ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2102.05123
  4. Cited By
Backdoor Scanning for Deep Neural Networks through K-Arm Optimization

Backdoor Scanning for Deep Neural Networks through K-Arm Optimization

9 February 2021
Guangyu Shen
Yingqi Liu
Guanhong Tao
Shengwei An
Qiuling Xu
Shuyang Cheng
Shiqing Ma
X. Zhang
    AAML
ArXivPDFHTML

Papers citing "Backdoor Scanning for Deep Neural Networks through K-Arm Optimization"

50 / 79 papers shown
Title
Secure Transfer Learning: Training Clean Models Against Backdoor in (Both) Pre-trained Encoders and Downstream Datasets
Secure Transfer Learning: Training Clean Models Against Backdoor in (Both) Pre-trained Encoders and Downstream Datasets
Y. Zhang
Yuxuan Zhou
Tianyu Li
Minghui Li
Shengshan Hu
Wei Luo
L. Zhang
AAML
SILM
43
0
0
16 Apr 2025
DeBackdoor: A Deductive Framework for Detecting Backdoor Attacks on Deep Models with Limited Data
DeBackdoor: A Deductive Framework for Detecting Backdoor Attacks on Deep Models with Limited Data
Dorde Popovic
Amin Sadeghi
Ting Yu
Sanjay Chawla
Issa M. Khalil
AAML
49
0
0
27 Mar 2025
Seal Your Backdoor with Variational Defense
Ivan Sabolić
Matej Grcić
Sinisa Segvic
AAML
150
0
0
11 Mar 2025
Scanning Trojaned Models Using Out-of-Distribution Samples
Scanning Trojaned Models Using Out-of-Distribution Samples
Hossein Mirzaei
Ali Ansari
Bahar Dibaei Nia
Mojtaba Nafez
Moein Madadi
...
Kian Shamsaie
Mahdi Hajialilue
Jafar Habibi
Mohammad Sabokrou
M. Rohban
OODD
61
2
0
28 Jan 2025
Solving Trojan Detection Competitions with Linear Weight Classification
Solving Trojan Detection Competitions with Linear Weight Classification
Todd P. Huster
Peter Lin
Razvan Stefanescu
E. Ekwedike
R. Chadha
AAML
32
0
0
05 Nov 2024
Long-Tailed Backdoor Attack Using Dynamic Data Augmentation Operations
Long-Tailed Backdoor Attack Using Dynamic Data Augmentation Operations
Lu Pang
Tao Sun
Weimin Lyu
Haibin Ling
C. L. P. Chen
AAML
21
0
0
16 Oct 2024
CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models
CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models
Rui Zeng
Xi Chen
Yuwen Pu
Xuhong Zhang
Tianyu Du
Shouling Ji
41
2
0
02 Sep 2024
A Survey of Trojan Attacks and Defenses to Deep Neural Networks
A Survey of Trojan Attacks and Defenses to Deep Neural Networks
Lingxin Jin
Xianyu Wen
Wei Jiang
Jinyu Zhan
AAML
33
1
0
15 Aug 2024
UNIT: Backdoor Mitigation via Automated Neural Distribution Tightening
UNIT: Backdoor Mitigation via Automated Neural Distribution Tightening
Shuyang Cheng
Guangyu Shen
Kaiyuan Zhang
Guanhong Tao
Shengwei An
Hanxi Guo
Shiqing Ma
Xiangyu Zhang
AAML
25
0
0
16 Jul 2024
PSBD: Prediction Shift Uncertainty Unlocks Backdoor Detection
PSBD: Prediction Shift Uncertainty Unlocks Backdoor Detection
Wei Li
Pin-Yu Chen
Sijia Liu
Ren Wang
AAML
43
3
0
09 Jun 2024
Mutual Information Guided Backdoor Mitigation for Pre-trained Encoders
Mutual Information Guided Backdoor Mitigation for Pre-trained Encoders
Tingxu Han
Weisong Sun
Ziqi Ding
Chunrong Fang
Hanwei Qian
Jiaxun Li
Zhenyu Chen
Xiangyu Zhang
AAML
38
7
0
05 Jun 2024
BAN: Detecting Backdoors Activated by Adversarial Neuron Noise
BAN: Detecting Backdoors Activated by Adversarial Neuron Noise
Xiaoyun Xu
Zhuoran Liu
Stefanos Koffas
Shujian Yu
S. Picek
AAML
32
1
0
30 May 2024
Unified Neural Backdoor Removal with Only Few Clean Samples through
  Unlearning and Relearning
Unified Neural Backdoor Removal with Only Few Clean Samples through Unlearning and Relearning
Nay Myat Min
Long H. Pham
Jun Sun
MU
AAML
37
0
0
23 May 2024
Invisible Backdoor Attack against Self-supervised Learning
Invisible Backdoor Attack against Self-supervised Learning
Hanrong Zhang
Zhenting Wang
Tingxu Han
Mingyu Jin
Chenlu Zhan
Mengnan Du
Hongwei Wang
Shiqing Ma
Hongwei Wang
Shiqing Ma
AAML
SSL
49
2
0
23 May 2024
LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning
LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning
Shuyang Cheng
Guanhong Tao
Yingqi Liu
Guangyu Shen
Shengwei An
Shiwei Feng
Xiangzhe Xu
Kaiyuan Zhang
Shiqing Ma
Xiangyu Zhang
AAML
32
3
0
25 Mar 2024
Backdoor Secrets Unveiled: Identifying Backdoor Data with Optimized
  Scaled Prediction Consistency
Backdoor Secrets Unveiled: Identifying Backdoor Data with Optimized Scaled Prediction Consistency
Soumyadeep Pal
Yuguang Yao
Ren Wang
Bingquan Shen
Sijia Liu
AAML
36
8
0
15 Mar 2024
Advancing Security in AI Systems: A Novel Approach to Detecting
  Backdoors in Deep Neural Networks
Advancing Security in AI Systems: A Novel Approach to Detecting Backdoors in Deep Neural Networks
Khondoker Murad Hossain
Tim Oates
AAML
27
1
0
13 Mar 2024
On the (In)feasibility of ML Backdoor Detection as an Hypothesis Testing
  Problem
On the (In)feasibility of ML Backdoor Detection as an Hypothesis Testing Problem
Georg Pichler
Marco Romanelli
Divya Prakash Manivannan
P. Krishnamurthy
Farshad Khorrami
Siddharth Garg
25
2
0
26 Feb 2024
Preference Poisoning Attacks on Reward Model Learning
Preference Poisoning Attacks on Reward Model Learning
Junlin Wu
Jiong Wang
Chaowei Xiao
Chenguang Wang
Ning Zhang
Yevgeniy Vorobeychik
AAML
24
5
0
02 Feb 2024
SSL-OTA: Unveiling Backdoor Threats in Self-Supervised Learning for
  Object Detection
SSL-OTA: Unveiling Backdoor Threats in Self-Supervised Learning for Object Detection
Qiannan Wang
Changchun Yin
Lu Zhou
Liming Fang
11
1
0
30 Dec 2023
Data and Model Poisoning Backdoor Attacks on Wireless Federated
  Learning, and the Defense Mechanisms: A Comprehensive Survey
Data and Model Poisoning Backdoor Attacks on Wireless Federated Learning, and the Defense Mechanisms: A Comprehensive Survey
Yichen Wan
Youyang Qu
Wei Ni
Yong Xiang
Longxiang Gao
Ekram Hossain
AAML
49
33
0
14 Dec 2023
Defenses in Adversarial Machine Learning: A Survey
Defenses in Adversarial Machine Learning: A Survey
Baoyuan Wu
Shaokui Wei
Mingli Zhu
Meixi Zheng
Zihao Zhu
Mingda Zhang
Hongrui Chen
Danni Yuan
Li Liu
Qingshan Liu
AAML
30
14
0
13 Dec 2023
AGNES: Abstraction-guided Framework for Deep Neural Networks Security
AGNES: Abstraction-guided Framework for Deep Neural Networks Security
Akshay Dhonthi
Marcello Eiermann
E. M. Hahn
Vahid Hashemi
AAML
24
0
0
07 Nov 2023
CBD: A Certified Backdoor Detector Based on Local Dominant Probability
CBD: A Certified Backdoor Detector Based on Local Dominant Probability
Zhen Xiang
Zidi Xiong
Bo Li
AAML
18
14
0
26 Oct 2023
FLTracer: Accurate Poisoning Attack Provenance in Federated Learning
FLTracer: Accurate Poisoning Attack Provenance in Federated Learning
Xinyu Zhang
Qingyu Liu
Zhongjie Ba
Yuan Hong
Tianhang Zheng
Feng Lin
Liwang Lu
Kui Ren
AAML
34
10
0
20 Oct 2023
GhostEncoder: Stealthy Backdoor Attacks with Dynamic Triggers to
  Pre-trained Encoders in Self-supervised Learning
GhostEncoder: Stealthy Backdoor Attacks with Dynamic Triggers to Pre-trained Encoders in Self-supervised Learning
Qiannan Wang
Changchun Yin
Zhe Liu
Liming Fang
Run Wang
Chenhao Lin
AAML
30
4
0
01 Oct 2023
MDTD: A Multi Domain Trojan Detector for Deep Neural Networks
MDTD: A Multi Domain Trojan Detector for Deep Neural Networks
Arezoo Rajabi
Surudhi Asokraj
Feng-Shr Jiang
Luyao Niu
Bhaskar Ramasubramanian
J. Ritcey
Radha Poovendran
AAML
21
1
0
30 Aug 2023
XGBD: Explanation-Guided Graph Backdoor Detection
XGBD: Explanation-Guided Graph Backdoor Detection
Zihan Guan
Mengnan Du
Ninghao Liu
AAML
26
9
0
08 Aug 2023
Efficient Backdoor Removal Through Natural Gradient Fine-tuning
Efficient Backdoor Removal Through Natural Gradient Fine-tuning
Nazmul Karim
Abdullah Al Arafat
Umar Khalid
Zhishan Guo
Naznin Rahnavard
AAML
26
1
0
30 Jun 2023
UMD: Unsupervised Model Detection for X2X Backdoor Attacks
UMD: Unsupervised Model Detection for X2X Backdoor Attacks
Zhen Xiang
Zidi Xiong
Bo-wen Li
AAML
22
20
0
29 May 2023
NOTABLE: Transferable Backdoor Attacks Against Prompt-based NLP Models
NOTABLE: Transferable Backdoor Attacks Against Prompt-based NLP Models
Kai Mei
Zheng Li
Zhenting Wang
Yang Zhang
Shiqing Ma
AAML
SILM
34
48
0
28 May 2023
Reconstructive Neuron Pruning for Backdoor Defense
Reconstructive Neuron Pruning for Backdoor Defense
Yige Li
X. Lyu
Xingjun Ma
Nodens Koren
Lingjuan Lyu
Bo-wen Li
Yugang Jiang
AAML
27
41
0
24 May 2023
UNICORN: A Unified Backdoor Trigger Inversion Framework
UNICORN: A Unified Backdoor Trigger Inversion Framework
Zhenting Wang
Kai Mei
Juan Zhai
Shiqing Ma
LLMSV
27
44
0
05 Apr 2023
Detecting Backdoors in Pre-trained Encoders
Detecting Backdoors in Pre-trained Encoders
Shiwei Feng
Guanhong Tao
Shuyang Cheng
Guangyu Shen
Xiangzhe Xu
Yingqi Liu
Kaiyuan Zhang
Shiqing Ma
Xiangyu Zhang
76
47
0
23 Mar 2023
Backdoor Defense via Deconfounded Representation Learning
Backdoor Defense via Deconfounded Representation Learning
Zaixin Zhang
Qi Liu
Zhicai Wang
Zepu Lu
Qingyong Hu
AAML
49
39
0
13 Mar 2023
Single Image Backdoor Inversion via Robust Smoothed Classifiers
Single Image Backdoor Inversion via Robust Smoothed Classifiers
Mingjie Sun
Zico Kolter
AAML
8
12
0
01 Mar 2023
SATBA: An Invisible Backdoor Attack Based On Spatial Attention
SATBA: An Invisible Backdoor Attack Based On Spatial Attention
Huasong Zhou
Xiaowei Xu
Zhenyu Wang
Leon Bevan Bullock
AAML
22
1
0
25 Feb 2023
Poisoning Web-Scale Training Datasets is Practical
Poisoning Web-Scale Training Datasets is Practical
Nicholas Carlini
Matthew Jagielski
Christopher A. Choquette-Choo
Daniel Paleka
Will Pearce
Hyrum S. Anderson
Andreas Terzis
Kurt Thomas
Florian Tramèr
SILM
31
182
0
20 Feb 2023
Backdoor Learning for NLP: Recent Advances, Challenges, and Future
  Research Directions
Backdoor Learning for NLP: Recent Advances, Challenges, and Future Research Directions
Marwan Omar
SILM
AAML
31
20
0
14 Feb 2023
BackdoorBox: A Python Toolbox for Backdoor Learning
BackdoorBox: A Python Toolbox for Backdoor Learning
Yiming Li
Mengxi Ya
Yang Bai
Yong Jiang
Shutao Xia
AAML
44
40
0
01 Feb 2023
Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering
Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering
Rui Zhu
Di Tang
Siyuan Tang
Guanhong Tao
Shiqing Ma
XiaoFeng Wang
Haixu Tang
DD
16
3
0
29 Jan 2023
Distilling Cognitive Backdoor Patterns within an Image
Distilling Cognitive Backdoor Patterns within an Image
Hanxun Huang
Xingjun Ma
S. Erfani
James Bailey
AAML
26
24
0
26 Jan 2023
BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense
BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense
Shuyang Cheng
Guanhong Tao
Yingqi Liu
Shengwei An
Xiangzhe Xu
...
Guangyu Shen
Kaiyuan Zhang
Qiuling Xu
Shiqing Ma
Xiangyu Zhang
AAML
16
14
0
16 Jan 2023
Look, Listen, and Attack: Backdoor Attacks Against Video Action
  Recognition
Look, Listen, and Attack: Backdoor Attacks Against Video Action Recognition
Hasan Hammoud
Shuming Liu
Mohammad Alkhrashi
Fahad Albalawi
Bernard Ghanem
AAML
32
8
0
03 Jan 2023
Selective Amnesia: On Efficient, High-Fidelity and Blind Suppression of
  Backdoor Effects in Trojaned Machine Learning Models
Selective Amnesia: On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned Machine Learning Models
Rui Zhu
Di Tang
Siyuan Tang
XiaoFeng Wang
Haixu Tang
AAML
FedML
29
13
0
09 Dec 2022
Backdoor Vulnerabilities in Normally Trained Deep Learning Models
Backdoor Vulnerabilities in Normally Trained Deep Learning Models
Guanhong Tao
Zhenting Wang
Shuyang Cheng
Shiqing Ma
Shengwei An
Yingqi Liu
Guangyu Shen
Zhuo Zhang
Yunshu Mao
Xiangyu Zhang
SILM
17
17
0
29 Nov 2022
Dormant Neural Trojans
Dormant Neural Trojans
Feisi Fu
Panagiota Kiourti
Wenchao Li
AAML
28
0
0
02 Nov 2022
Rethinking the Reverse-engineering of Trojan Triggers
Rethinking the Reverse-engineering of Trojan Triggers
Zhenting Wang
Kai Mei
Hailun Ding
Juan Zhai
Shiqing Ma
18
45
0
27 Oct 2022
FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated
  Learning
FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning
Kaiyuan Zhang
Guanhong Tao
Qiuling Xu
Shuyang Cheng
Shengwei An
...
Shiwei Feng
Guangyu Shen
Pin-Yu Chen
Shiqing Ma
Xiangyu Zhang
FedML
40
51
0
23 Oct 2022
Expose Backdoors on the Way: A Feature-Based Efficient Defense against
  Textual Backdoor Attacks
Expose Backdoors on the Way: A Feature-Based Efficient Defense against Textual Backdoor Attacks
Sishuo Chen
Wenkai Yang
Zhiyuan Zhang
Xiaohan Bi
Xu Sun
SILM
AAML
24
23
0
14 Oct 2022
12
Next