We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 2,765 results
  1. Imperceptible and multi-channel backdoor attack

    Recent researches demonstrate that Deep Neural Networks (DNN) models are vulnerable to backdoor attacks. The backdoored DNN model will behave...

    Mingfu Xue, Shifeng Ni, ... Weiqiang Liu in Applied Intelligence
    Article 29 December 2023
  2. Enhanced Coalescence Backdoor Attack Against DNN Based on Pixel Gradient

    Deep learning has been widely used in many applications such as face recognition, autonomous driving, etc. However, deep learning models are...

    Jianyao Yin, Honglong Chen, ... Yudong Gao in Neural Processing Letters
    Article Open access 19 March 2024
  3. Compression-resistant backdoor attack against deep neural networks

    In recent years, a number of backdoor attacks against deep neural networks (DNN) have been proposed. In this paper, we reveal that backdoor attacks...

    Mingfu Xue, **n Wang, ... Weiqiang Liu in Applied Intelligence
    Article 12 April 2023
  4. Active poisoning: efficient backdoor attacks on transfer learning-based brain-computer interfaces

    Transfer learning (TL) has been widely used in electroencephalogram (EEG)-based brain-computer interfaces (BCIs) for reducing calibration efforts....

    Xue Jiang, Lubin Meng, ... Dongrui Wu in Science China Information Sciences
    Article 26 July 2023
  5. Invisible backdoor learning in regional transform domain

    The rapid develo** deep learning is highly required by resources and computing resources, which easily leads to backdoor learnings. It is difficult...

    Yuyuan Sun, Yuliang Lu, ... Xuan Wang in Neural Computing and Applications
    Article 28 February 2024
  6. NBA: defensive distillation for backdoor removal via neural behavior alignment

    Recently, deep neural networks have been shown to be vulnerable to backdoor attacks. A backdoor is inserted into neural networks via this attack...

    Zonghao Ying, Bin Wu in Cybersecurity
    Article Open access 03 July 2023
  7. A stealthy and robust backdoor attack via frequency domain transform

    Deep learning models are vulnerable to backdoor attacks, where an adversary aims to inject a hidden backdoor into the deep learning models, such that...

    Ruitao Hou, Teng Huang, ... Weixuan Tang in World Wide Web
    Article 10 May 2023
  8. DLP: towards active defense against backdoor attacks with decoupled learning process

    Deep learning models are well known to be susceptible to backdoor attack, where the attacker only needs to provide a tampered dataset on which the...

    Zonghao Ying, Bin Wu in Cybersecurity
    Article Open access 01 May 2023
  9. Backdoor Attacks against Learning-Based Algorithms

    This book introduces a new type of data poisoning attack, dubbed, backdoor attack. In backdoor attacks, an attacker can train the model with poisoned...
    Shaofeng Li, Hao** Zhu, ... Xuemin (Sherman) Shen in Wireless Networks
    Book 2024
  10. Red Alarm for Pre-trained Models: Universal Vulnerability to Neuron-level Backdoor Attacks

    The pre-training-then-fine-tuning paradigm has been widely used in deep learning. Due to the huge computation cost for pre-training, practitioners...

    Zhengyan Zhang, Guangxuan **ao, ... Maosong Sun in Machine Intelligence Research
    Article Open access 02 March 2023
  11. Black-Box Graph Backdoor Defense

    Recently, graph neural networks (GNNs) have been proven to be vulnerable to backdoor attacks, wherein the test prediction of the model is manipulated...
    **ao Yang, Gaolei Li, ... Jianhua Li in Algorithms and Architectures for Parallel Processing
    Conference paper 2024
  12. Literature Review of Backdoor Attacks

    In this chapter, we first introduce three application areas of deep neural networks, including computer vision, natural language processing, and...
    Shaofeng Li, Hao** Zhu, ... Xuemin (Sherman) Shen in Backdoor Attacks against Learning-Based Algorithms
    Chapter 2024
  13. Backdoor Attacks and Defense in FL

    Federated Learning (FL) has received significant interest from both the research field and industry perspective. One of the most promising cross-silo...
    Shaofeng Li, Hao** Zhu, ... Xuemin (Sherman) Shen in Backdoor Attacks against Learning-Based Algorithms
    Chapter 2024
  14. Backdoor Attack on Dynamic Link Prediction

    Based on historical information, graph prediction is performed by Dynamic Link Prediction (DLP). The quality of the training data plays a crucial...
    **yin Chen, **min Zhang, Haibin Zheng in Attacks, Defenses and Testing for Deep Learning
    Chapter 2024
  15. TRGE: A Backdoor Detection After Quantization

    Quantization is evolving as the main technique for efficient deployment of deep neural networks to hardware devices, especially edge devices....
    Renhua **e, Xuxin Fang, ... **aoyong Yuan in Information Security and Cryptology
    Conference paper 2024
  16. Backdoor Attacks Leveraging Latent Representation in Competitive Learning

    Backdoor attacks on machine learning are attacks where an adversary obtains the expected output for a particular input called a trigger, and a...
    Kazuki Iwahana, Naoto Yanai, Toru Fujiwara in Computer Security. ESORICS 2023 International Workshops
    Conference paper 2024
  17. Evil vs evil: using adversarial examples to against backdoor attack in federated learning

    As a distributed learning paradigm, federated learning (FL) has shown great success in aggregating information from different clients to train a...

    Tao Liu, Mingjun Li, ... **yin Chen in Multimedia Systems
    Article 29 June 2022
  18. Distributed Backdoor Attacks in Federated Learning Generated by DynamicTriggers

    The emergence of federated learning has alleviated the dual challenges of data silos and data privacy and security in machine learning. However, this...
    Jian Wang, Hong Shen, ... Yuli Li in Information Security Theory and Practice
    Conference paper 2024
  19. BadDet: Backdoor Attacks on Object Detection

    Backdoor attack is a severe security threat which injects a backdoor trigger into a small portion of training data such that the trained model gives...
    Shih-Han Chan, Yinpeng Dong, ... Jun Zhou in Computer Vision – ECCV 2022 Workshops
    Conference paper 2023
  20. DFaP: Data Filtering and Purification Against Backdoor Attacks

    The rapid development of deep learning has led to a dramatic increase in user demand for training data. As a result, users are often compelled to...
    Haochen Wang, Tianshi Mu, ... Yuanzhang Li in Artificial Intelligence Security and Privacy
    Conference paper 2024
Did you find what you were looking for? Share feedback.