ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1908.00686
  4. Cited By
Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor
  Contamination Detection
v1v2 (latest)

Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor Contamination Detection

USENIX Security Symposium (USENIX Security), 2019
2 August 2019
Di Tang
Luyi Xing
Haixu Tang
Kehuan Zhang
    AAML
ArXiv (abs)PDFHTML

Papers citing "Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor Contamination Detection"

50 / 126 papers shown
TED++: Submanifold-Aware Backdoor Detection via Layerwise Tubular-Neighbourhood Screening
TED++: Submanifold-Aware Backdoor Detection via Layerwise Tubular-Neighbourhood Screening
Nam Le
L. Zhang
Kewen Liao
Shirui Pan
Wei Luo
AAML
169
0
0
16 Oct 2025
Rounding-Guided Backdoor Injection in Deep Learning Model Quantization
Rounding-Guided Backdoor Injection in Deep Learning Model Quantization
Xiangxiang Chen
Peixin Zhang
Jun Sun
Wenhai Wang
Jingyi Wang
AAML
163
0
0
05 Oct 2025
Your Compiler is Backdooring Your Model: Understanding and Exploiting Compilation Inconsistency Vulnerabilities in Deep Learning Compilers
Your Compiler is Backdooring Your Model: Understanding and Exploiting Compilation Inconsistency Vulnerabilities in Deep Learning Compilers
Simin Chen
Jinjun Peng
Yixin He
Junfeng Yang
Baishakhi Ray
SILMELM
336
3
0
14 Sep 2025
Paladin: Defending LLM-enabled Phishing Emails with a New Trigger-Tag Paradigm
Paladin: Defending LLM-enabled Phishing Emails with a New Trigger-Tag Paradigm
Yan Pang
Wenlong Meng
Xiaojing Liao
Tianhao Wang
214
3
0
08 Sep 2025
Prototype-Guided Robust Learning against Backdoor Attacks
Prototype-Guided Robust Learning against Backdoor Attacks
Wei Guo
Maura Pintor
Ambra Demontis
Battista Biggio
AAMLSILM
203
0
0
03 Sep 2025
Isolate Trigger: Detecting and Eliminating Adaptive Backdoor Attacks
Isolate Trigger: Detecting and Eliminating Adaptive Backdoor Attacks
Chengrui Sun
Hua Zhang
Haoran Gao
Zian Tian
Jianjin Zhao
qi Li
Hongliang Zhu
Zongliang Shen
Shang Wang
Anmin Fu
175
0
0
06 Aug 2025
Proactive Disentangled Modeling of Trigger-Object Pairings for Backdoor Defense
Proactive Disentangled Modeling of Trigger-Object Pairings for Backdoor Defense
Kyle Stein
A. Mahyari
Guillermo Francia III
Eman El-Sheikh
AAML
207
0
0
03 Aug 2025
PDLRecover: Privacy-preserving Decentralized Model Recovery with Machine Unlearning
PDLRecover: Privacy-preserving Decentralized Model Recovery with Machine Unlearning
Xiangman Li
Xiaodong Wu
Jianbing Ni
Mohamed Mahmoud
Maazen Alsabaan
AAML
205
0
0
18 Jun 2025
TED-LaST: Towards Robust Backdoor Defense Against Adaptive Attacks
TED-LaST: Towards Robust Backdoor Defense Against Adaptive Attacks
Xiaoxing Mo
Y. Cheng
Nan Sun
L. Zhang
Wei Luo
Shang Gao
AAML
327
0
0
12 Jun 2025
Variance-Based Defense Against Blended Backdoor Attacks
Variance-Based Defense Against Blended Backdoor Attacks
Sujeevan Aseervatham
Achraf Kerzazi
Younès Bennani
AAML
279
0
0
02 Jun 2025
SifterNet: A Generalized and Model-Agnostic Trigger Purification Approach
SifterNet: A Generalized and Model-Agnostic Trigger Purification Approach
Shaoye Luo
Xinxin Fan
Quanliang Jing
Chi Lin
Mengfan Li
Yunfeng Lu
Yongjun Xu
AAML
204
2
0
20 May 2025
TrojanDam: Detection-Free Backdoor Defense in Federated Learning through Proactive Model Robustification utilizing OOD Data
TrojanDam: Detection-Free Backdoor Defense in Federated Learning through Proactive Model Robustification utilizing OOD Data
Yanbo Dai
Songze Li
Zihan Gan
Xueluan Gong
AAMLFedML
260
1
0
22 Apr 2025
Secure Transfer Learning: Training Clean Models Against Backdoor in (Both) Pre-trained Encoders and Downstream Datasets
Secure Transfer Learning: Training Clean Models Against Backdoor in (Both) Pre-trained Encoders and Downstream DatasetsIEEE Symposium on Security and Privacy (S&P), 2025
Yanzhe Zhang
Yuxuan Zhou
Tianyu Li
Minghui Li
Shengshan Hu
Wei Luo
L. Zhang
AAMLSILM
277
3
0
16 Apr 2025
Test-Time Backdoor Detection for Object Detection Models
Test-Time Backdoor Detection for Object Detection ModelsComputer Vision and Pattern Recognition (CVPR), 2025
Hangtao Zhang
Yichen Wang
Shihui Yan
Chenyu Zhu
Ziqi Zhou
Linshan Hou
Shengshan Hu
Minghui Li
Yanjun Zhang
L. Zhang
AAML
251
14
0
19 Mar 2025
UNIDOOR: A Universal Framework for Action-Level Backdoor Attacks in Deep Reinforcement Learning
UNIDOOR: A Universal Framework for Action-Level Backdoor Attacks in Deep Reinforcement Learning
Oubo Ma
L. Du
Yang Dai
Chunyi Zhou
Qingming Li
Yuwen Pu
R. Beyah
420
5
0
28 Jan 2025
Semantic Shield: Defending Vision-Language Models Against Backdooring
  and Poisoning via Fine-grained Knowledge Alignment
Semantic Shield: Defending Vision-Language Models Against Backdooring and Poisoning via Fine-grained Knowledge AlignmentComputer Vision and Pattern Recognition (CVPR), 2024
Alvi Md Ishmam
Christopher Thomas
AAML
376
7
0
23 Nov 2024
Reliable Poisoned Sample Detection against Backdoor Attacks Enhanced by Sharpness Aware Minimization
Ruotong Wang
Mingli Zhu
Zihao Zhu
Baoyuan Wu
AAML
433
4
0
18 Nov 2024
BackdoorMBTI: A Backdoor Learning Multimodal Benchmark Tool Kit for Backdoor Defense EvaluationKnowledge Discovery and Data Mining (KDD), 2024
Haiyang Yu
Tian Xie
Jiaping Gui
Pengyang Wang
P. Yi
Yue Wu
415
3
0
17 Nov 2024
Solving Trojan Detection Competitions with Linear Weight Classification
Solving Trojan Detection Competitions with Linear Weight Classification
Todd P. Huster
Peter Lin
Razvan Stefanescu
E. Ekwedike
R. Chadha
AAML
307
0
0
05 Nov 2024
Psychometrics for Hypnopaedia-Aware Machinery via Chaotic Projection of
  Artificial Mental Imagery
Psychometrics for Hypnopaedia-Aware Machinery via Chaotic Projection of Artificial Mental Imagery
Ching-Chun Chang
Kai Gao
Shuying Xu
Anastasia Kordoni
Christopher Leckie
Isao Echizen
197
0
0
29 Sep 2024
Data Poisoning and Leakage Analysis in Federated Learning
Data Poisoning and Leakage Analysis in Federated Learning
Wenqi Wei
Tiansheng Huang
Zachary Yahn
Anoop Singhal
Margaret Loper
Ling Liu
FedMLSILM
282
2
0
19 Sep 2024
CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models
CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP ModelsNetwork and Distributed System Security Symposium (NDSS), 2024
Rui Zeng
Xi Chen
Yuwen Pu
Xuhong Zhang
Tianyu Du
Shouling Ji
391
18
0
02 Sep 2024
BadVim: Unveiling Backdoor Threats in Visual State Space Model
BadVim: Unveiling Backdoor Threats in Visual State Space Model
Cheng-Yi Lee
Cheng-Chang Tsai
Zhong-You Wu
Chia-Mu Yu
Chun-Shien Lu
AAML
350
1
0
21 Aug 2024
A Survey of Trojan Attacks and Defenses to Deep Neural Networks
A Survey of Trojan Attacks and Defenses to Deep Neural Networks
Lingxin Jin
Xianyu Wen
Wei Jiang
Jinyu Zhan
AAML
303
4
0
15 Aug 2024
Releasing Malevolence from Benevolence: The Menace of Benign Data on
  Machine Unlearning
Releasing Malevolence from Benevolence: The Menace of Benign Data on Machine Unlearning
Binhao Ma
Tianhang Zheng
Hongsheng Hu
Haiyan Zhao
Shuo Wang
Zhongjie Ba
Zhan Qin
Kui Ren
AAML
269
6
0
06 Jul 2024
CBPF: Filtering Poisoned Data Based on Composite Backdoor Attack
CBPF: Filtering Poisoned Data Based on Composite Backdoor Attack
Hanfeng Xia
Haibo Hong
Ruili Wang
AAML
278
0
0
23 Jun 2024
Watch the Watcher! Backdoor Attacks on Security-Enhancing Diffusion
  Models
Watch the Watcher! Backdoor Attacks on Security-Enhancing Diffusion Models
Changjiang Li
Ren Pang
Bochuan Cao
Jinghui Chen
Fenglong Ma
Shouling Ji
Ting Wang
DiffM
258
6
0
14 Jun 2024
PSBD: Prediction Shift Uncertainty Unlocks Backdoor Detection
PSBD: Prediction Shift Uncertainty Unlocks Backdoor DetectionComputer Vision and Pattern Recognition (CVPR), 2024
Wei Li
Pin-Yu Chen
Sijia Liu
Ren Wang
AAML
396
5
0
09 Jun 2024
Invisible Backdoor Attack against Self-supervised Learning
Invisible Backdoor Attack against Self-supervised LearningComputer Vision and Pattern Recognition (CVPR), 2024
Hanrong Zhang
Zhenting Wang
Tingxu Han
Haoyang Ling
Chenlu Zhan
Jundong Li
Hongwei Wang
Shiqing Ma
Hongwei Wang
Shiqing Ma
AAMLSSL
371
1
0
23 May 2024
Mellivora Capensis: A Backdoor-Free Training Framework on the Poisoned Dataset without Auxiliary Data
Mellivora Capensis: A Backdoor-Free Training Framework on the Poisoned Dataset without Auxiliary Data
Yuwen Pu
Jiahao Chen
Chunyi Zhou
Zhou Feng
Qingming Li
Chunqiang Hu
Shouling Ji
AAML
207
0
0
21 May 2024
IBD-PSC: Input-level Backdoor Detection via Parameter-oriented Scaling
  Consistency
IBD-PSC: Input-level Backdoor Detection via Parameter-oriented Scaling ConsistencyInternational Conference on Machine Learning (ICML), 2024
Linshan Hou
Ruili Feng
Zhongyun Hua
Wei Luo
Leo Yu Zhang
Yiming Li
AAML
403
47
0
16 May 2024
LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning
LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning
Shuyang Cheng
Guanhong Tao
Yingqi Liu
Guangyu Shen
Shengwei An
Shiwei Feng
Xiangzhe Xu
Kaiyuan Zhang
Shiqing Ma
Xiangyu Zhang
AAML
269
16
0
25 Mar 2024
Backdoor Secrets Unveiled: Identifying Backdoor Data with Optimized
  Scaled Prediction Consistency
Backdoor Secrets Unveiled: Identifying Backdoor Data with Optimized Scaled Prediction Consistency
Soumyadeep Pal
Yuguang Yao
Ren Wang
Bingquan Shen
Sijia Liu
AAML
284
15
0
15 Mar 2024
A general approach to enhance the survivability of backdoor attacks by
  decision path coupling
A general approach to enhance the survivability of backdoor attacks by decision path coupling
Yufei Zhao
Dingji Wang
Bihuan Chen
Ziqian Chen
Xin Peng
AAML
264
0
0
05 Mar 2024
Model X-ray:Detect Backdoored Models via Decision Boundary
Model X-ray:Detect Backdoored Models via Decision Boundary
Yanghao Su
Jie Zhang
Ting Xu
Tianwei Zhang
Weiming Zhang
Neng H. Yu
AAML
346
0
0
27 Feb 2024
Mudjacking: Patching Backdoor Vulnerabilities in Foundation Models
Mudjacking: Patching Backdoor Vulnerabilities in Foundation Models
Hongbin Liu
Michael K. Reiter
Neil Zhenqiang Gong
AAML
384
4
0
22 Feb 2024
Detection Latencies of Anomaly Detectors: An Overlooked Perspective ?
Detection Latencies of Anomaly Detectors: An Overlooked Perspective ?
Tommaso Puccetti
Andrea Ceccarelli
115
6
0
14 Feb 2024
Game of Trojans: Adaptive Adversaries Against Output-based
  Trojaned-Model Detectors
Game of Trojans: Adaptive Adversaries Against Output-based Trojaned-Model Detectors
D. Sahabandu
Xiaojun Xu
Arezoo Rajabi
Luyao Niu
Bhaskar Ramasubramanian
Bo Li
Radha Poovendran
AAML
250
2
0
12 Feb 2024
Preference Poisoning Attacks on Reward Model Learning
Preference Poisoning Attacks on Reward Model Learning
Junlin Wu
Zhenghao Hu
Chaowei Xiao
Chenguang Wang
Ning Zhang
Yevgeniy Vorobeychik
AAML
326
12
0
02 Feb 2024
Trustworthy Distributed AI Systems: Robustness, Privacy, and Governance
Trustworthy Distributed AI Systems: Robustness, Privacy, and Governance
Wenqi Wei
Ling Liu
426
57
0
02 Feb 2024
BackdoorBench: A Comprehensive Benchmark and Analysis of Backdoor
  Learning
BackdoorBench: A Comprehensive Benchmark and Analysis of Backdoor LearningInternational Journal of Computer Vision (IJCV), 2024
Baoyuan Wu
Hongrui Chen
Ruotong Wang
Zihao Zhu
Shaokui Wei
Danni Yuan
Mingli Zhu
Ke Xu
Li Liu
Chaoxiao Shen
AAMLELM
346
23
0
26 Jan 2024
WPDA: Frequency-based Backdoor Attack with Wavelet Packet Decomposition
WPDA: Frequency-based Backdoor Attack with Wavelet Packet DecompositionNeural Networks (NN), 2024
Zhengyao Song
Yongqiang Li
Danni Yuan
Li Liu
Shaokui Wei
Baoyuan Wu
AAML
383
6
0
24 Jan 2024
UltraClean: A Simple Framework to Train Robust Neural Networks against Backdoor Attacks
UltraClean: A Simple Framework to Train Robust Neural Networks against Backdoor Attacks
Bingyin Zhao
Yingjie Lao
AAML
381
2
0
17 Dec 2023
On the Difficulty of Defending Contrastive Learning against Backdoor
  Attacks
On the Difficulty of Defending Contrastive Learning against Backdoor AttacksUSENIX Security Symposium (USENIX Security), 2023
Changjiang Li
Ren Pang
Bochuan Cao
Zhaohan Xi
Jinghui Chen
R. Beyah
Ting Wang
AAML
328
9
0
14 Dec 2023
Defenses in Adversarial Machine Learning: A Survey
Defenses in Adversarial Machine Learning: A Survey
Baoyuan Wu
Shaokui Wei
Mingli Zhu
Meixi Zheng
Zihao Zhu
Ruotong Wang
Hongrui Chen
Danni Yuan
Li Liu
Qingshan Liu
AAML
358
31
0
13 Dec 2023
Activation Gradient based Poisoned Sample Detection Against Backdoor
  Attacks
Activation Gradient based Poisoned Sample Detection Against Backdoor Attacks
Danni Yuan
Shaokui Wei
Ruotong Wang
Li Liu
Baoyuan Wu
AAML
402
15
0
11 Dec 2023
BELT: Old-School Backdoor Attacks can Evade the State-of-the-Art Defense
  with Backdoor Exclusivity Lifting
BELT: Old-School Backdoor Attacks can Evade the State-of-the-Art Defense with Backdoor Exclusivity LiftingIEEE Symposium on Security and Privacy (S&P), 2023
Huming Qiu
Junjie Sun
Mi Zhang
Xudong Pan
Min Yang
AAML
360
7
0
08 Dec 2023
Robust Backdoor Detection for Deep Learning via Topological Evolution
  Dynamics
Robust Backdoor Detection for Deep Learning via Topological Evolution DynamicsIEEE Symposium on Security and Privacy (S&P), 2023
Xiaoxing Mo
Yechao Zhang
Leo Yu Zhang
Wei Luo
Nan Sun
Shengshan Hu
Shang Gao
Yang Xiang
AAML
240
36
0
05 Dec 2023
Rethinking Backdoor Attacks on Dataset Distillation: A Kernel Method Perspective
Rethinking Backdoor Attacks on Dataset Distillation: A Kernel Method PerspectiveInternational Conference on Learning Representations (ICLR), 2023
Ming-Yu Chung
Sheng-Yen Chou
Chia-Mu Yu
Pin-Yu Chen
Sy-Yen Kuo
Tsung-Yi Ho
DD
467
9
0
28 Nov 2023
Elijah: Eliminating Backdoors Injected in Diffusion Models via
  Distribution Shift
Elijah: Eliminating Backdoors Injected in Diffusion Models via Distribution ShiftAAAI Conference on Artificial Intelligence (AAAI), 2023
Shengwei An
Sheng-Yen Chou
Kaiyuan Zhang
Qiuling Xu
Guanhong Tao
...
Shuyang Cheng
Shiqing Ma
Pin-Yu Chen
Tsung-Yi Ho
Xiangyu Zhang
DiffMAAML
481
47
0
27 Nov 2023
123
Next
Page 1 of 3