ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2012.03816
  4. Cited By
Invisible Backdoor Attack with Sample-Specific Triggers
v1v2v3 (latest)

Invisible Backdoor Attack with Sample-Specific Triggers

7 December 2020
Yuezun Li
Yiming Li
Baoyuan Wu
Longkang Li
Ran He
Siwei Lyu
    AAMLDiffM
ArXiv (abs)PDFHTML

Papers citing "Invisible Backdoor Attack with Sample-Specific Triggers"

50 / 313 papers shown
Assimilation Matters: Model-level Backdoor Detection in Vision-Language Pretrained Models
Assimilation Matters: Model-level Backdoor Detection in Vision-Language Pretrained Models
Z. Wang
Jie M. Zhang
Shiguang Shan
Xilin Chen
AAML
427
0
0
29 Nov 2025
Exposing Vulnerabilities in RL: A Novel Stealthy Backdoor Attack through Reward Poisoning
Exposing Vulnerabilities in RL: A Novel Stealthy Backdoor Attack through Reward Poisoning
Bokang Zhang
Chaojun Lu
Jianhui Li
Junfeng Wu
AAML
197
0
0
27 Nov 2025
SteganoBackdoor: Stealthy and Data-Efficient Backdoor Attacks on Language Models
SteganoBackdoor: Stealthy and Data-Efficient Backdoor Attacks on Language Models
Eric Xue
Ruiyi Zhang
Zijun Zhang
AAML
226
0
0
18 Nov 2025
Enhancing All-to-X Backdoor Attacks with Optimized Target Class Mapping
Enhancing All-to-X Backdoor Attacks with Optimized Target Class Mapping
Lei Wang
Yulong Tian
Hao Han
Fengyuan Xu
AAML
299
0
0
17 Nov 2025
IndirectAD: Practical Data Poisoning Attacks against Recommender Systems for Item Promotion
IndirectAD: Practical Data Poisoning Attacks against Recommender Systems for Item Promotion
Zihao Wang
Tianhao Mao
XiaoFeng Wang
Di Tang
Xiaozhong Liu
AAML
190
0
0
08 Nov 2025
SWAP: Towards Copyright Auditing of Soft Prompts via Sequential Watermarking
SWAP: Towards Copyright Auditing of Soft Prompts via Sequential Watermarking
Wenyuan Yang
Yichen Sun
Changzheng Chen
Zhixuan Chu
Jiaheng Zhang
Yiming Li
Dacheng Tao
AAML
170
0
0
05 Nov 2025
Signature in Code Backdoor Detection, how far are we?
Signature in Code Backdoor Detection, how far are we?
Quoc Hung Le
Thanh Le-Cong
Bach Le
Bowen Xu
AAML
113
0
0
15 Oct 2025
Goal-oriented Backdoor Attack against Vision-Language-Action Models via Physical Objects
Goal-oriented Backdoor Attack against Vision-Language-Action Models via Physical Objects
Zirun Zhou
Zhengyang Xiao
Haochuan Xu
Jing Sun
Di Wang
Jingfeng Zhang
AAML
188
6
0
10 Oct 2025
DarkHash: A Data-Free Backdoor Attack Against Deep Hashing
DarkHash: A Data-Free Backdoor Attack Against Deep HashingIEEE Transactions on Information Forensics and Security (TIFS), 2025
Ziqi Zhou
Menghao Deng
Yufei Song
Hangtao Zhang
Wei Wan
Shengshan Hu
Minghui Li
Leo Yu Zhang
Dezhong Yao
399
7
0
09 Oct 2025
Backdoor Vectors: a Task Arithmetic View on Backdoor Attacks and Defenses
Backdoor Vectors: a Task Arithmetic View on Backdoor Attacks and Defenses
Stanisław Pawlak
Jan Dubiñski
Daniel Marczak
Bartłomiej Twardowski
AAMLMoMe
272
0
0
09 Oct 2025
Temporal Logic-Based Multi-Vehicle Backdoor Attacks against Offline RL Agents in End-to-end Autonomous Driving
Temporal Logic-Based Multi-Vehicle Backdoor Attacks against Offline RL Agents in End-to-end Autonomous Driving
Xuan Chen
Shiwei Feng
Zikang Xiong
Shengwei An
Yunshu Mao
Lu Yan
Guanhong Tao
Wenbo Guo
Xiangyu Zhang
AAML
265
2
0
21 Sep 2025
Backdoor Mitigation via Invertible Pruning Masks
Backdoor Mitigation via Invertible Pruning Masks
Kealan Dunnett
Reza Arablouei
Dimity Miller
Volkan Dedeoglu
Raja Jurdak
AAML
247
0
0
19 Sep 2025
Secure human oversight of AI: Threat modeling in a socio-technical context
Secure human oversight of AI: Threat modeling in a socio-technical context
Jonas C. Ditz
Veronika Lazar
Elmar Lichtmeß
Carola Plesch
Matthias Heck
Kevin Baum
Markus Langer
AAML
324
1
0
15 Sep 2025
Your Compiler is Backdooring Your Model: Understanding and Exploiting Compilation Inconsistency Vulnerabilities in Deep Learning Compilers
Your Compiler is Backdooring Your Model: Understanding and Exploiting Compilation Inconsistency Vulnerabilities in Deep Learning Compilers
Simin Chen
Jinjun Peng
Yixin He
Junfeng Yang
Baishakhi Ray
SILMELM
343
3
0
14 Sep 2025
Backdoor Attacks and Defenses in Computer Vision Domain: A Survey
Backdoor Attacks and Defenses in Computer Vision Domain: A Survey
Bilal Hussain Abbasi
Y. Zhang
L. Zhang
Shang Gao
AAML
190
0
0
09 Sep 2025
IAG: Input-aware Backdoor Attack on VLM-based Visual Grounding
IAG: Input-aware Backdoor Attack on VLM-based Visual Grounding
Junxian Li
Beining Xu
Simin Chen
Jiatong Li
Jingdi Lei
Haodong Zhao
Di Zhang
ObjDAAML
268
0
0
13 Aug 2025
Multi-Target Backdoor Attacks Against Speaker Recognition
Multi-Target Backdoor Attacks Against Speaker Recognition
Alexandrine Fortier
Sonal Joshi
Thomas Thebaud
Jesus Villalba Lopez
Najim Dehak
P. Cardinal
AAML
348
1
0
12 Aug 2025
From Detection to Correction: Backdoor-Resilient Face Recognition via Vision-Language Trigger Detection and Noise-Based Neutralization
From Detection to Correction: Backdoor-Resilient Face Recognition via Vision-Language Trigger Detection and Noise-Based Neutralization
Farah Wahida
M. Chamikara
Yashothara Shanmugarasa
Mohan Baruwal Chhetri
Thilina Ranbaduge
Ibrahim Khalil
AAML
147
0
0
07 Aug 2025
NT-ML: Backdoor Defense via Non-target Label Training and Mutual Learning
NT-ML: Backdoor Defense via Non-target Label Training and Mutual Learning
Wenjie Huo
Katinka Wolter
AAML
183
0
0
07 Aug 2025
BDFirewall: Towards Effective and Expeditiously Black-Box Backdoor Defense in MLaaS
BDFirewall: Towards Effective and Expeditiously Black-Box Backdoor Defense in MLaaS
Ye Li
Chengcheng Zhu
Yanchao Zhao
J. Zhang
AAML
177
1
0
05 Aug 2025
BadBlocks: Lightweight and Stealthy Backdoor Threat in Text-to-Image Diffusion Models
BadBlocks: Lightweight and Stealthy Backdoor Threat in Text-to-Image Diffusion Models
Yu Pan
Jiahao Chen
Lin Wang
Bingrong Dai
Yi Du
AAMLDiffM
363
0
0
05 Aug 2025
Towards Stealthy and Effective Backdoor Attacks on Lane Detection: A Naturalistic Data Poisoning Approach
Towards Stealthy and Effective Backdoor Attacks on Lane Detection: A Naturalistic Data Poisoning Approach
Yifan Liao
Yuxin Cao
Yedi Zhang
Wentao He
Yan Xiao
Xianglong Du
Zhiyong Huang
Jin Song Dong
AAML
219
5
0
04 Aug 2025
DISTIL: Data-Free Inversion of Suspicious Trojan Inputs via Latent Diffusion
DISTIL: Data-Free Inversion of Suspicious Trojan Inputs via Latent Diffusion
Hossein Mirzaei
Zeinab Sadat Taghavi
Sepehr Rezaee
Masoud Hadi
Moein Madadi
Mackenzie W. Mathis
AAML
214
1
0
30 Jul 2025
ConSeg: Contextual Backdoor Attack Against Semantic Segmentation
ConSeg: Contextual Backdoor Attack Against Semantic Segmentation
Bilal Hussain Abbasi
Zirui Gong
Yanjun Zhang
Shang Gao
A. Robles-Kelly
Leo Yu Zhang
288
0
0
26 Jul 2025
CLIP-Guided Backdoor Defense through Entropy-Based Poisoned Dataset Separation
CLIP-Guided Backdoor Defense through Entropy-Based Poisoned Dataset Separation
Binyan Xu
Fan Yang
Xilin Dai
Di Tang
Kehuan Zhang
AAML
220
1
0
07 Jul 2025
Backdoors in Conditional Diffusion: Threats to Responsible Synthetic Data Pipelines
Backdoors in Conditional Diffusion: Threats to Responsible Synthetic Data Pipelines
Raz Lapid
Almog Dubin
DiffM
197
1
0
07 Jul 2025
Privacy-Shielded Image Compression: Defending Against Exploitation from Vision-Language Pretrained Models
Privacy-Shielded Image Compression: Defending Against Exploitation from Vision-Language Pretrained Models
Xuelin Shen
Jiayin Xu
Kangsheng Yin
Wenhan Yang
AAML
347
0
0
18 Jun 2025
Poison Once, Control Anywhere: Clean-Text Visual Backdoors in VLM-based Mobile Agents
Poison Once, Control Anywhere: Clean-Text Visual Backdoors in VLM-based Mobile Agents
Xuan Wang
Yaning Tan
Zhe Liu
Yi Yu
Yuliang Lu
Xiaochun Cao
Ee-Chien Chang
X. Gao
AAML
637
0
0
16 Jun 2025
When Forgetting Triggers Backdoors: A Clean Unlearning Attack
When Forgetting Triggers Backdoors: A Clean Unlearning Attack
Marco Arazzi
Antonino Nocera
Vinod Puthuvath
AAMLMUOnRL
316
2
0
14 Jun 2025
TED-LaST: Towards Robust Backdoor Defense Against Adaptive Attacks
TED-LaST: Towards Robust Backdoor Defense Against Adaptive Attacks
Xiaoxing Mo
Y. Cheng
Nan Sun
L. Zhang
Wei Luo
Shang Gao
AAML
328
0
0
12 Jun 2025
Circumventing Backdoor Space via Weight Symmetry
Circumventing Backdoor Space via Weight Symmetry
Jie Peng
Hongwei Yang
Jing Zhao
Hengji Dong
Hui He
Weizhe Zhang
Haoyu He
AAML
311
1
0
09 Jun 2025
FIGhost: Fluorescent Ink-based Stealthy and Flexible Backdoor Attacks on Physical Traffic Sign Recognition
FIGhost: Fluorescent Ink-based Stealthy and Flexible Backdoor Attacks on Physical Traffic Sign Recognition
Shuai Yuan
Guowen Xu
Hongwei Li
Rui Zhang
Xinyuan Qian
Wenbo Jiang
Hangcheng Cao
Qingchuan Zhao
AAML
397
1
0
17 May 2025
The Ripple Effect: On Unforeseen Complications of Backdoor Attacks
The Ripple Effect: On Unforeseen Complications of Backdoor Attacks
Rui Zhang
Yun Shen
Hongwei Li
Wenbo Jiang
Hanxiao Chen
Yuan Zhang
Guowen Xu
Yang Zhang
SILMAAML
260
0
0
16 May 2025
Where the Devil Hides: Deepfake Detectors Can No Longer Be Trusted
Where the Devil Hides: Deepfake Detectors Can No Longer Be TrustedComputer Vision and Pattern Recognition (CVPR), 2025
Shuaiwei Yuan
Junyu Dong
Yuezun Li
AAML
391
3
0
13 May 2025
ChainMarks: Securing DNN Watermark with Cryptographic Chain
ChainMarks: Securing DNN Watermark with Cryptographic ChainACM Asia Conference on Computer and Communications Security (AsiaCCS), 2025
Brian Choi
Shu Wang
Isabelle Choi
Kun Sun
505
2
0
08 May 2025
BadPatches: Routing-aware Backdoor Attacks on Vision Mixture of Experts
BadPatches: Routing-aware Backdoor Attacks on Vision Mixture of Experts
Cedric Chan
Jona te Lintelo
S. Picek
AAMLMoE
1.1K
0
0
03 May 2025
Cert-SSBD: Certified Backdoor Defense with Sample-Specific Smoothing Noises
Cert-SSBD: Certified Backdoor Defense with Sample-Specific Smoothing Noises
Ting Qiao
Longji Xu
Xing Liu
Sixing Wu
Jianbing Li
Yiming Li
AAMLSILM
569
0
0
30 Apr 2025
FFCBA: Feature-based Full-target Clean-label Backdoor Attacks
FFCBA: Feature-based Full-target Clean-label Backdoor Attacks
Yangxu Yin
Wei Xu
Yudong Gao
Yang Liu
Liantao Wu
Hui Yuan
Wen Liu
AAML
395
2
0
29 Apr 2025
SFIBA: Spatial-based Full-target Invisible Backdoor Attacks
SFIBA: Spatial-based Full-target Invisible Backdoor Attacks
Yangxu Yin
Wei Xu
Yudong Gao
Yang Liu
Hui Yuan
Wen Liu
AAML
241
0
0
29 Apr 2025
BadVideo: Stealthy Backdoor Attack against Text-to-Video Generation
BadVideo: Stealthy Backdoor Attack against Text-to-Video Generation
Ke Xu
Mingli Zhu
Jiarong Ou
Ruoxin Chen
Xin Tao
Pengfei Wan
Baoyuan Wu
DiffMAAMLVGen
479
4
0
23 Apr 2025
Robo-Troj: Attacking LLM-based Task Planners
Robo-Troj: Attacking LLM-based Task Planners
Mohaiminul Al Nahian
Zainab Altaweel
David Reitano
Sabbir Ahmed
Saumitra Lohokare
Shiqi Zhang
AAML
470
3
0
23 Apr 2025
Data Poisoning in Deep Learning: A Survey
Data Poisoning in Deep Learning: A Survey
Pinlong Zhao
Weiyao Zhu
Pengfei Jiao
Di Gao
Ou Wu
AAML
557
23
0
27 Mar 2025
Prototype Guided Backdoor Defense
Prototype Guided Backdoor Defense
Venkat Adithya Amula
Sunayana Samavedam
Saurabh Saini
Avani Gupta
Narayanan P J
AAML
355
1
0
26 Mar 2025
Lie Detector: Unified Backdoor Detection via Cross-Examination Framework
Lie Detector: Unified Backdoor Detection via Cross-Examination Framework
Xiaobei Wang
Yaning Tan
Dongping Liao
Han Fang
Aishan Liu
Simeng Qin
Yu-liang Lu
E. Chang
X. Gao
AAML
403
7
0
21 Mar 2025
BadToken: Token-level Backdoor Attacks to Multi-modal Large Language Models
BadToken: Token-level Backdoor Attacks to Multi-modal Large Language ModelsComputer Vision and Pattern Recognition (CVPR), 2025
Zenghui Yuan
Jiawen Shi
Pan Zhou
Neil Zhenqiang Gong
Lichao Sun
AAML
518
12
0
20 Mar 2025
Backdooring CLIP through Concept Confusion
Backdooring CLIP through Concept Confusion
Lijie Hu
Junchi Liao
Weimin Lyu
Shaopeng Fu
Tianhao Huang
Shu Yang
Guimin Hu
Di Wang
AAML
357
1
0
12 Mar 2025
Revisiting Backdoor Attacks on Time Series Classification in the Frequency Domain
Revisiting Backdoor Attacks on Time Series Classification in the Frequency DomainThe Web Conference (WWW), 2025
Yuanmin Huang
Mi Zhang
Zhaoxiang Wang
Wenxuan Li
Min Yang
AAMLAI4TS
519
5
0
12 Mar 2025
Seal Your Backdoor with Variational Defense
Seal Your Backdoor with Variational Defense
Ivan Sabolić
Matej Grcić
Sinisa Segvic
AAML
1.2K
2
0
11 Mar 2025
Life-Cycle Routing Vulnerabilities of LLM Router
Life-Cycle Routing Vulnerabilities of LLM Router
Qiqi Lin
Xiaoyang Ji
Shengfang Zhai
Qingni Shen
Zhi-Li Zhang
Yuejian Fang
Yansong Gao
AAML
360
5
0
09 Mar 2025
AnywhereDoor: Multi-Target Backdoor Attacks on Object Detection
Jialin Lu
Junjie Shan
Ziqi Zhao
Ka-Ho Chow
AAML
500
3
0
09 Mar 2025
1234567
Next
Page 1 of 7