ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1909.05193
  4. Cited By
TBT: Targeted Neural Network Attack with Bit Trojan
v1v2v3 (latest)

TBT: Targeted Neural Network Attack with Bit Trojan

Computer Vision and Pattern Recognition (CVPR), 2019
10 September 2019
Adnan Siraj Rakin
Zhezhi He
Deliang Fan
    AAML
ArXiv (abs)PDFHTML

Papers citing "TBT: Targeted Neural Network Attack with Bit Trojan"

50 / 113 papers shown
Thales: Formulating and Estimating Architectural Vulnerability Factors
  for DNN Accelerators
Thales: Formulating and Estimating Architectural Vulnerability Factors for DNN Accelerators
Abhishek Tyagi
Yiming Gan
Shaoshan Liu
Bo Yu
P. Whatmough
Yuhao Zhu
AAML
253
12
0
05 Dec 2022
Federated Learning Attacks and Defenses: A Survey
Federated Learning Attacks and Defenses: A Survey
Yao Chen
Yijie Gui
Hong Lin
Wensheng Gan
Yongdong Wu
FedML
193
41
0
27 Nov 2022
CorruptEncoder: Data Poisoning based Backdoor Attacks to Contrastive
  Learning
CorruptEncoder: Data Poisoning based Backdoor Attacks to Contrastive LearningComputer Vision and Pattern Recognition (CVPR), 2022
Jinghuai Zhang
Hongbin Liu
Jinyuan Jia
Neil Zhenqiang Gong
AAML
408
27
0
15 Nov 2022
Backdoor Attacks for Remote Sensing Data with Wavelet Transform
Backdoor Attacks for Remote Sensing Data with Wavelet TransformIEEE Transactions on Geoscience and Remote Sensing (IEEE TGRS), 2022
Nikolaus Drager
Yonghao Xu
Pedram Ghamisi
AAML
177
18
0
15 Nov 2022
Dormant Neural Trojans
Dormant Neural TrojansInternational Conference on Machine Learning and Applications (ICMLA), 2022
Feisi Fu
Panagiota Kiourti
Wenchao Li
AAML
217
0
0
02 Nov 2022
GA-SAM: Gradient-Strength based Adaptive Sharpness-Aware Minimization
  for Improved Generalization
GA-SAM: Gradient-Strength based Adaptive Sharpness-Aware Minimization for Improved GeneralizationConference on Empirical Methods in Natural Language Processing (EMNLP), 2022
Zhiyuan Zhang
Ruixuan Luo
Qi Su
Xueting Sun
208
17
0
13 Oct 2022
Understanding Impacts of Task Similarity on Backdoor Attack and
  Detection
Understanding Impacts of Task Similarity on Backdoor Attack and Detection
Di Tang
Rui Zhu
Luyi Xing
Haixu Tang
Yi Chen
AAML
261
5
0
12 Oct 2022
Backdoor Attacks in the Supply Chain of Masked Image Modeling
Backdoor Attacks in the Supply Chain of Masked Image Modeling
Xinyue Shen
Xinlei He
Zheng Li
Yun Shen
Michael Backes
Yang Zhang
178
8
0
04 Oct 2022
Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset
  Copyright Protection
Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright ProtectionNeural Information Processing Systems (NeurIPS), 2022
Yiming Li
Yang Bai
Yong Jiang
Yong-Liang Yang
Shutao Xia
Bo Li
AAML
408
137
0
27 Sep 2022
TrojViT: Trojan Insertion in Vision Transformers
TrojViT: Trojan Insertion in Vision TransformersComputer Vision and Pattern Recognition (CVPR), 2022
Mengxin Zheng
Qian Lou
Lei Jiang
375
65
0
27 Aug 2022
Data-free Backdoor Removal based on Channel Lipschitzness
Data-free Backdoor Removal based on Channel LipschitznessEuropean Conference on Computer Vision (ECCV), 2022
Runkai Zheng
Rong Tang
Jianze Li
Li Liu
AAML
270
124
0
05 Aug 2022
Black-box Dataset Ownership Verification via Backdoor Watermarking
Black-box Dataset Ownership Verification via Backdoor WatermarkingIEEE Transactions on Information Forensics and Security (IEEE TIFS), 2022
Yiming Li
Mingyan Zhu
Xue Yang
Yong Jiang
Tao Wei
Shutao Xia
AAML
258
113
0
04 Aug 2022
Hardly Perceptible Trojan Attack against Neural Networks with Bit Flips
Hardly Perceptible Trojan Attack against Neural Networks with Bit FlipsEuropean Conference on Computer Vision (ECCV), 2022
Jiawang Bai
Kuofeng Gao
Dihong Gong
Shutao Xia
Zhifeng Li
Wen Liu
AAML
152
34
0
27 Jul 2022
Versatile Weight Attack via Flipping Limited Bits
Versatile Weight Attack via Flipping Limited BitsIEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 2022
Jiawang Bai
Baoyuan Wu
Zhifeng Li
Shutao Xia
AAML
210
26
0
25 Jul 2022
Game of Trojans: A Submodular Byzantine Approach
Game of Trojans: A Submodular Byzantine Approach
D. Sahabandu
Arezoo Rajabi
Luyao Niu
Yangqiu Song
Bhaskar Ramasubramanian
Radha Poovendran
AAML
152
0
0
13 Jul 2022
Fisher SAM: Information Geometry and Sharpness Aware Minimisation
Fisher SAM: Information Geometry and Sharpness Aware MinimisationInternational Conference on Machine Learning (ICML), 2022
Minyoung Kim
Da Li
S. Hu
Timothy M. Hospedales
AAML
287
84
0
10 Jun 2022
Towards A Proactive ML Approach for Detecting Backdoor Poison Samples
Towards A Proactive ML Approach for Detecting Backdoor Poison SamplesUSENIX Security Symposium (USENIX Security), 2022
Xiangyu Qi
Tinghao Xie
Jiachen T. Wang
Tong Wu
Saeed Mahloujifar
Prateek Mittal
AAML
324
68
0
26 May 2022
Data-Efficient Backdoor Attacks
Data-Efficient Backdoor AttacksInternational Joint Conference on Artificial Intelligence (IJCAI), 2022
Pengfei Xia
Wandi Qiao
Wei Zhang
Bin Li
AAMLFedML
158
37
0
22 Apr 2022
Trojan Horse Training for Breaking Defenses against Backdoor Attacks in
  Deep Learning
Trojan Horse Training for Breaking Defenses against Backdoor Attacks in Deep Learning
Arezoo Rajabi
Bhaskar Ramasubramanian
Radha Poovendran
AAML
208
5
0
25 Mar 2022
A Survey of Neural Trojan Attacks and Defenses in Deep Learning
A Survey of Neural Trojan Attacks and Defenses in Deep Learning
Jie Wang
Ghulam Mubashar Hassan
Naveed Akhtar
AAML
186
27
0
15 Feb 2022
Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers
Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware ClassifiersIEEE Symposium on Security and Privacy (IEEE S&P), 2022
Limin Yang
Zhi Chen
Jacopo Cortellazzi
Feargus Pendlebury
Kevin Tu
Fabio Pierazzi
Lorenzo Cavallaro
Gang Wang
AAML
281
44
0
11 Feb 2022
Backdoors Stuck At The Frontdoor: Multi-Agent Backdoor Attacks That
  Backfire
Backdoors Stuck At The Frontdoor: Multi-Agent Backdoor Attacks That Backfire
Siddhartha Datta
N. Shadbolt
AAML
204
7
0
28 Jan 2022
Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object
  Detectors in the Physical World
Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World
Hua Ma
Yinshan Li
Yansong Gao
A. Abuadbba
Zhi-Li Zhang
Anmin Fu
Hyoungshick Kim
S. Al-Sarawi
N. Surya
Derek Abbott
235
40
0
21 Jan 2022
Neighboring Backdoor Attacks on Graph Convolutional Network
Neighboring Backdoor Attacks on Graph Convolutional Network
Liang Chen
Qibiao Peng
Jintang Li
Yang Liu
Jiawei Chen
Yong Li
Zibin Zheng
GNNAAML
170
11
0
17 Jan 2022
Stealthy Attack on Algorithmic-Protected DNNs via Smart Bit Flipping
Stealthy Attack on Algorithmic-Protected DNNs via Smart Bit FlippingIEEE International Symposium on Quality Electronic Design (ISQED), 2021
B. Ghavami
Seyd Movi
Zhenman Fang
Lesley Shannon
AAML
176
9
0
25 Dec 2021
Towards Practical Deployment-Stage Backdoor Attack on Deep Neural
  Networks
Towards Practical Deployment-Stage Backdoor Attack on Deep Neural Networks
Xiangyu Qi
Tinghao Xie
Ruizhe Pan
Jifeng Zhu
Yong-Liang Yang
Kai Bu
AAML
241
73
0
25 Nov 2021
Enhancing Backdoor Attacks with Multi-Level MMD Regularization
Enhancing Backdoor Attacks with Multi-Level MMD RegularizationIEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2021
Pengfei Xia
Hongjing Niu
Wandi Qiao
Bin Li
AAML
221
35
0
09 Nov 2021
Get a Model! Model Hijacking Attack Against Machine Learning Models
Get a Model! Model Hijacking Attack Against Machine Learning Models
A. Salem
Michael Backes
Yang Zhang
AAML
251
31
0
08 Nov 2021
HASHTAG: Hash Signatures for Online Detection of Fault-Injection Attacks
  on Deep Neural Networks
HASHTAG: Hash Signatures for Online Detection of Fault-Injection Attacks on Deep Neural Networks
Mojan Javaheripi
F. Koushanfar
145
29
0
02 Nov 2021
TESDA: Transform Enabled Statistical Detection of Attacks in Deep Neural
  Networks
TESDA: Transform Enabled Statistical Detection of Attacks in Deep Neural Networks
C. Amarnath
Aishwarya H. Balwani
Kwondo Ma
Abhijit Chatterjee
AAML
126
4
0
16 Oct 2021
Don't Knock! Rowhammer at the Backdoor of DNN Models
Don't Knock! Rowhammer at the Backdoor of DNN Models
M. Tol
Saad Islam
Andrew J. Adiletta
B. Sunar
Ziming Zhang
AAML
180
26
0
14 Oct 2021
Widen The Backdoor To Let More Attackers In
Widen The Backdoor To Let More Attackers In
Siddhartha Datta
Giulio Lovisotto
Ivan Martinovic
N. Shadbolt
AAML
132
3
0
09 Oct 2021
FooBaR: Fault Fooling Backdoor Attack on Neural Network Training
FooBaR: Fault Fooling Backdoor Attack on Neural Network TrainingIEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2021
J. Breier
Xiaolu Hou
Martín Ochoa
Jesus Solano
SILMAAML
258
12
0
23 Sep 2021
Adversarial Parameter Defense by Multi-Step Risk Minimization
Adversarial Parameter Defense by Multi-Step Risk MinimizationNeural Networks (NN), 2021
Zhiyuan Zhang
Ruixuan Luo
Xuancheng Ren
Qi Su
Liangyou Li
Xu Sun
AAML
150
7
0
07 Sep 2021
How to Inject Backdoors with Better Consistency: Logit Anchoring on
  Clean Data
How to Inject Backdoors with Better Consistency: Logit Anchoring on Clean Data
Zhiyuan Zhang
Lingjuan Lyu
Weiqiang Wang
Lichao Sun
Xu Sun
184
39
0
03 Sep 2021
Poison Ink: Robust and Invisible Backdoor Attack
Poison Ink: Robust and Invisible Backdoor AttackIEEE Transactions on Image Processing (TIP), 2021
Jie Zhang
Dongdong Chen
Qidong Huang
Jing Liao
Weiming Zhang
Huamin Feng
G. Hua
Nenghai Yu
AAML
284
108
0
05 Aug 2021
Advances in adversarial attacks and defenses in computer vision: A
  survey
Advances in adversarial attacks and defenses in computer vision: A survey
Naveed Akhtar
Lin Wang
Navid Kardan
M. Shah
AAML
475
298
0
01 Aug 2021
Handcrafted Backdoors in Deep Neural Networks
Handcrafted Backdoors in Deep Neural NetworksNeural Information Processing Systems (NeurIPS), 2021
Sanghyun Hong
Nicholas Carlini
Alexey Kurakin
220
87
0
08 Jun 2021
Hidden Backdoors in Human-Centric Language Models
Hidden Backdoors in Human-Centric Language ModelsConference on Computer and Communications Security (CCS), 2021
Shaofeng Li
Hui Liu
Tian Dong
Benjamin Zi Hao Zhao
Minhui Xue
Haojin Zhu
Jialiang Lu
SILM
394
168
0
01 May 2021
Robust Backdoor Attacks against Deep Neural Networks in Real Physical
  World
Robust Backdoor Attacks against Deep Neural Networks in Real Physical WorldInternational Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2021
Mingfu Xue
Can He
Shichang Sun
Jian Wang
Weiqiang Liu
AAML
185
49
0
15 Apr 2021
SGBA: A Stealthy Scapegoat Backdoor Attack against Deep Neural Networks
SGBA: A Stealthy Scapegoat Backdoor Attack against Deep Neural NetworksComputers & security (CS), 2021
Yingzhe He
Zhili Shen
Chang Xia
Jingyu Hua
Wei Tong
Sheng Zhong
AAML
250
7
0
02 Apr 2021
PointBA: Towards Backdoor Attacks in 3D Point Cloud
PointBA: Towards Backdoor Attacks in 3D Point CloudIEEE International Conference on Computer Vision (ICCV), 2021
Xinke Li
Zhirui Chen
Yue Zhao
Zekun Tong
Yabang Zhao
A. Lim
Qiufeng Wang
3DPCAAML
562
61
0
30 Mar 2021
MISA: Online Defense of Trojaned Models using Misattributions
MISA: Online Defense of Trojaned Models using MisattributionsAsia-Pacific Computer Systems Architecture Conference (ACSA), 2021
Panagiota Kiourti
Wenchao Li
Anirban Roy
Karan Sikka
Susmit Jha
241
10
0
29 Mar 2021
Black-box Detection of Backdoor Attacks with Limited Information and
  Data
Black-box Detection of Backdoor Attacks with Limited Information and DataIEEE International Conference on Computer Vision (ICCV), 2021
Yinpeng Dong
Xiao Yang
Zhijie Deng
Tianyu Pang
Zihao Xiao
Hang Su
Jun Zhu
AAML
155
123
0
24 Mar 2021
RA-BNN: Constructing Robust & Accurate Binary Neural Network to
  Simultaneously Defend Adversarial Bit-Flip Attack and Improve Accuracy
RA-BNN: Constructing Robust & Accurate Binary Neural Network to Simultaneously Defend Adversarial Bit-Flip Attack and Improve Accuracy
Adnan Siraj Rakin
Li Yang
Jingtao Li
Fan Yao
C. Chakrabarti
Yu Cao
Jae-sun Seo
Deliang Fan
AAMLMQ
129
34
0
22 Mar 2021
EX-RAY: Distinguishing Injected Backdoor from Natural Features in Neural
  Networks by Examining Differential Feature Symmetry
EX-RAY: Distinguishing Injected Backdoor from Natural Features in Neural Networks by Examining Differential Feature Symmetry
Yingqi Liu
Guangyu Shen
Guanhong Tao
Zhenting Wang
Shiqing Ma
Xinming Zhang
AAML
222
8
0
16 Mar 2021
Targeted Attack against Deep Neural Networks via Flipping Limited Weight
  Bits
Targeted Attack against Deep Neural Networks via Flipping Limited Weight BitsInternational Conference on Learning Representations (ICLR), 2021
Jiawang Bai
Baoyuan Wu
Yong Zhang
Yiming Li
Zhifeng Li
Shutao Xia
AAML
201
81
0
21 Feb 2021
Backdoor Scanning for Deep Neural Networks through K-Arm Optimization
Backdoor Scanning for Deep Neural Networks through K-Arm OptimizationInternational Conference on Machine Learning (ICML), 2021
Guangyu Shen
Yingqi Liu
Guanhong Tao
Shengwei An
Qiuling Xu
Shuyang Cheng
Shiqing Ma
Xinming Zhang
AAML
325
131
0
09 Feb 2021
Deep Feature Space Trojan Attack of Neural Networks by Controlled
  Detoxification
Deep Feature Space Trojan Attack of Neural Networks by Controlled DetoxificationAAAI Conference on Artificial Intelligence (AAAI), 2020
Shuyang Cheng
Yingqi Liu
Shiqing Ma
Xinming Zhang
AAML
294
179
0
21 Dec 2020
Detecting Trojaned DNNs Using Counterfactual Attributions
Detecting Trojaned DNNs Using Counterfactual AttributionsInternational Conference on Applied Algorithms (ICAA), 2020
Karan Sikka
Indranil Sur
Susmit Jha
Anirban Roy
Ajay Divakaran
AAML
158
13
0
03 Dec 2020
Previous
123
Next