Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1811.00636
Cited By
Spectral Signatures in Backdoor Attacks
1 November 2018
Brandon Tran
Jerry Li
Aleksander Madry
AAML
Re-assign community
ArXiv
PDF
HTML
Papers citing
"Spectral Signatures in Backdoor Attacks"
44 / 44 papers shown
Title
A Linear Approach to Data Poisoning
Diego Granziol
Donald Flynn
AAML
69
0
0
21 May 2025
Efficient Multivariate Robust Mean Estimation Under Mean-Shift Contamination
Ilias Diakonikolas
Giannis Iakovidis
D. Kane
Thanasis Pittas
133
0
0
20 Feb 2025
Show Me Your Code! Kill Code Poisoning: A Lightweight Method Based on Code Naturalness
Weisong Sun
Yuchen Chen
Mengzhe Yuan
Chunrong Fang
Zhenpeng Chen
Chong Wang
Yang Liu
Baowen Xu
Zhenyu Chen
AAML
55
1
0
20 Feb 2025
PCAP-Backdoor: Backdoor Poisoning Generator for Network Traffic in CPS/IoT Environments
Ajesh Koyatan Chathoth
Stephen Lee
52
0
0
26 Jan 2025
MADE: Graph Backdoor Defense with Masked Unlearning
Xiao Lin amd Mingjie Li
Mingjie Li
Yisen Wang
AAML
125
2
0
03 Jan 2025
Defending Multimodal Backdoored Models by Repulsive Visual Prompt Tuning
Zhifang Zhang
Shuo He
Bingquan Shen
Lei Feng
Lei Feng
AAML
85
0
0
29 Dec 2024
Game-Theoretic Defenses for Robust Conformal Prediction Against Adversarial Attacks in Medical Imaging
Rui Luo
Jie Bao
Zhixin Zhou
Chuangyin Dang
MedIm
AAML
120
5
0
07 Nov 2024
AdvBDGen: Adversarially Fortified Prompt-Specific Fuzzy Backdoor Generator Against LLM Alignment
Pankayaraj Pathmanathan
Udari Madhushani Sehwag
Michael-Andrei Panaitescu-Liess
Furong Huang
SILM
AAML
66
0
0
15 Oct 2024
Backdooring Vision-Language Models with Out-Of-Distribution Data
Weimin Lyu
Jiachen Yao
Saumya Gupta
Lu Pang
Tao Sun
Lingjie Yi
Lijie Hu
Haibin Ling
Chao Chen
VLM
AAML
80
4
0
02 Oct 2024
2DSig-Detect: a semi-supervised framework for anomaly detection on image data using 2D-signatures
Xinheng Xie
Kureha Yamaguchi
Margaux Leblanc
Simon Malzard
Varun Chhabra
Victoria Nockles
Yue-bo Wu
AAML
98
0
0
08 Sep 2024
Pre-trained Encoder Inference: Revealing Upstream Encoders In Downstream Machine Learning Services
Shaopeng Fu
Xuexue Sun
Ke Qing
Tianhang Zheng
Di Wang
AAML
MIACV
SILM
85
0
0
05 Aug 2024
PSBD: Prediction Shift Uncertainty Unlocks Backdoor Detection
Wei Li
Pin-Yu Chen
Sijia Liu
Ren Wang
AAML
67
3
0
09 Jun 2024
Towards Sample-specific Backdoor Attack with Clean Labels via Attribute Trigger
Yiming Li
Mingyan Zhu
Junfeng Guo
Tao Wei
Shu-Tao Xia
Zhan Qin
AAML
78
1
0
03 Dec 2023
Beating Backdoor Attack at Its Own Game
Min Liu
Alberto L. Sangiovanni-Vincentelli
Xiangyu Yue
AAML
79
11
0
28 Jul 2023
Evil from Within: Machine Learning Backdoors through Hardware Trojans
Alexander Warnecke
Julian Speith
Janka Möller
Konrad Rieck
C. Paar
AAML
89
3
0
17 Apr 2023
Support Vector Machines under Adversarial Label Contamination
Huang Xiao
Battista Biggio
B. Nelson
Han Xiao
Claudia Eckert
Fabio Roli
AAML
28
231
0
01 Jun 2022
Backdoors in Neural Models of Source Code
Goutham Ramakrishnan
Aws Albarghouthi
AAML
SILM
103
56
0
11 Jun 2020
Stop-and-Go: Exploring Backdoor Attacks on Deep Reinforcement Learning-based Traffic Congestion Control Systems
Yue Wang
Esha Sarkar
Wenqing Li
Michail Maniatakos
Saif Eddin Jabari
AAML
96
62
0
17 Mar 2020
Towards Probabilistic Verification of Machine Unlearning
David M. Sommer
Liwei Song
Sameer Wagh
Prateek Mittal
AAML
64
71
0
09 Mar 2020
Defending against Backdoor Attack on Deep Neural Networks
Kaidi Xu
Sijia Liu
Pin-Yu Chen
Pu Zhao
Xinyu Lin
Xue Lin
AAML
53
47
0
26 Feb 2020
Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks
Kang Liu
Brendan Dolan-Gavitt
S. Garg
AAML
52
1,028
0
30 May 2018
Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks
Ali Shafahi
Wenjie Huang
Mahyar Najibi
Octavian Suciu
Christoph Studer
Tudor Dumitras
Tom Goldstein
AAML
65
1,080
0
03 Apr 2018
Efficient Algorithms for Outlier-Robust Regression
Adam R. Klivans
Pravesh Kothari
Raghu Meka
AAML
41
154
0
08 Mar 2018
Sever: A Robust Meta-Algorithm for Stochastic Optimization
Ilias Diakonikolas
Gautam Kamath
D. Kane
Jerry Li
Jacob Steinhardt
Alistair Stewart
47
289
0
07 Mar 2018
Robust Estimation via Robust Gradient Estimation
Adarsh Prasad
A. Suggala
Sivaraman Balakrishnan
Pradeep Ravikumar
46
221
0
19 Feb 2018
Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring
Yossi Adi
Carsten Baum
Moustapha Cissé
Benny Pinkas
Joseph Keshet
51
672
0
13 Feb 2018
Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning
Xinyun Chen
Chang-rui Liu
Yue Liu
Kimberly Lu
D. Song
AAML
SILM
78
1,822
0
15 Dec 2017
BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain
Tianyu Gu
Brendan Dolan-Gavitt
S. Garg
SILM
67
1,754
0
22 Aug 2017
Robust Physical-World Attacks on Deep Learning Models
Kevin Eykholt
Ivan Evtimov
Earlence Fernandes
Yue Liu
Amir Rahmati
Chaowei Xiao
Atul Prakash
Tadayoshi Kohno
D. Song
AAML
33
594
0
27 Jul 2017
Towards Deep Learning Models Resistant to Adversarial Attacks
Aleksander Madry
Aleksandar Makelov
Ludwig Schmidt
Dimitris Tsipras
Adrian Vladu
SILM
OOD
203
11,962
0
19 Jun 2017
Certified Defenses for Data Poisoning Attacks
Jacob Steinhardt
Pang Wei Koh
Percy Liang
AAML
60
751
0
09 Jun 2017
Ensemble Adversarial Training: Attacks and Defenses
Florian Tramèr
Alexey Kurakin
Nicolas Papernot
Ian Goodfellow
Dan Boneh
Patrick McDaniel
AAML
162
2,712
0
19 May 2017
Understanding Black-box Predictions via Influence Functions
Pang Wei Koh
Percy Liang
TDI
134
2,854
0
14 Mar 2017
Being Robust (in High Dimensions) Can Be Practical
Ilias Diakonikolas
Gautam Kamath
D. Kane
Jerry Li
Ankur Moitra
Alistair Stewart
55
253
0
02 Mar 2017
Learning from Untrusted Data
Moses Charikar
Jacob Steinhardt
Gregory Valiant
FedML
OOD
67
293
0
07 Nov 2016
Adversarial examples in the physical world
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILM
AAML
480
5,868
0
08 Jul 2016
Agnostic Estimation of Mean and Covariance
Kevin A. Lai
Anup B. Rao
Santosh Vempala
52
344
0
24 Apr 2016
Robust Estimators in High Dimensions without the Computational Intractability
Ilias Diakonikolas
Gautam Kamath
D. Kane
Jingkai Li
Ankur Moitra
Alistair Stewart
58
510
0
21 Apr 2016
Deep Residual Learning for Image Recognition
Kaiming He
Xinming Zhang
Shaoqing Ren
Jian Sun
MedIm
1.2K
192,638
0
10 Dec 2015
Explaining and Harnessing Adversarial Examples
Ian Goodfellow
Jonathon Shlens
Christian Szegedy
AAML
GAN
148
18,922
0
20 Dec 2014
Very Deep Convolutional Networks for Large-Scale Image Recognition
Karen Simonyan
Andrew Zisserman
FAtt
MDE
761
99,991
0
04 Sep 2014
DeCAF: A Deep Convolutional Activation Feature for Generic Visual Recognition
Jeff Donahue
Yangqing Jia
Oriol Vinyals
Judy Hoffman
Ning Zhang
Eric Tzeng
Trevor Darrell
VLM
ObjD
134
4,946
0
06 Oct 2013
Speech Recognition with Deep Recurrent Neural Networks
Alex Graves
Abdel-rahman Mohamed
Geoffrey E. Hinton
125
8,503
0
22 Mar 2013
Poisoning Attacks against Support Vector Machines
Battista Biggio
B. Nelson
Pavel Laskov
AAML
77
1,580
0
27 Jun 2012
1