ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2007.08745
  4. Cited By
Backdoor Learning: A Survey
v1v2v3v4v5 (latest)

Backdoor Learning: A Survey

IEEE Transactions on Neural Networks and Learning Systems (IEEE TNNLS), 2020
17 July 2020
Yiming Li
Yong Jiang
Zhifeng Li
Shutao Xia
    AAML
ArXiv (abs)PDFHTMLGithub (1107★)

Papers citing "Backdoor Learning: A Survey"

50 / 368 papers shown
Assimilation Matters: Model-level Backdoor Detection in Vision-Language Pretrained Models
Assimilation Matters: Model-level Backdoor Detection in Vision-Language Pretrained Models
Z. Wang
Jie M. Zhang
Shiguang Shan
Xilin Chen
AAML
422
0
0
29 Nov 2025
AutoBackdoor: Automating Backdoor Attacks via LLM Agents
AutoBackdoor: Automating Backdoor Attacks via LLM Agents
Y. Li
Z. Li
Wei Zhao
Nay Myat Min
Hanxun Huang
Xingjun Ma
Jun Sun
AAMLLLMAGSILM
470
3
0
20 Nov 2025
AI Bill of Materials and Beyond: Systematizing Security Assurance through the AI Risk Scanning (AIRS) Framework
AI Bill of Materials and Beyond: Systematizing Security Assurance through the AI Risk Scanning (AIRS) Framework
Samuel Nathanson
Alexander Lee
Catherine Chen Kieffer
Jared Junkin
Jessica Ye
Amir Saeed
Melanie Lockhart
Russ Fink
Elisha Peterson
Lanier Watkins
126
0
0
16 Nov 2025
CatBack: Universal Backdoor Attacks on Tabular Data via Categorical Encoding
CatBack: Universal Backdoor Attacks on Tabular Data via Categorical Encoding
Behrad Tajalli
Stefanos Koffas
S. Picek
AAML
147
0
0
08 Nov 2025
Power to the Clients: Federated Learning in a Dictatorship Setting
Power to the Clients: Federated Learning in a Dictatorship Setting
Mohammadsajad Alipour
Mohammad Mohammadi Amiri
FedML
232
0
0
25 Oct 2025
Forgetting to Forget: Attention Sink as A Gateway for Backdooring LLM Unlearning
Forgetting to Forget: Attention Sink as A Gateway for Backdooring LLM Unlearning
Bingqi Shang
Yiwei Chen
Yihua Zhang
Bingquan Shen
Sijia Liu
MUKELMAAML
279
1
0
19 Oct 2025
TED++: Submanifold-Aware Backdoor Detection via Layerwise Tubular-Neighbourhood Screening
TED++: Submanifold-Aware Backdoor Detection via Layerwise Tubular-Neighbourhood Screening
Nam Le
L. Zhang
Kewen Liao
Shirui Pan
Wei Luo
AAML
169
0
0
16 Oct 2025
Backdoor Unlearning by Linear Task Decomposition
Backdoor Unlearning by Linear Task Decomposition
Amel Abdelraheem
Alessandro Favero
Gérôme Bovet
Pascal Frossard
AAMLMU
273
0
0
16 Oct 2025
DropVLA: An Action-Level Backdoor Attack on Vision-Language-Action Models
DropVLA: An Action-Level Backdoor Attack on Vision-Language-Action Models
Zonghuan Xu
Xiang Zheng
Xingjun Ma
Yu Jiang
Xingjun Ma
Yu-Gang Jiang
161
2
0
13 Oct 2025
Geometry-Aware Backdoor Attacks: Leveraging Curvature in Hyperbolic Embeddings
Geometry-Aware Backdoor Attacks: Leveraging Curvature in Hyperbolic Embeddings
Ali Baheri
AAMLLLMSV
248
0
0
07 Oct 2025
Responsible Diffusion: A Comprehensive Survey on Safety, Ethics, and Trust in Diffusion Models
Responsible Diffusion: A Comprehensive Survey on Safety, Ethics, and Trust in Diffusion Models
Kang Wei
Xin Yuan
Fushuo Huo
Chuan Ma
Long Yuan
S. Li
Ming Ding
Dacheng Tao
DiffMMedIm
288
2
0
25 Sep 2025
NeuroStrike: Neuron-Level Attacks on Aligned LLMs
NeuroStrike: Neuron-Level Attacks on Aligned LLMs
Lichao Wu
Sasha Behrouzi
Mohamadreza Rostami
Maximilian Thang
S. Picek
A. Sadeghi
AAMLMoMeLLMSV
342
7
0
15 Sep 2025
NeuroDeX: Unlocking Diverse Support in Decompiling Deep Neural Network Executables
NeuroDeX: Unlocking Diverse Support in Decompiling Deep Neural Network Executables
Yilin Li
Guozhu Meng
Mingyang Sun
Yanzhong Wang
Kun Sun
Hailong Chang
Yuekang Li
181
0
0
08 Sep 2025
DisPatch: Disarming Adversarial Patches in Object Detection with Diffusion Models
DisPatch: Disarming Adversarial Patches in Object Detection with Diffusion Models
Jin Ma
Mohammed Aldeen
Christopher Salas
Feng Luo
M. Chowdhury
Mert Pesé
Long Cheng
DiffM
227
0
0
04 Sep 2025
A Comprehensive Survey on Trustworthiness in Reasoning with Large Language Models
A Comprehensive Survey on Trustworthiness in Reasoning with Large Language Models
Yanbo Wang
Yongcan Yu
Jian Liang
Ran He
HILMLRM
244
14
0
04 Sep 2025
Backdoor Poisoning Attack Against Face Spoofing Attack Detection Methods
Backdoor Poisoning Attack Against Face Spoofing Attack Detection Methods
Shota Iwamatsu
Koichi Ito
T. Aoki
AAMLPICV
383
0
0
03 Sep 2025
BadFU: Backdoor Federated Learning through Adversarial Machine Unlearning
BadFU: Backdoor Federated Learning through Adversarial Machine Unlearning
Bingguang Lu
Hongsheng Hu
Yuantian Miao
Shaleeza Sohail
Chaoxiang He
Shuo Wang
Xiao Chen
FedMLMU
205
0
0
21 Aug 2025
NT-ML: Backdoor Defense via Non-target Label Training and Mutual Learning
NT-ML: Backdoor Defense via Non-target Label Training and Mutual Learning
Wenjie Huo
Katinka Wolter
AAML
181
0
0
07 Aug 2025
BadBlocks: Lightweight and Stealthy Backdoor Threat in Text-to-Image Diffusion Models
BadBlocks: Lightweight and Stealthy Backdoor Threat in Text-to-Image Diffusion Models
Yu Pan
Jiahao Chen
Lin Wang
Bingrong Dai
Yi Du
AAMLDiffM
352
0
0
05 Aug 2025
Towards Stealthy and Effective Backdoor Attacks on Lane Detection: A Naturalistic Data Poisoning Approach
Towards Stealthy and Effective Backdoor Attacks on Lane Detection: A Naturalistic Data Poisoning Approach
Yifan Liao
Yuxin Cao
Yedi Zhang
Wentao He
Yan Xiao
Xianglong Du
Zhiyong Huang
Jin Song Dong
AAML
215
4
0
04 Aug 2025
Coward: Collision-based Watermark for Proactive Federated Backdoor Detection
Coward: Collision-based Watermark for Proactive Federated Backdoor Detection
Wenjie Li
Siying Gu
Yiming Li
Kangjie Chen
Zhili Chen
Tianwei Zhang
Shu-Tao Xia
Dacheng Tao
AAML
217
1
0
04 Aug 2025
BadReasoner: Planting Tunable Overthinking Backdoors into Large Reasoning Models for Fun or Profit
BadReasoner: Planting Tunable Overthinking Backdoors into Large Reasoning Models for Fun or Profit
Biao Yi
Zekun Fei
Jianing Geng
Tong Li
Lihai Nie
Zheli Liu
Yiming Li
LRM
286
7
0
24 Jul 2025
ShrinkBox: Backdoor Attack on Object Detection to Disrupt Collision Avoidance in Machine Learning-based Advanced Driver Assistance Systems
ShrinkBox: Backdoor Attack on Object Detection to Disrupt Collision Avoidance in Machine Learning-based Advanced Driver Assistance Systems
M. Shahzad
Muhammad Abdullah Hanif
B. Ouni
Muhammad Shafique
AAML
134
1
0
22 Jul 2025
VisualTrap: A Stealthy Backdoor Attack on GUI Agents via Visual Grounding Manipulation
VisualTrap: A Stealthy Backdoor Attack on GUI Agents via Visual Grounding Manipulation
Ziang Ye
Yang Zhang
Wentao Shi
Xiaoyu You
Fuli Feng
Tat-Seng Chua
AAML
512
4
0
09 Jul 2025
Rethinking Data Protection in the (Generative) Artificial Intelligence Era
Rethinking Data Protection in the (Generative) Artificial Intelligence Era
Yiming Li
Shuo Shao
Yexiao He
Junfeng Guo
Tianwei Zhang
...
Pin-Yu Chen
Michael Backes
Juil Sock
Dacheng Tao
Kui Ren
SILM
500
21
0
03 Jul 2025
SoK: On the Survivability of Backdoor Attacks on Unconstrained Face Recognition Systems
SoK: On the Survivability of Backdoor Attacks on Unconstrained Face Recognition Systems
Quentin Le Roux
Yannick Teglia
Teddy Furon
Philippe Loubet-Moundi
Eric Bourbao
CVBMAAMLSILM
331
0
0
02 Jul 2025
Probe before You Talk: Towards Black-box Defense against Backdoor Unalignment for Large Language Models
Probe before You Talk: Towards Black-box Defense against Backdoor Unalignment for Large Language ModelsInternational Conference on Learning Representations (ICLR), 2025
Biao Yi
Tiansheng Huang
Sishuo Chen
Tong Li
Zheli Liu
Zhixuan Chu
Yiming Li
AAML
373
27
0
19 Jun 2025
CertDW: Towards Certified Dataset Ownership Verification via Conformal Prediction
CertDW: Towards Certified Dataset Ownership Verification via Conformal Prediction
Ting Qiao
Yiming Li
Jianbin Li
Yingjia Wang
Leyi Qi
Junfeng Guo
Ruili Feng
Dacheng Tao
AAML
271
3
0
16 Jun 2025
SPBA: Utilizing Speech Large Language Model for Backdoor Attacks on Speech Classification Models
Wenhan Yao
Fen Xiao
Xiarun Chen
Jia Liu
yongqiang He
Weiping Wen
AAMLSILM
179
0
0
10 Jun 2025
TwinBreak: Jailbreaking LLM Security Alignments based on Twin Prompts
TwinBreak: Jailbreaking LLM Security Alignments based on Twin Prompts
T. Krauß
Hamid Dashtbani
Alexandra Dmitrienko
230
13
0
09 Jun 2025
Trojan Horse Hunt in Time Series Forecasting for Space Operations
Trojan Horse Hunt in Time Series Forecasting for Space Operations
Krzysztof Kotowski
Ramez Shendy
J. Nalepa
P. Biecek
Piotr Wilczyñski
Agata Kaczmarek
Dawid Płudowski
Artur Janicki
Evridiki Vasileia Ntagiou
236
1
0
02 Jun 2025
BadVLA: Towards Backdoor Attacks on Vision-Language-Action Models via Objective-Decoupled Optimization
BadVLA: Towards Backdoor Attacks on Vision-Language-Action Models via Objective-Decoupled Optimization
Xueyang Zhou
Guiyao Tie
Guowen Zhang
Hechang Wang
Pan Zhou
Lichao Sun
AAML
337
18
0
22 May 2025
The Ripple Effect: On Unforeseen Complications of Backdoor Attacks
The Ripple Effect: On Unforeseen Complications of Backdoor Attacks
Rui Zhang
Yun Shen
Hongwei Li
Wenbo Jiang
Hanxiao Chen
Yuan Zhang
Guowen Xu
Yang Zhang
SILMAAML
258
0
0
16 May 2025
ROSA: Finding Backdoors with Fuzzing
ROSA: Finding Backdoors with FuzzingInternational Conference on Software Engineering (ICSE), 2025
Dimitri Kokkonis
Michaël Marcozzi
Emilien Decoux
Stefano Zacchiroli
275
0
0
13 May 2025
Comet: Accelerating Private Inference for Large Language Model by Predicting Activation Sparsity
Comet: Accelerating Private Inference for Large Language Model by Predicting Activation SparsityIEEE Symposium on Security and Privacy (S&P), 2025
Guang Yan
Yuhui Zhang
Zimu Guo
Lutan Zhao
Xiaojun Chen
Chen Wang
Wenhao Wang
Dan Meng
Rui Hou
365
3
0
12 May 2025
MergeGuard: Efficient Thwarting of Trojan Attacks in Machine Learning Models
MergeGuard: Efficient Thwarting of Trojan Attacks in Machine Learning Models
Soheil Zibakhsh Shabgahi
Yaman Jandali
F. Koushanfar
MoMeAAML
289
0
0
06 May 2025
BadLingual: A Novel Lingual-Backdoor Attack against Large Language Models
BadLingual: A Novel Lingual-Backdoor Attack against Large Language Models
Liang Luo
Hongwei Li
Rui Zhang
Wenbo Jiang
Kangjie Chen
Tianwei Zhang
Qingchuan Zhao
Guowen Xu
AAML
271
1
0
06 May 2025
Cert-SSBD: Certified Backdoor Defense with Sample-Specific Smoothing Noises
Cert-SSBD: Certified Backdoor Defense with Sample-Specific Smoothing Noises
Ting Qiao
Longji Xu
Xing Liu
Sixing Wu
Jianbing Li
Yiming Li
AAMLSILM
567
0
0
30 Apr 2025
Robo-Troj: Attacking LLM-based Task Planners
Robo-Troj: Attacking LLM-based Task Planners
Mohaiminul Al Nahian
Zainab Altaweel
David Reitano
Sabbir Ahmed
Saumitra Lohokare
Shiqi Zhang
AAML
470
3
0
23 Apr 2025
Exploring Backdoor Attack and Defense for LLM-empowered Recommendations
Exploring Backdoor Attack and Defense for LLM-empowered Recommendations
Liangbo Ning
Wenqi Fan
Qing Li
AAMLSILM
409
5
0
15 Apr 2025
Parasite: A Steganography-based Backdoor Attack Framework for Diffusion Models
Parasite: A Steganography-based Backdoor Attack Framework for Diffusion Models
Jianfei Chen
Yu Pan
Yi Du
Chunkai Wu
Lin Wang
DiffM
409
2
0
08 Apr 2025
A Survey on Unlearnable Data
A Survey on Unlearnable Data
Jiahao Li
Yiqiang Chen
Yunbing Xing
Yang Gu
Xiangyuan Lan
AAML
422
2
0
30 Mar 2025
DeBackdoor: A Deductive Framework for Detecting Backdoor Attacks on Deep Models with Limited Data
DeBackdoor: A Deductive Framework for Detecting Backdoor Attacks on Deep Models with Limited Data
Dorde Popovic
Amin Sadeghi
Ting Yu
Sanjay Chawla
Issa M. Khalil
AAML
387
2
0
27 Mar 2025
A Semantic and Clean-label Backdoor Attack against Graph Convolutional Networks
A Semantic and Clean-label Backdoor Attack against Graph Convolutional Networks
Jiazhu Dai
Haoyu Sun
AAML
359
0
0
19 Mar 2025
Breaking Free from MMI: A New Frontier in Rationalization by Probing Input Utilization
Breaking Free from MMI: A New Frontier in Rationalization by Probing Input UtilizationInternational Conference on Learning Representations (ICLR), 2025
Wen Liu
Zhiying Deng
Zhongyu Niu
Jun Wang
Yining Qi
Zhigang Zeng
Ruixuan Li
444
9
0
08 Mar 2025
CBW: Towards Dataset Ownership Verification for Speaker Verification via Clustering-based Backdoor Watermarking
CBW: Towards Dataset Ownership Verification for Speaker Verification via Clustering-based Backdoor Watermarking
Yiming Li
Kaiying Yan
Shuo Shao
Tongqing Zhai
Shu-Tao Xia
Zhan Qin
D. Tao
AAML
963
3
0
02 Mar 2025
Re-Imagining Multimodal Instruction Tuning: A Representation View
Re-Imagining Multimodal Instruction Tuning: A Representation ViewInternational Conference on Learning Representations (ICLR), 2025
Yiyang Liu
James Liang
Ruixiang Tang
Yugyung Lee
Majid Rabbani
...
Raghuveer M. Rao
Lifu Huang
Dongfang Liu
Qifan Wang
Cheng Han
1.2K
13
0
02 Mar 2025
A Dual-Purpose Framework for Backdoor Defense and Backdoor Amplification in Diffusion Models
A Dual-Purpose Framework for Backdoor Defense and Backdoor Amplification in Diffusion Models
Vu Tuan Truong Long
Bao Le
DiffMAAML
1.2K
5
0
26 Feb 2025
Multi-Target Federated Backdoor Attack Based on Feature Aggregation
Multi-Target Federated Backdoor Attack Based on Feature AggregationPattern Recognition (Pattern Recogn.), 2025
Lingguag Hao
K. Hao
Bing Wei
Xue-song Tang
FedMLAAML
399
0
0
23 Feb 2025
REFINE: Inversion-Free Backdoor Defense via Model Reprogramming
REFINE: Inversion-Free Backdoor Defense via Model ReprogrammingInternational Conference on Learning Representations (ICLR), 2025
Yuxiao Chen
Shuo Shao
Enhao Huang
Yiming Li
Pin-Yu Chen
Zhan Qin
Kui Ren
AAML
311
23
0
22 Feb 2025
12345678
Next
Page 1 of 8