ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2102.10496
  4. Cited By
Targeted Attack against Deep Neural Networks via Flipping Limited Weight
  Bits

Targeted Attack against Deep Neural Networks via Flipping Limited Weight Bits

International Conference on Learning Representations (ICLR), 2021
21 February 2021
Jiawang Bai
Baoyuan Wu
Yong Zhang
Yiming Li
Zhifeng Li
Shutao Xia
    AAML
ArXiv (abs)PDFHTML

Papers citing "Targeted Attack against Deep Neural Networks via Flipping Limited Weight Bits"

47 / 47 papers shown
Title
SWAP: Towards Copyright Auditing of Soft Prompts via Sequential Watermarking
SWAP: Towards Copyright Auditing of Soft Prompts via Sequential Watermarking
Wenyuan Yang
Yichen Sun
Changzheng Chen
Zhixuan Chu
Jiaheng Zhang
Yiming Li
Dacheng Tao
AAML
96
0
0
05 Nov 2025
ObfusBFA: A Holistic Approach to Safeguarding DNNs from Different Types of Bit-Flip Attacks
ObfusBFA: A Holistic Approach to Safeguarding DNNs from Different Types of Bit-Flip Attacks
Xiaobei Yan
Han Qiu
Minlie Huang
AAML
236
0
0
12 Jun 2025
SFIBA: Spatial-based Full-target Invisible Backdoor Attacks
SFIBA: Spatial-based Full-target Invisible Backdoor Attacks
Yangxu Yin
Huajun Chen
Yudong Gao
Yang Liu
Hui Yuan
Wen Liu
AAML
158
0
0
29 Apr 2025
One Pixel is All I Need
One Pixel is All I Need
Deng Siqin
Zhou Xiaoyi
ViT
955
0
0
14 Dec 2024
A Semi Black-Box Adversarial Bit-Flip Attack with Limited DNN Model
  Information
A Semi Black-Box Adversarial Bit-Flip Attack with Limited DNN Model InformationICCD (ICCD), 2024
B. Ghavami
Mani Sadati
M. Shahidzadeh
Lesley Shannon
S. Wilton
AAML
173
0
0
12 Dec 2024
Data Free Backdoor Attacks
Data Free Backdoor AttacksNeural Information Processing Systems (NeurIPS), 2024
Bochuan Cao
Jinyuan Jia
Chuxuan Hu
Wenbo Guo
Zhen Xiang
Jinghui Chen
Yue Liu
Dawn Song
AAML
318
1
0
09 Dec 2024
DAT: Improving Adversarial Robustness via Generative Amplitude Mix-up in
  Frequency Domain
DAT: Improving Adversarial Robustness via Generative Amplitude Mix-up in Frequency DomainNeural Information Processing Systems (NeurIPS), 2024
Fengpeng Li
Kemou Li
Haiwei Wu
Jinyu Tian
Jiantao Zhou
AAML
267
4
0
16 Oct 2024
DeepBaR: Fault Backdoor Attack on Deep Neural Network Layers
DeepBaR: Fault Backdoor Attack on Deep Neural Network Layers
Camilo A. Mart´ınez-Mej´ıa
Jesus Solano
J. Breier
Dominik Bucko
Xiaolu Hou
AAML
141
0
0
30 Jul 2024
Performance Evaluation of Knowledge Graph Embedding Approaches under
  Non-adversarial Attacks
Performance Evaluation of Knowledge Graph Embedding Approaches under Non-adversarial Attacks
Sourabh Kapoor
Arnab Sharma
Michael Röder
Caglar Demir
Axel-Cyrille Ngonga Ngomo
AAML
132
0
0
09 Jul 2024
AI Risk Management Should Incorporate Both Safety and Security
AI Risk Management Should Incorporate Both Safety and Security
Xiangyu Qi
Yangsibo Huang
Yi Zeng
Edoardo Debenedetti
Jonas Geiping
...
Chaowei Xiao
Yue Liu
Dawn Song
Peter Henderson
Prateek Mittal
AAML
271
19
0
29 May 2024
DeepNcode: Encoding-Based Protection against Bit-Flip Attacks on Neural
  Networks
DeepNcode: Encoding-Based Protection against Bit-Flip Attacks on Neural Networks
Patrik Velcický
J. Breier
Mladen Kovacevic
Xiaolu Hou
AAML
185
2
0
22 May 2024
Not All Prompts Are Secure: A Switchable Backdoor Attack Against
  Pre-trained Vision Transformers
Not All Prompts Are Secure: A Switchable Backdoor Attack Against Pre-trained Vision Transformers
Shengyuan Yang
Jiawang Bai
Kuofeng Gao
Yong-Liang Yang
Yiming Li
Shu-Tao Xia
AAMLSILM
283
5
0
17 May 2024
Adversarial Robustness for Visual Grounding of Multimodal Large Language
  Models
Adversarial Robustness for Visual Grounding of Multimodal Large Language Models
Kuofeng Gao
Yang Bai
Jiawang Bai
Yong Yang
Shu-Tao Xia
AAML
217
25
0
16 May 2024
IBD-PSC: Input-level Backdoor Detection via Parameter-oriented Scaling
  Consistency
IBD-PSC: Input-level Backdoor Detection via Parameter-oriented Scaling ConsistencyInternational Conference on Machine Learning (ICML), 2024
Linshan Hou
Ruili Feng
Zhongyun Hua
Wei Luo
Leo Yu Zhang
Yiming Li
AAML
271
37
0
16 May 2024
LSP Framework: A Compensatory Model for Defeating Trigger Reverse
  Engineering via Label Smoothing Poisoning
LSP Framework: A Compensatory Model for Defeating Trigger Reverse Engineering via Label Smoothing Poisoning
Beichen Li
Yuanfang Guo
Heqi Peng
Yangxi Li
Yun-an Wang
172
0
0
19 Apr 2024
The last Dance : Robust backdoor attack via diffusion models and
  bayesian approach
The last Dance : Robust backdoor attack via diffusion models and bayesian approach
Orson Mengara
DiffM
543
4
0
05 Feb 2024
Inducing High Energy-Latency of Large Vision-Language Models with
  Verbose Images
Inducing High Energy-Latency of Large Vision-Language Models with Verbose ImagesInternational Conference on Learning Representations (ICLR), 2024
Kuofeng Gao
Yang Bai
Jindong Gu
Shu-Tao Xia
Juil Sock
Zhifeng Li
Wei Liu
VLM
168
63
0
20 Jan 2024
BadCLIP: Trigger-Aware Prompt Learning for Backdoor Attacks on CLIP
BadCLIP: Trigger-Aware Prompt Learning for Backdoor Attacks on CLIPComputer Vision and Pattern Recognition (CVPR), 2023
Jiawang Bai
Kuofeng Gao
Shaobo Min
Shu-Tao Xia
Zhifeng Li
Wei Liu
VLM
209
66
0
26 Nov 2023
Fast Propagation is Better: Accelerating Single-Step Adversarial
  Training via Sampling Subnetworks
Fast Propagation is Better: Accelerating Single-Step Adversarial Training via Sampling SubnetworksIEEE Transactions on Information Forensics and Security (IEEE TIFS), 2023
Yang Liu
Jianshu Li
Jindong Gu
Yang Bai
Xiaochun Cao
AAML
180
14
0
24 Oct 2023
Security Considerations in AI-Robotics: A Survey of Current Methods,
  Challenges, and Opportunities
Security Considerations in AI-Robotics: A Survey of Current Methods, Challenges, and OpportunitiesIEEE Access (IEEE Access), 2023
Subash Neupane
Shaswata Mitra
Ivan A. Fernandez
Swayamjit Saha
Sudip Mittal
Jingdao Chen
Nisha Pillai
Shahram Rahimi
193
22
0
12 Oct 2023
One-bit Flip is All You Need: When Bit-flip Attack Meets Model Training
One-bit Flip is All You Need: When Bit-flip Attack Meets Model TrainingIEEE International Conference on Computer Vision (ICCV), 2023
Jianshuo Dong
Han Qiu
Yiming Li
Tianwei Zhang
Yuan-Fang Li
Zeqi Lai
Chao Zhang
Shutao Xia
AAML
124
27
0
12 Aug 2023
Backdoor Federated Learning by Poisoning Backdoor-Critical Layers
Backdoor Federated Learning by Poisoning Backdoor-Critical LayersInternational Conference on Learning Representations (ICLR), 2023
Haomin Zhuang
Mingxian Yu
Hao Wang
Yang Hua
Jian Li
Xu Yuan
FedML
177
26
0
08 Aug 2023
A Comprehensive Study on the Robustness of Image Classification and
  Object Detection in Remote Sensing: Surveying and Benchmarking
A Comprehensive Study on the Robustness of Image Classification and Object Detection in Remote Sensing: Surveying and BenchmarkingJournal of remote sensing (JRS), 2023
Shaohui Mei
Jiawei Lian
Xiaofei Wang
Yuru Su
Mingyang Ma
Lap-Pui Chau
AAML
342
14
0
21 Jun 2023
Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks
Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural NetworksUSENIX Security Symposium (USENIX Security), 2023
Jialai Wang
Ziyuan Zhang
Meiqi Wang
Han Qiu
Tianwei Zhang
Qi Li
Zongpeng Li
Tao Wei
Chao Zhang
AAML
191
34
0
27 Feb 2023
Attacks in Adversarial Machine Learning: A Systematic Survey from the
  Life-cycle Perspective
Attacks in Adversarial Machine Learning: A Systematic Survey from the Life-cycle Perspective
Baoyuan Wu
Zihao Zhu
Li Liu
Qingshan Liu
Zhaofeng He
Siwei Lyu
AAML
429
32
0
19 Feb 2023
Facial Misrecognition Systems: Simple Weight Manipulations Force DNNs to
  Err Only on Specific Persons
Facial Misrecognition Systems: Simple Weight Manipulations Force DNNs to Err Only on Specific Persons
I. Zehavi
Roee Nitzan
A. Shamir
AAMLCVBM
128
6
0
08 Jan 2023
Mind Your Heart: Stealthy Backdoor Attack on Dynamic Deep Neural Network
  in Edge Computing
Mind Your Heart: Stealthy Backdoor Attack on Dynamic Deep Neural Network in Edge ComputingIEEE Conference on Computer Communications (INFOCOM), 2022
Tian Dong
Ziyuan Zhang
Han Qiu
Tianwei Zhang
Hewu Li
T. Wang
AAML
254
9
0
22 Dec 2022
Dormant Neural Trojans
Dormant Neural TrojansInternational Conference on Machine Learning and Applications (ICMLA), 2022
Feisi Fu
Panagiota Kiourti
Wenchao Li
AAML
197
0
0
02 Nov 2022
Trap and Replace: Defending Backdoor Attacks by Trapping Them into an
  Easy-to-Replace Subnetwork
Trap and Replace: Defending Backdoor Attacks by Trapping Them into an Easy-to-Replace SubnetworkNeural Information Processing Systems (NeurIPS), 2022
Haotao Wang
Junyuan Hong
Aston Zhang
Jiayu Zhou
Zinan Lin
AAML
179
16
0
12 Oct 2022
Imperceptible and Robust Backdoor Attack in 3D Point Cloud
Imperceptible and Robust Backdoor Attack in 3D Point CloudIEEE Transactions on Information Forensics and Security (IEEE TIFS), 2022
Kuofeng Gao
Jiawang Bai
Baoyuan Wu
Mengxi Ya
Shutao Xia
AAML3DPC
212
45
0
17 Aug 2022
Hardly Perceptible Trojan Attack against Neural Networks with Bit Flips
Hardly Perceptible Trojan Attack against Neural Networks with Bit FlipsEuropean Conference on Computer Vision (ECCV), 2022
Jiawang Bai
Kuofeng Gao
Dihong Gong
Shutao Xia
Zhifeng Li
Wen Liu
AAML
128
33
0
27 Jul 2022
Versatile Weight Attack via Flipping Limited Bits
Versatile Weight Attack via Flipping Limited BitsIEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 2022
Jiawang Bai
Baoyuan Wu
Zhifeng Li
Shutao Xia
AAML
182
26
0
25 Jul 2022
MM-BD: Post-Training Detection of Backdoor Attacks with Arbitrary
  Backdoor Pattern Types Using a Maximum Margin Statistic
MM-BD: Post-Training Detection of Backdoor Attacks with Arbitrary Backdoor Pattern Types Using a Maximum Margin Statistic
Hang Wang
Zhen Xiang
David J. Miller
G. Kesidis
AAML
255
60
0
13 May 2022
Special Session: Towards an Agile Design Methodology for Efficient,
  Reliable, and Secure ML Systems
Special Session: Towards an Agile Design Methodology for Efficient, Reliable, and Secure ML SystemsIEEE VLSI Test Symposium (VTS), 2022
Shail Dave
Alberto Marchisio
Muhammad Abdullah Hanif
Amira Guesmi
Aviral Shrivastava
Ihsen Alouani
Mohamed Bennai
196
14
0
18 Apr 2022
LAS-AT: Adversarial Training with Learnable Attack Strategy
LAS-AT: Adversarial Training with Learnable Attack StrategyComputer Vision and Pattern Recognition (CVPR), 2022
Yang Liu
Yong Zhang
Baoyuan Wu
Ke Ma
Jue Wang
Xiaochun Cao
AAML
144
171
0
13 Mar 2022
Training with More Confidence: Mitigating Injected and Natural Backdoors
  During Training
Training with More Confidence: Mitigating Injected and Natural Backdoors During TrainingNeural Information Processing Systems (NeurIPS), 2022
Zhenting Wang
Hailun Ding
Juan Zhai
Shiqing Ma
AAML
299
55
0
13 Feb 2022
Parallel Rectangle Flip Attack: A Query-based Black-box Attack against
  Object Detection
Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object DetectionIEEE International Conference on Computer Vision (ICCV), 2021
Yaning Tan
Baoyuan Wu
Yanbo Fan
Xingxing Wei
Xiaochun Cao
AAML
260
89
0
22 Jan 2022
Stealthy Attack on Algorithmic-Protected DNNs via Smart Bit Flipping
Stealthy Attack on Algorithmic-Protected DNNs via Smart Bit FlippingIEEE International Symposium on Quality Electronic Design (ISQED), 2021
B. Ghavami
Seyd Movi
Zhenman Fang
Lesley Shannon
AAML
164
9
0
25 Dec 2021
Amicable Aid: Perturbing Images to Improve Classification Performance
Amicable Aid: Perturbing Images to Improve Classification Performance
Juyeop Kim
Jun-Ho Choi
Soobeom Jang
Jong-Seok Lee
AAML
340
2
0
09 Dec 2021
Towards Practical Deployment-Stage Backdoor Attack on Deep Neural
  Networks
Towards Practical Deployment-Stage Backdoor Attack on Deep Neural Networks
Xiangyu Qi
Tinghao Xie
Ruizhe Pan
Jifeng Zhu
Yong-Liang Yang
Kai Bu
AAML
221
73
0
25 Nov 2021
An Overview of Backdoor Attacks Against Deep Neural Networks and
  Possible Defences
An Overview of Backdoor Attacks Against Deep Neural Networks and Possible Defences
Wei Guo
B. Tondi
Mauro Barni
AAML
258
93
0
16 Nov 2021
Don't Knock! Rowhammer at the Backdoor of DNN Models
Don't Knock! Rowhammer at the Backdoor of DNN Models
M. Tol
Saad Islam
Andrew J. Adiletta
B. Sunar
Ziming Zhang
AAML
180
25
0
14 Oct 2021
FooBaR: Fault Fooling Backdoor Attack on Neural Network Training
FooBaR: Fault Fooling Backdoor Attack on Neural Network TrainingIEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2021
J. Breier
Xiaolu Hou
Martín Ochoa
Jesus Solano
SILMAAML
242
12
0
23 Sep 2021
Backdoor Attack on Hash-based Image Retrieval via Clean-label Data
  Poisoning
Backdoor Attack on Hash-based Image Retrieval via Clean-label Data Poisoning
Kuofeng Gao
Jiawang Bai
Bin Chen
Dongxian Wu
Shutao Xia
AAML
229
13
0
18 Sep 2021
Subnet Replacement: Deployment-stage backdoor attack against deep neural
  networks in gray-box setting
Subnet Replacement: Deployment-stage backdoor attack against deep neural networks in gray-box setting
Xiangyu Qi
Jifeng Zhu
Chulin Xie
Yong-Liang Yang
AAML
153
39
0
15 Jul 2021
RA-BNN: Constructing Robust & Accurate Binary Neural Network to
  Simultaneously Defend Adversarial Bit-Flip Attack and Improve Accuracy
RA-BNN: Constructing Robust & Accurate Binary Neural Network to Simultaneously Defend Adversarial Bit-Flip Attack and Improve Accuracy
Adnan Siraj Rakin
Li Yang
Jingtao Li
Fan Yao
C. Chakrabarti
Yu Cao
Jae-sun Seo
Deliang Fan
AAMLMQ
113
33
0
22 Mar 2021
SNIFF: Reverse Engineering of Neural Networks with Fault Attacks
SNIFF: Reverse Engineering of Neural Networks with Fault AttacksIEEE Transactions on Reliability (IEEE Trans. Reliab.), 2020
J. Breier
Dirmanto Jap
Xiaolu Hou
S. Bhasin
Yang Liu
201
60
0
23 Feb 2020
1