Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
2007.15802
Cited By
Practical Detection of Trojan Neural Networks: Data-Limited and Data-Free Cases
31 July 2020
Ren Wang
Gaoyuan Zhang
Sijia Liu
Pin-Yu Chen
Jinjun Xiong
Meng Wang
AAML
Re-assign community
ArXiv
PDF
HTML
Papers citing
"Practical Detection of Trojan Neural Networks: Data-Limited and Data-Free Cases"
27 / 27 papers shown
Title
PSBD: Prediction Shift Uncertainty Unlocks Backdoor Detection
Wei Li
Pin-Yu Chen
Sijia Liu
Ren Wang
AAML
43
3
0
09 Jun 2024
Partial train and isolate, mitigate backdoor attack
Yong Li
Han Gao
AAML
29
0
0
26 May 2024
Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks
Jialai Wang
Ziyuan Zhang
Meiqi Wang
Han Qiu
Tianwei Zhang
Qi Li
Zongpeng Li
Tao Wei
Chao Zhang
AAML
22
20
0
27 Feb 2023
Salient Conditional Diffusion for Defending Against Backdoor Attacks
Brandon B. May
N. Joseph Tatro
Dylan Walker
Piyush Kumar
N. Shnidman
DiffM
24
7
0
31 Jan 2023
Towards Understanding How Self-training Tolerates Data Backdoor Poisoning
Soumyadeep Pal
Ren Wang
Yuguang Yao
Sijia Liu
43
6
0
20 Jan 2023
Backdoor Attacks Against Dataset Distillation
Yugeng Liu
Zheng Li
Michael Backes
Yun Shen
Yang Zhang
DD
31
27
0
03 Jan 2023
Mind Your Heart: Stealthy Backdoor Attack on Dynamic Deep Neural Network in Edge Computing
Tian Dong
Ziyuan Zhang
Han Qiu
Tianwei Zhang
Hewu Li
T. Wang
AAML
23
6
0
22 Dec 2022
Poison Attack and Defense on Deep Source Code Processing Models
Jia Li
Zhuo Li
Huangzhao Zhang
Ge Li
Zhi Jin
Xing Hu
Xin Xia
AAML
35
16
0
31 Oct 2022
FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning
Kaiyuan Zhang
Guanhong Tao
Qiuling Xu
Shuyang Cheng
Shengwei An
...
Shiwei Feng
Guangyu Shen
Pin-Yu Chen
Shiqing Ma
Xiangyu Zhang
FedML
40
51
0
23 Oct 2022
Understanding Impacts of Task Similarity on Backdoor Attack and Detection
Di Tang
Rui Zhu
XiaoFeng Wang
Haixu Tang
Yi Chen
AAML
11
5
0
12 Oct 2022
Universal Backdoor Attacks Detection via Adaptive Adversarial Probe
Yuhang Wang
Huafeng Shi
Rui Min
Ruijia Wu
Siyuan Liang
Yichao Wu
Ding Liang
Aishan Liu
AAML
37
7
0
12 Sep 2022
Defense against Backdoor Attacks via Identifying and Purifying Bad Neurons
Mingyuan Fan
Yang Liu
Cen Chen
Ximeng Liu
Wenzhong Guo
AAML
13
4
0
13 Aug 2022
DECK: Model Hardening for Defending Pervasive Backdoors
Guanhong Tao
Yingqi Liu
Shuyang Cheng
Shengwei An
Zhuo Zhang
Qiuling Xu
Guangyu Shen
Xiangyu Zhang
AAML
18
7
0
18 Jun 2022
Backdoor Attacks on Bayesian Neural Networks using Reverse Distribution
Zhixin Pan
Prabhat Mishra
AAML
13
4
0
18 May 2022
Post-Training Detection of Backdoor Attacks for Two-Class and Multi-Attack Scenarios
Zhen Xiang
David J. Miller
G. Kesidis
AAML
28
47
0
20 Jan 2022
FIBA: Frequency-Injection based Backdoor Attack in Medical Image Analysis
Yu Feng
Benteng Ma
Jing Zhang
Shanshan Zhao
Yong-quan Xia
Dacheng Tao
AAML
31
84
0
02 Dec 2021
AEVA: Black-box Backdoor Detection Using Adversarial Extreme Value Analysis
Junfeng Guo
Ang Li
Cong Liu
AAML
45
74
0
28 Oct 2021
Detecting Backdoor Attacks Against Point Cloud Classifiers
Zhen Xiang
David J. Miller
Siheng Chen
Xi Li
G. Kesidis
3DPC
AAML
32
15
0
20 Oct 2021
Multi-Trigger-Key: Towards Multi-Task Privacy Preserving In Deep Learning
Ren Wang
Zhe Xu
Alfred Hero
22
0
0
06 Oct 2021
Topological Detection of Trojaned Neural Networks
Songzhu Zheng
Yikai Zhang
H. Wagner
Mayank Goswami
Chao Chen
AAML
24
40
0
11 Jun 2021
Preventing Machine Learning Poisoning Attacks Using Authentication and Provenance
Jack W. Stokes
P. England
K. Kane
AAML
11
14
0
20 May 2021
A Backdoor Attack against 3D Point Cloud Classifiers
Zhen Xiang
David J. Miller
Siheng Chen
Xi Li
G. Kesidis
3DPC
AAML
28
76
0
12 Apr 2021
TOP: Backdoor Detection in Neural Networks via Transferability of Perturbation
Todd P. Huster
E. Ekwedike
SILM
10
19
0
18 Mar 2021
EX-RAY: Distinguishing Injected Backdoor from Natural Features in Neural Networks by Examining Differential Feature Symmetry
Yingqi Liu
Guangyu Shen
Guanhong Tao
Zhenting Wang
Shiqing Ma
X. Zhang
AAML
22
8
0
16 Mar 2021
Backdoor Scanning for Deep Neural Networks through K-Arm Optimization
Guangyu Shen
Yingqi Liu
Guanhong Tao
Shengwei An
Qiuling Xu
Shuyang Cheng
Shiqing Ma
X. Zhang
AAML
17
117
0
09 Feb 2021
Cassandra: Detecting Trojaned Networks from Adversarial Perturbations
Xiaoyu Zhang
Ajmal Saeed Mian
Rohit Gupta
Nazanin Rahnavard
M. Shah
AAML
14
26
0
28 Jul 2020
Adversarial examples in the physical world
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILM
AAML
281
5,835
0
08 Jul 2016
1