ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2102.05123
  4. Cited By
Backdoor Scanning for Deep Neural Networks through K-Arm Optimization

Backdoor Scanning for Deep Neural Networks through K-Arm Optimization

9 February 2021
Guangyu Shen
Yingqi Liu
Guanhong Tao
Shengwei An
Qiuling Xu
Shuyang Cheng
Shiqing Ma
X. Zhang
    AAML
ArXivPDFHTML

Papers citing "Backdoor Scanning for Deep Neural Networks through K-Arm Optimization"

29 / 79 papers shown
Title
Understanding Impacts of Task Similarity on Backdoor Attack and
  Detection
Understanding Impacts of Task Similarity on Backdoor Attack and Detection
Di Tang
Rui Zhu
XiaoFeng Wang
Haixu Tang
Yi Chen
AAML
16
5
0
12 Oct 2022
Confidence Matters: Inspecting Backdoors in Deep Neural Networks via
  Distribution Transfer
Confidence Matters: Inspecting Backdoors in Deep Neural Networks via Distribution Transfer
Tong Wang
Yuan Yao
F. Xu
Miao Xu
Shengwei An
Ting Wang
AAML
14
2
0
13 Aug 2022
Attention Hijacking in Trojan Transformers
Attention Hijacking in Trojan Transformers
Weimin Lyu
Songzhu Zheng
Teng Ma
Haibin Ling
Chao Chen
27
6
0
09 Aug 2022
PerD: Perturbation Sensitivity-based Neural Trojan Detection Framework
  on NLP Applications
PerD: Perturbation Sensitivity-based Neural Trojan Detection Framework on NLP Applications
Diego Garcia-soto
Huili Chen
F. Koushanfar
AAML
17
4
0
08 Aug 2022
MOVE: Effective and Harmless Ownership Verification via Embedded External Features
MOVE: Effective and Harmless Ownership Verification via Embedded External Features
Yiming Li
Linghui Zhu
Xiaojun Jia
Yang Bai
Yong Jiang
Shutao Xia
Xiaochun Cao
Kui Ren
AAML
44
12
0
04 Aug 2022
Game of Trojans: A Submodular Byzantine Approach
Game of Trojans: A Submodular Byzantine Approach
D. Sahabandu
Arezoo Rajabi
Luyao Niu
B. Li
Bhaskar Ramasubramanian
Radha Poovendran
AAML
28
0
0
13 Jul 2022
DECK: Model Hardening for Defending Pervasive Backdoors
DECK: Model Hardening for Defending Pervasive Backdoors
Guanhong Tao
Yingqi Liu
Shuyang Cheng
Shengwei An
Zhuo Zhang
Qiuling Xu
Guangyu Shen
Xiangyu Zhang
AAML
20
7
0
18 Jun 2022
Turning a Curse into a Blessing: Enabling In-Distribution-Data-Free
  Backdoor Removal via Stabilized Model Inversion
Turning a Curse into a Blessing: Enabling In-Distribution-Data-Free Backdoor Removal via Stabilized Model Inversion
Si-An Chen
Yi Zeng
J. T.Wang
Won Park
Xun Chen
Lingjuan Lyu
Zhuoqing Mao
R. Jia
8
3
0
14 Jun 2022
BadDet: Backdoor Attacks on Object Detection
BadDet: Backdoor Attacks on Object Detection
Shih-Han Chan
Yinpeng Dong
Junyi Zhu
Xiaolu Zhang
Jun Zhou
AAML
22
56
0
28 May 2022
BppAttack: Stealthy and Efficient Trojan Attacks against Deep Neural
  Networks via Image Quantization and Contrastive Adversarial Learning
BppAttack: Stealthy and Efficient Trojan Attacks against Deep Neural Networks via Image Quantization and Contrastive Adversarial Learning
Zhenting Wang
Juan Zhai
Shiqing Ma
AAML
126
97
0
26 May 2022
MM-BD: Post-Training Detection of Backdoor Attacks with Arbitrary
  Backdoor Pattern Types Using a Maximum Margin Statistic
MM-BD: Post-Training Detection of Backdoor Attacks with Arbitrary Backdoor Pattern Types Using a Maximum Margin Statistic
Hang Wang
Zhen Xiang
David J. Miller
G. Kesidis
AAML
32
41
0
13 May 2022
A Study of the Attention Abnormality in Trojaned BERTs
A Study of the Attention Abnormality in Trojaned BERTs
Weimin Lyu
Songzhu Zheng
Teng Ma
Chao Chen
51
56
0
13 May 2022
Wild Patterns Reloaded: A Survey of Machine Learning Security against
  Training Data Poisoning
Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning
Antonio Emanuele Cinà
Kathrin Grosse
Ambra Demontis
Sebastiano Vascon
Werner Zellinger
Bernhard A. Moser
Alina Oprea
Battista Biggio
Marcello Pelillo
Fabio Roli
AAML
17
116
0
04 May 2022
Label-Smoothed Backdoor Attack
Label-Smoothed Backdoor Attack
Minlong Peng
Zidi Xiong
Mingming Sun
Ping Li
AAML
31
3
0
19 Feb 2022
A Survey of Neural Trojan Attacks and Defenses in Deep Learning
A Survey of Neural Trojan Attacks and Defenses in Deep Learning
Jie Wang
Ghulam Mubashar Hassan
Naveed Akhtar
AAML
26
24
0
15 Feb 2022
Training with More Confidence: Mitigating Injected and Natural Backdoors
  During Training
Training with More Confidence: Mitigating Injected and Natural Backdoors During Training
Zhenting Wang
Hailun Ding
Juan Zhai
Shiqing Ma
AAML
13
45
0
13 Feb 2022
Constrained Optimization with Dynamic Bound-scaling for Effective
  NLPBackdoor Defense
Constrained Optimization with Dynamic Bound-scaling for Effective NLPBackdoor Defense
Guangyu Shen
Yingqi Liu
Guanhong Tao
Qiuling Xu
Zhuo Zhang
Shengwei An
Shiqing Ma
X. Zhang
AAML
13
33
0
11 Feb 2022
Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers
Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers
Limin Yang
Zhi Chen
Jacopo Cortellazzi
Feargus Pendlebury
Kevin Tu
Fabio Pierazzi
Lorenzo Cavallaro
Gang Wang
AAML
18
36
0
11 Feb 2022
PolicyCleanse: Backdoor Detection and Mitigation in Reinforcement
  Learning
PolicyCleanse: Backdoor Detection and Mitigation in Reinforcement Learning
Junfeng Guo
Ang Li
Cong Liu
AAML
22
14
0
08 Feb 2022
Backdoor Defense via Decoupling the Training Process
Backdoor Defense via Decoupling the Training Process
Kunzhe Huang
Yiming Li
Baoyuan Wu
Zhan Qin
Kui Ren
AAML
FedML
24
185
0
05 Feb 2022
CatchBackdoor: Backdoor Detection via Critical Trojan Neural Path
  Fuzzing
CatchBackdoor: Backdoor Detection via Critical Trojan Neural Path Fuzzing
Haibo Jin
Ruoxi Chen
Jinyin Chen
Haibin Zheng
Yang Zhang
Haohan Wang
AAML
21
1
0
24 Dec 2021
Anti-Backdoor Learning: Training Clean Models on Poisoned Data
Anti-Backdoor Learning: Training Clean Models on Poisoned Data
Yige Li
X. Lyu
Nodens Koren
Lingjuan Lyu
Bo-wen Li
Xingjun Ma
OnRL
25
320
0
22 Oct 2021
Trigger Hunting with a Topological Prior for Trojan Detection
Trigger Hunting with a Topological Prior for Trojan Detection
Xiaoling Hu
Xiaoyu Lin
Michael Cogswell
Yi Yao
Susmit Jha
Chao Chen
AAML
16
46
0
15 Oct 2021
Signal Transformer: Complex-valued Attention and Meta-Learning for
  Signal Recognition
Signal Transformer: Complex-valued Attention and Meta-Learning for Signal Recognition
Yihong Dong
Ying Peng
Muqiao Yang
Songtao Lu
Qingjiang Shi
40
9
0
05 Jun 2021
MISA: Online Defense of Trojaned Models using Misattributions
MISA: Online Defense of Trojaned Models using Misattributions
Panagiota Kiourti
Wenchao Li
Anirban Roy
Karan Sikka
Susmit Jha
13
10
0
29 Mar 2021
TOP: Backdoor Detection in Neural Networks via Transferability of
  Perturbation
TOP: Backdoor Detection in Neural Networks via Transferability of Perturbation
Todd P. Huster
E. Ekwedike
SILM
16
19
0
18 Mar 2021
Backdoor Learning: A Survey
Backdoor Learning: A Survey
Yiming Li
Yong Jiang
Zhifeng Li
Shutao Xia
AAML
45
586
0
17 Jul 2020
Clean-Label Backdoor Attacks on Video Recognition Models
Clean-Label Backdoor Attacks on Video Recognition Models
Shihao Zhao
Xingjun Ma
Xiang Zheng
James Bailey
Jingjing Chen
Yu-Gang Jiang
AAML
196
252
0
06 Mar 2020
SentiNet: Detecting Localized Universal Attacks Against Deep Learning
  Systems
SentiNet: Detecting Localized Universal Attacks Against Deep Learning Systems
Edward Chou
Florian Tramèr
Giancarlo Pellegrino
AAML
168
287
0
02 Dec 2018
Previous
12