiaohan Bi, Xu Sun | 2022-10-01 | OpenAlex | https://github.com/lancopku/DAN. | https://doi.org/10.18653/v1/2022.findings-emnlp.47 |
| 202 | Motif-Backdoor: Rethinking the Backdoor Attack on Graph Neural Networks via Motifs | Haibin Zheng, Haiyang Xiong, Jinyin Chen, Haonan Ma, Guohan Huang | 2022-10-01 | IEEE Transactions on Computational Social Systems | https://github.com/Seaocn/Motif-Backdoor | https://doi.org/10.1109/tcss.2023.3267094 |
| 203 | Thinking Two Moves Ahead: Anticipating Other Users Improves Backdoor Attacks in Federated Learning | Yuxin Wen, Jonas Geiping, Liam H Fowl, Hossein Souri, Rama Chellappa, Micah Goldblum, Tom Goldstein | 2022-10-01 | Submitted to ICLR 2023 | https://openreview.net/pdf/f0d55f776bc33c4bd42632e2a4a381cc8a49356b.pdf | |
| 204 | Trap and Replace: Defending Backdoor Attacks by Trapping Them into an Easy-to-Replace Subnetwork | Haotao Wang, Junyuan Hong, Aston Zhang, Jiayu Zhou, Zhangyang Wang | 2022-10-01 | NeurIPS 2022 Accept | http://papers.nips.cc/paper_files/paper/2022/hash/ea06e6e9e80f1c3d382317fff67041ac-Abstract-Conference.html | |
| 205 | Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protection | Yiming Li, Yang Bai, Yong Jiang, Yong Yang, Shu-Tao Xia, Bo Li | 2022-10-01 | NeurIPS 2022 Accept | http://papers.nips.cc/paper_files/paper/2022/hash/55bfedfd31489e5ae83c9ce8eec7b0e1-Abstract-Conference.html | |
| 206 | FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning | Kaiyuan Zhang, Guanhong Tao, Qiuling Xu, Siyuan Cheng, Shengwei An, Yingqi Liu, Shiwei Feng, Guangyu Shen, Pin-Yu Chen, ... | 2022-10-01 | ICLR 2023 poster | https://openreview.net/pdf/6731b5784520aedd43f4da6cb01e5587b66819be.pdf | |
| 207 | TransCAB: Transferable Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World | Hua Ma, Yinshan Li, Yansong Gao, Zhi Zhang, Alsharif Abuadbba, Anmin Fu, Said F. Al-Sarawi, Surya Nepal, Derek Abbott | 2022-09-01 | OpenAlex | https://github.com/inconstance/T-shirt-natural-backdoor-dataset | https://doi.org/10.1109/SRDS60354.2023.00018 |
| 208 | Deep Fidelity in DNN Watermarking: A Study of Backdoor Watermarking for Classification Models | Guang Hua, Andrew Beng Jin Teoh | 2022-08-01 | Pattern Recognition, Vol. 144, Dec. 2023 | https://github.com/ghua-ac/dnn_watermark. | https://doi.org/10.1016/j.patcog.2023.109844 |
| 209 | Friendly Noise against Adversarial Noise: A Powerful Defense against Data Poisoning Attacks | Tian Yu Liu, Yu Yang, Baharan Mirzasoleiman | 2022-08-01 | NeurIPS 2022 Accept | https://openreview.net/pdf/d929e1c412e3fecf6a4fb8991f306a09330510c6.pdf | |
| 210 | RIBAC: Towards Robust and Imperceptible Backdoor Attack against Compact DNN | Huy P. Phan, Cong Shi, Yi Xie, Tianfang Zhang, Zhuohang Li, Tianming Zhao, Jian Liu, Yan Wang, Yingying Chen, Bo Yuan | 2022-08-01 | European Conference on Computer Vision (ECCV 2022) | https://github.com/huyvnphan/ECCV2022-RIBAC | https://doi.org/10.1007/978-3-031-19772-7_41 |
| 211 | Data-Efficient Backdoor Attacks | Pengfei Xia, Ziqiang Li, Wei Zhang, Bin Li | 2022-07-01 | Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence | https://github.com/xpf/Data-Efficient-Backdoor-Attacks. | https://openreview.nethttps://www.ijcai.org/proceedings/2022/0554.pdf |
| 212 | Backdoor Attacks on Self-Supervised Learning | Aniruddha Saha, Ajinkya Tejankar, Soroush Abbasi Koohpayegani, Hamed Pirsiavash | 2022-06-01 | 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) | https://github.com/UMBCvision/SSL-Backdoor | https://doi.org/10.1109/cvpr52688.2022.01298 |
| 213 | A Unified Evaluation of Textual Backdoor Learning: Frameworks and Benchmarks | Ganqu Cui, Lifan Yuan, Bingxiang He, Yangyi Chen, Zhiyuan Liu, Maosong Sun | 2022-06-01 | NeurIPS 2022 Datasets and Benchmarks | http://papers.nips.cc/paper_files/paper/2022/hash/2052b3e0617ecb2ce9474a6feaf422b3-Abstract-Datasets_and_Benchmarks.html | |
| 214 | Imperceptible Backdoor Attack: From Input Space to Feature Representation | Nan Zhong, Zhenxing Qian, Xinpeng Zhang | 2022-05-01 | Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence | https://github.com/Ekko-zn/IJCAI2022-Backdoor. | https://doi.org/10.48550/arXiv.2205.03190 |
| 215 | Quarantine: Sparsity Can Uncover the Trojan Attack Trigger for Free | Tianlong Chen, Zhenyu Zhang, Yihua Zhang, Shiyu Chang, Sijia Liu, Zhangyang Wang | 2022-05-01 | arXiv | https://github.com/VITA-Group/Backdoor-LTH. | http://arxiv.org/abs/2205.11819v1 |
| 216 | Enhancing Backdoor Attacks With Multi-Level MMD Regularization | Pengfei Xia, Hongjing Niu, Ziqiang Li, Bin Li | 2022-03-28 | IEEE Transactions on Dependable and Secure Computing | https://github.com/xpf/Multi-Level-MMD-Regularization. | https://doi.org/10.1109/tdsc.2022.3161477 |
| 217 | Partial Identification with Noisy Covariates: A Robust Optimization Approach | Wenshuo Guo, Mingzhang Yin, Yixin Wang, Michael Jordan | 2022-02-09 | CLeaR 2022 Poster | https://openreview.net/pdf/e1406a39171680783aba296614172a44fd6bdbf7.pdf | |
| 218 | Training with More Confidence: Mitigating Injected and Natural Backdoors During Training | Zhenting Wang, Hailun Ding, Juan Zhai, Shiqing Ma | 2022-02-01 | NeurIPS 2022 Accept | http://papers.nips.cc/paper_files/paper/2022/hash/ec0c9ca85b4ea49c7ebfb503cf55f2ae-Abstract-Conference.html | |
| 219 | Under-confidence Backdoors Are Resilient and Stealthy Backdoors | Minlong Peng, Zidi Xiong, Quang H. Nguyen, Mingming Sun, Khoa D. Doan, Ping Li | 2022-02-01 | arXiv | https://github.com/v-mipeng/LabelSmoothedAttack.git | http://arxiv.org/abs/2202.11203v2 |
| 220 | Trigger Hunting with a Topological Prior for Trojan Detection | Xiaoling Hu, Xiao Lin, Michael Cogswell, Yi Yao, Susmit Jha, Chao Chen | 2022-01-28 | ICLR 2022 Poster | https://openreview.net/pdf/4db1d42d467c296c5ec7fa3f38e37dcb5c140e84.pdf | |
| 221 | Few-shot Backdoor Attacks via Neural Tangent Kernels | Jonathan Hayase, Sewoong Oh | 2022-01-01 | ICLR 2023 poster | https://openreview.net/pdf/fbf6611dad17d0a7975a0a139013d45d767f9c59.pdf | |
| 222 | Textual Backdoor Attacks Can Be More Harmful via Two Simple Tricks | Yangyi Chen, Fanchao Qi, Hongcheng Gao, Zhiyuan Liu, Maosong Sun | 2022-01-01 | Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing | https://github.com/thunlp/StyleAttack. | https://openreview.net/pdf/09ec283781ceeabec1fbbbfda26653cf25e8db09.pdf |
| 223 | Stealthy Backdoors as Compression Artifacts | Yulong Tian, Fnu Suya, Fengyuan Xu, David Evans | 2022-01-01 | IEEE Transactions on Information Forensics and Security | https://github.com/yulongtzzz/Stealthy-Backdoors-as-Compression-Artifacts | https://doi.org/10.1109/tifs.2022.3160359 |
| 224 | Provable Defense against Backdoor Policies in Reinforcement Learning | Shubham Kumar Bharti, Xuezhou Zhang, Adish Singla, Xiaojin Zhu | 2022-01-01 | NeurIPS 2022 Accept | http://papers.nips.cc/paper_files/paper/2022/hash/5e67e6a814526079ad8505bf6d926fb6-Abstract-Conference.html | |
| 225 | Post-Training Detection of Backdoor Attacks for Two-Class and Multi-Attack Scenarios | Zhen Xiang, David J. Miller, George Kesidis | 2022-01-01 | ICLR 2022 Poster | https://openreview.net/pdf/ab4bf90af1442414ba5fa816448b5b73d44ecb92.pdf | |
| 226 | Model-Contrastive Learning for Backdoor Elimination | Zhihao Yue, Jun Xia, Zhiwei Ling, Ming Hu, Ting Wang, Xian Wei, Mingsong Chen | 2022-01-01 | ACM Multimedia | https://github.com/WeCanShow/MCL. | https://doi.org/10.48550/arXiv.2205.04411 |
| 227 | Label-Smoothed Backdoor Attack | Minlong Peng, Zidi Xiong, Mingming Sun, Ping Li | 2022-01-01 | arXiv | https://github.com/v-mipeng/LabelSmoothedAttack.git | https://arxiv.org/abs/2202.11203 |
| 228 | Imperceptible and Robust Backdoor Attack in 3D Point Cloud | Kuofeng Gao, Jiawang Bai, Baoyuan Wu, Mengxi Ya, Shu-Tao Xia | 2022-01-01 | IEEE Transactions on Information Forensics and Security | https://github.com/KuofengGao/IRBA | https://doi.org/10.48550/arXiv.2208.08052 |
| 229 | Identifying a Training-Set Attack's Target Using Renormalized Influence Estimation | Zayd Hammoudeh, Daniel Lowd | 2022-01-01 | arXiv | https://github.com/ZaydH/target_identification. | http://arxiv.org/abs/2201.10055v2 |
| 230 | How to Backdoor Diffusion Models? | Sheng-Yen Chou, Pin-Yu Chen, Tsung-Yi Ho | 2022-01-01 | 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) | https://openreview.net/pdf/1dc679066d3bc93c7cd365d2948a2a48e4d2ff3a.pdf | |
| 231 | Few-Shot Backdoor Attacks on Visual Object Tracking | Yiming Li, Haoxiang Zhong, Xingjun Ma, Yong Jiang, Shu-Tao Xia | 2022-01-01 | ICLR 2022 Poster | https://openreview.net/pdf/132d1b18d6c8d837cebbdb801781870f713295cb.pdf | |
| 232 | Backdoor Attacks on Vision Transformers | Akshayvarun Subramanya, Aniruddha Saha, Soroush Abbasi Koohpayegani, Ajinkya Tejankar, Hamed Pirsiavash | 2022-01-01 | arXiv | https://github.com/UCDvision/backdoor_transformer.git | https://doi.org/10.48550/arXiv.2206.08477 |
| 233 | An Adaptive Black-box Backdoor Detection Method for Deep Neural Networks | Xinqiao Zhang, Huili Chen, Ke Huang, Farinaz Koushanfar | 2022-01-01 | arXiv | https://github.com/xinqiaozhang/adatrojan | https://doi.org/10.48550/arXiv.2204.04329 |
| 234 | Augmentation Backdoors | Joseph Rance, Yiren Zhao, Ilia Shumailov, Robert D. Mullins | 2022-01-01 | ICLR 2023 BANDS Spotlight | https://openreview.net/pdf/59a474155bd99e72fd1d60447640fe322d4f340d.pdf | |
| 235 | Backdoor Attacks in the Supply Chain of Masked Image Modeling | Xinyue Shen, Xinlei He, Zheng Li, Yun Shen, Michael Backes, Yang Zhang | 2022-01-01 | OpenReview | https://openreview.net/pdf/0c5ec0b08ce9e3512fdc3d80cd06802dbb8ef089.pdf | |
| 236 | Architectural Backdoors in Neural Networks | Mikel Bober-Irizar, Ilia Shumailov, Yiren Zhao, Robert D. Mullins, Nicolas Papernot | 2022-01-01 | 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) | https://openreview.net/pdf/c202e3f7b58579019c2ae7534b94815d06eda13d.pdf | |
| 237 | Backdoor Defense via Decoupling the Training Process | Kunzhe Huang, Yiming Li, Baoyuan Wu, Zhan Qin, Kui Ren | 2022-01-01 | ICLR 2022 Poster | https://openreview.net/pdf/825a2fee50fe494bcf13085113d2a7565af192b6.pdf | |
| 238 | BadPrompt: Backdoor Attacks on Continuous Prompts | Xiangrui Cai, Haidong Xu, Sihan Xu, Ying Zhang, Xiaojie Yuan | 2022-01-01 | NeurIPS 2022 Accept | http://papers.nips.cc/paper_files/paper/2022/hash/f0722b58f02d7793acf7d328928f933a-Abstract-Conference.html | |
| 239 | Black-box Dataset Ownership Verification via Backdoor Watermarking | Yiming Li, Mingyan Zhu, Xue Yang, Yong Jiang, Tao Wei, Shu-Tao Xia | 2022-01-01 | IEEE Transactions on Information Forensics and Security | https://github.com/THUYimingLi/DVBW. | https://doi.org/10.1109/TIFS.2023.3265535 |
| 240 | Data-Free Backdoor Removal Based on Channel Lipschitzness | Runkai Zheng, Rongjun Tang, Jianze Li, Li Liu | 2022-01-01 | Lecture notes in computer science | https://github.com/rkteddy/channel-Lipschitzness-based-pruning. | https://doi.org/10.1007/978-3-031-20065-6_11 |
| 241 | FIBA: Frequency-Injection based Backdoor Attack in Medical Image Analysis | Yu Feng, Benteng Ma, Jing Zhang, Shanshan Zhao, Yong Xia, Dacheng Tao | 2021-12-01 | 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) | https://github.com/HazardFY/FIBA. | https://doi.org/10.1109/cvpr52688.2022.02021 |
| 242 | Manipulating SGD with Data Ordering Attacks | Ilia Shumailov, Zakhar Shumaylov, Dmitry Kazhdan, Yiren Zhao, Nicolas Papernot, Murat A. Erdogdu, Ross Anderson | 2021-11-09 | NeurIPS 2021 Poster | https://openreview.net/pdf/38b5087efcece7a26b421cd3cd7e0a2a30c8096e.pdf | |
| 243 | Qu-ANTI-zation: Exploiting Quantization Artifacts for Achieving Adversarial Outcomes | Sanghyun Hong, Michael-Andrei Panaitescu-Liess, Yigitcan Kaya, Tudor Dumitras | 2021-11-09 | NeurIPS 2021 Poster | https://openreview.net/pdf/d99b499610c11e58db2b8e2b8b421fbd7ec493a8.pdf | |
| 244 | A Kernel Test for Causal Association via Noise Contrastive Backdoor Adjustment | Robert Hu, Dino Sejdinovic, Robin J. Evans | 2021-11-01 | J. Mach. Learn. Res. | https://github.com/MrHuff/kgformula | https://jmlr.org/papers/v25/21-1409.html |
| 245 | Anomaly Localization in Model Gradients Under Backdoor Attacks Against Federated Learning | Zeki Bilgin | 2021-11-01 | OpenAlex | https://github.com/ArcelikAcikKaynak/Federated_Learning.git | https://dblp.uni-trier.de/db/journals/corr/corr2111.html#abs-2111-14683 |
| 246 | Adversarial Neuron Pruning Purifies Backdoored Deep Models | Dongxian Wu, Yisen Wang | 2021-10-27 | NeurIPS 2021 Poster | https://proceedings.neurips.cc/paper/2021/hash/8cbe9ce23f42628c98f80fa0fac8b19a-Abstract.html | |
| 247 | Anti-Backdoor Learning: Training Clean Models on Poisoned Data | Yige Li, Xixiang Lyu, Nodens Koren, Lingjuan Lyu, Bo Li, Xingjun Ma | 2021-10-21 | NeurIPS 2021 Poster | https://proceedings.neurips.cc/paper/2021/hash/7d38b1e9bd793d3f45e0e212a729a93c-Abstract.html | |
| 248 | Mind the Style of Text! Adversarial and Backdoor Attacks Based on Text Style Transfer | Fanchao Qi, Yang‐Yi Chen, Xurui Zhang, Mukai Li, Zhiyuan Liu, Maosong Sun | 2021-10-01 | Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing | https://github.com/thunlp/StyleAttack. | https://doi.org/10.18653/v1/2021.emnlp-main.374 |
| 249 | RAP: Robustness-Aware Perturbations for Defending against Backdoor Attacks on NLP Models | Wenkai Yang, Yankai Lin, Peng Li, Jie Zhou, Xu Sun | 2021-10-01 | Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing | https://github.com/lancopku/RAP. | https://doi.org/10.18653/v1/2021.emnlp-main.659 |
| 250 | A Backdoor Attack against 3D Point Cloud Classifiers | Zhen Xiang, David J. Miller, Siheng Chen, Xi Li, George Kesidis | 2021-10-01 | 2021 IEEE/CVF International Conference on Computer Vision (ICCV) | https://github.com/zhenxianglance/PCBA. | https://doi.org/10.1109/iccv48922.2021.00750 |
| 251 | Invisible Backdoor Attack with Sample-Specific Triggers | Yuezun Li, Yiming Li, Baoyuan Wu, Longkang Li, Ran He, Siwei Lyu | 2021-10-01 | 2021 IEEE/CVF International Conference on Computer Vision (ICCV) | https://github.com/yuezunli/ISSBA. | https://doi.org/10.1109/iccv48922.2021.01615 |
| 252 | AEVA: Black-box Backdoor Detection Using Adversarial Extreme Value Analysis | Junfeng Guo, Ang Li, Cong Liu | 2021-10-01 | ICLR 2022 Poster | https://openreview.net/pdf/b8ad85b4ddd615a5abac4d7c1d5713fc92b9f0e9.pdf | |
| 253 | Backdoor Attack on Hash-based Image Retrieval via Clean-label Data Poisoning | Kuofeng Gao, Jiawang Bai, Bin Chen, Dongxian Wu, Shu-Tao Xia | 2021-09-01 | BMVC | https://github.com/KuofengGao/CIBA. | http://proceedings.bmvc2023.org/172/ |
| 254 | BACKDOORL: Backdoor Attack against Competitive Reinforcement Learning | Lun Wang, Zaynah Javed, Xian Wu, Wenbo Guo, Xinyu Xing, Dawn Song | 2021-08-01 | OpenAlex | https://github.com/wanglun1996/multi_agent_rl_backdoor_videos. | https://doi.org/10.24963/ijcai.2021/509 |
| 255 | BadEncoder: Backdoor Attacks to Pre-trained Encoders in Self-Supervised Learning | Jinyuan Jia, Yupei Liu, Neil Zhenqiang Gong | 2021-08-01 | 2022 IEEE Symposium on Security and Privacy (SP) | https://github.com/jjy1994/BadEncoder. | https://openreview.nethttps://arxiv.org/pdf/2108.00352.pdf |
| 256 | Sleeper Agent: Scalable Hidden Trigger Backdoors for Neural Networks Trained from Scratch | Hossein Souri, Liam H Fowl, Rama Chellappa, Micah Goldblum, Tom Goldstein | 2021-06-01 | NeurIPS 2022 Accept | http://papers.nips.cc/paper_files/paper/2022/hash/79eec295a3cd5785e18c61383e7c996b-Abstract-Conference.html | |
| 257 | Turn the Combination Lock: Learnable Textual Backdoor Attacks via Word Substitution | Fanchao Qi, Yuan Yao, Sophia Xu, Zhiyuan Liu, Maosong Sun | 2021-06-01 | ACL/IJCNLP | https://github.com/thunlp/BkdAtk-LWS. | https://doi.org/10.18653/v1/2021.acl-long.377 |
| 258 | Incompatibility Clustering as a Defense Against Backdoor Poisoning Attacks | Charles Jin, Melinda Sun, Martin C. Rinard | 2021-05-01 | ICLR 2023 poster | https://github.com/charlesjin/compatibility_clustering | https://openreview.net/pdf/e27bb4c7787b3770053151428e69c5ab0f279dd2.pdf |
| 259 | SPECTRE: Defending Against Backdoor Attacks Using Robust Statistics | Jonathan Hayase, Weihao Kong, Raghav Somani, Sewoong Oh | 2021-04-22 | arXiv | https://github.com/SewoongLab/spectre-defense | http://export.arxiv.org/pdf/2104.11315 |
| 260 | Targeted Attack against Deep Neural Networks via Flipping Limited Weight Bits | Jiawang Bai, Baoyuan Wu, Yong Zhang, Yiming Li, Zhifeng Li, Shu-Tao Xia | 2021-02-01 | ICLR 2021 Poster | https://openreview.net/pdf/ed4d75e28ae70ba28f4895cf7097cf634745d11a.pdf | |
| 261 | Neural Attention Distillation: Erasing Backdoor Triggers from Deep Neural Networks | Yige Li, Xixiang Lyu, Nodens Koren, Lingjuan Lyu, Bo Li, Xingjun Ma | 2021-01-14 | ICLR 2021 Poster | https://openreview.net/pdf/42f5786a622e8cdc4ce43d79d5d83ebe8e4feeeb.pdf | |
| 262 | Witches' Brew: Industrial Scale Data Poisoning via Gradient Matching | Jonas Geiping, Liam H Fowl, W. Ronny Huang, Wojciech Czaja, Gavin Taylor, Michael Moeller, Tom Goldstein | 2021-01-12 | ICLR 2021 Poster | https://openreview.net/pdf/3a3c570da85848de52605f6669aae395d063027b.pdf | |
| 263 | WaNet -- Imperceptible Warping-based Backdoor Attack | Tuan Anh Nguyen, Anh Tuan Tran | 2021-01-01 | International Conference on Learning Representations | https://openreview.net/pdf/db3277f5b47619abfe13880772b864960e98f643.pdf | |
| 264 | Use Procedural Noise to Achieve Backdoor Attack | Xuan Chen, Yuena Ma, Shiwei Lu | 2021-01-01 | IEEE Access | https://github.com/928082786/pnoiseattack. | https://doi.org/10.1109/access.2021.3110239 |
| 265 | Red Alarm for Pre-trained Models: Universal Vulnerabilities by Neuron-Level Backdoor Attacks | Zhengyan Zhang, Guangxuan Xiao, Yongwei Li, Tian Lv, Fanchao Qi, Zhiyuan Liu, Yasheng Wang, Xin Jiang, Maosong Sun | 2021-01-01 | ICML 2021 Workshop AML Poster | https://openreview.net/pdf/1cc11ab778ba03f41a45f941b3a3e42ccb867cc6.pdf | |
| 266 | Hidden Killer: Invisible Textual Backdoor Attacks with Syntactic Trigger | Fanchao Qi, Mukai Li, Yangyi Chen, Zhengyan Zhang, Zhiyuan Liu, Yasheng Wang, Maosong Sun | 2021-01-01 | ACL/IJCNLP | https://github.com/thunlp/HiddenKiller. | https://doi.org/10.18653/v1/2021.acl-long.37 |
| 267 | ONION: A Simple and Effective Defense Against Textual Backdoor Attacks | Fanchao Qi, Yangyi Chen, Mukai Li, Yuan Yao, Zhiyuan Liu, Maosong Sun | 2021-01-01 | Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing | https://github.com/thunlp/ONION. | https://doi.org/10.18653/v1/2021.emnlp-main.752 |
| 268 | Excess Capacity and Backdoor Poisoning | Naren Sarayu Manoj, Avrim Blum | 2021-01-01 | NeurIPS 2021 Spotlight | https://proceedings.neurips.cc/paper/2021/hash/aaebdb8bb6b0e73f6c3c54a0ab0c6415-Abstract.html | |
| 269 | Handcrafted Backdoors in Deep Neural Networks | Sanghyun Hong, Nicholas Carlini, Alexey Kurakin | 2021-01-01 | NeurIPS 2022 Accept | http://papers.nips.cc/paper_files/paper/2022/hash/3538a22cd3ceb8f009cc62b9e535c29f-Abstract-Conference.html | |
| 270 | CRFL: Certifiably Robust Federated Learning against Backdoor Attacks | Chulin Xie, Minghao Chen, Pin-Yu Chen, Bo Li | 2021-01-01 | OpenAlex | https://github.com/AI-secure/CRFL. | http://proceedings.mlr.press/v139/xie21a.html |
| 271 | An Optimization Perspective on Realizing Backdoor Injection Attacks on Deep Neural Networks in Hardware | M. Caner Tol, Saad Islam, Berk Sunar, Ziming Zhang | 2021-01-01 | ICLR 2022 Submitted | https://openreview.net/pdf/628fdbcebf74b3b22b28cf024722d2d5b78c9136.pdf | |
| 272 | Adversarial Unlearning of Backdoors via Implicit Hypergradient | Yi Zeng, Si Chen, Won Park, Z. Morley Mao, Ming Jin, Ruoxi Jia | 2021-01-01 | ICLR 2022 Poster | https://openreview.net/pdf/6aeb6e81c9d0eadbb4cfbefb6caac0f155d561ea.pdf | |
| 273 | Poisoned classifiers are not only backdoored, they are fundamentally broken | Mingjie Sun, Siddhant Agarwal, J. Zico Kolter | 2020-10-01 | ICLR 2022 Submitted | https://openreview.net/pdf/4959459ccc8a6c2d401fe6ca978ce4b82b4f3ff0.pdf | |
| 274 | Weight Poisoning Attacks on Pre-trained Models | Keita Kurita, Paul Michel, Graham Neubig | 2020-04-01 | arXiv | https://github.com/neulab/RIPPLe. | http://arxiv.org/abs/2004.06660v1 |
| 275 | Backdoor Attack against Speaker Verification | Tongqing Zhai, Yiming Li, Ziqi Zhang, Baoyuan Wu, Yong Jiang, Shu-Tao Xia | 2020-01-01 | ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) | https://github.com/zhaitongqing233/Backdoor-attack-against-speaker-verification. | https://doi.org/10.1109/ICASSP39728.2021.9413468 |
| 276 | Backdoor Learning: A Survey | Yiming Li, Baoyuan Wu, Yong Jiang, Zhifeng Li, Shu-Tao Xia | 2020-01-01 | IEEE Transactions on Neural Networks and Learning Systems | https://github.com/THUYimingLi/backdoor-learning-resources | https://doi.org/10.1109/TNNLS.2022.3182979 |
| 277 | Graph Backdoor | Zhaohan Xi, Ren Pang, Shouling Ji, Ting Wang | 2020-01-01 | USENIX Security Symposium | https://github.com/HarrialX/GraphBackdoor | https://www.usenix.org/conference/usenixsecurity21/presentation/xi |
| 278 | Input-Aware Dynamic Backdoor Attack | Tuan Anh Nguyen, Anh Tuan Tran | 2020-01-01 | Neural Information Processing Systems | https://github.com/VinAIResearch/input-aware-backdoor-attack-release. | https://openreview.nethttp://proceedings.neurips.cc/paper/2020/file/234e691320c0ad5b45ee3c96d0d7b8f8-Paper.pdf |
| 279 | Rethinking the Trigger of Backdoor Attack | Yiming Li, Tongqing Zhai, Baoyuan Wu, Yong Jiang, Zhifeng Li, Shu-Tao Xia | 2020-01-01 | OpenReview | https://openreview.net/pdf/f41085225b4c2960c0e50e0201c0c0ab536e020f.pdf | |
| 280 | Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness | Pu Zhao, Pin-Yu Chen, Payel Das, Karthikeyan Natesan Ramamurthy, Xue Lin | 2019-12-19 | OpenReview | https://openreview.net/pdf/fb8082dd5515e11c88f59b0f4911266f1891fb61.pdf | |
| 281 | Attack-Resistant Federated Learning with Residual-based Reweighting | Shuhao Fu, Chulin Xie, Bo Li, Qifeng Chen | 2019-12-01 | OpenReview | https://openreview.net/pdf/1ea807b624ecc563e3b617f0948502afeee0ec8c.pdf |