ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2104.02361
  4. Cited By
Backdoor Attack in the Physical World
v1v2 (latest)

Backdoor Attack in the Physical World

6 April 2021
Yiming Li
Tongqing Zhai
Yong Jiang
Zhifeng Li
Shutao Xia
ArXiv (abs)PDFHTML

Papers citing "Backdoor Attack in the Physical World"

50 / 74 papers shown
Title
TED++: Submanifold-Aware Backdoor Detection via Layerwise Tubular-Neighbourhood Screening
TED++: Submanifold-Aware Backdoor Detection via Layerwise Tubular-Neighbourhood Screening
Nam Le
L. Zhang
Kewen Liao
Shirui Pan
Wei Luo
AAML
64
0
0
16 Oct 2025
Rounding-Guided Backdoor Injection in Deep Learning Model Quantization
Rounding-Guided Backdoor Injection in Deep Learning Model Quantization
Xiangxiang Chen
Peixin Zhang
Jun Sun
Wenhai Wang
Jingyi Wang
AAML
84
0
0
05 Oct 2025
Taught Well Learned Ill: Towards Distillation-conditional Backdoor Attack
Taught Well Learned Ill: Towards Distillation-conditional Backdoor Attack
Yukun Chen
Boheng Li
Yu Yuan
Leyi Qi
Y. Li
Tianwei Zhang
Zhan Qin
K. Ren
AAML
72
1
0
28 Sep 2025
BDFirewall: Towards Effective and Expeditiously Black-Box Backdoor Defense in MLaaS
BDFirewall: Towards Effective and Expeditiously Black-Box Backdoor Defense in MLaaS
Ye Li
Chengcheng Zhu
Yanchao Zhao
J. Zhang
AAML
79
0
0
05 Aug 2025
DATABench: Evaluating Dataset Auditing in Deep Learning from an Adversarial Perspective
DATABench: Evaluating Dataset Auditing in Deep Learning from an Adversarial Perspective
Shuo Shao
Yiming Li
Mengren Zheng
Zhiyang Hu
Yukun Chen
Boheng Li
Yexiao He
Junfeng Guo
D. Tao
Zhan Qin
AAML
214
6
0
08 Jul 2025
FIGhost: Fluorescent Ink-based Stealthy and Flexible Backdoor Attacks on Physical Traffic Sign Recognition
FIGhost: Fluorescent Ink-based Stealthy and Flexible Backdoor Attacks on Physical Traffic Sign Recognition
Shuai Yuan
Guowen Xu
Hongwei Li
Rui Zhang
Xinyuan Qian
Wenbo Jiang
Hangcheng Cao
Qingchuan Zhao
AAML
290
0
0
17 May 2025
GaussTrap: Stealthy Poisoning Attacks on 3D Gaussian Splatting for Targeted Scene Confusion
GaussTrap: Stealthy Poisoning Attacks on 3D Gaussian Splatting for Targeted Scene Confusion
Jiaxin Hong
Sixu Chen
Shuoyang Sun
Hongyao Yu
Hao Fang
Yuqi Tan
Bin Chen
Shuhan Qi
Jiawei Li
3DGSAAML
830
0
0
29 Apr 2025
Secure Transfer Learning: Training Clean Models Against Backdoor in (Both) Pre-trained Encoders and Downstream Datasets
Secure Transfer Learning: Training Clean Models Against Backdoor in (Both) Pre-trained Encoders and Downstream DatasetsIEEE Symposium on Security and Privacy (S&P), 2025
Yanzhe Zhang
Yuxuan Zhou
Tianyu Li
Minghui Li
Shengshan Hu
Wei Luo
L. Zhang
AAMLSILM
150
2
0
16 Apr 2025
Defending Deep Neural Networks against Backdoor Attacks via Module Switching
Defending Deep Neural Networks against Backdoor Attacks via Module Switching
Weijun Li
Ansh Arora
Xuanli He
Mark Dras
Xingliang Yuan
AAMLMoMe
229
0
0
08 Apr 2025
Backdooring CLIP through Concept Confusion
Backdooring CLIP through Concept Confusion
Lijie Hu
Junchi Liao
Weimin Lyu
Shaopeng Fu
Tianhao Huang
Shu Yang
Guimin Hu
Di Wang
AAML
270
1
0
12 Mar 2025
REFINE: Inversion-Free Backdoor Defense via Model Reprogramming
REFINE: Inversion-Free Backdoor Defense via Model ReprogrammingInternational Conference on Learning Representations (ICLR), 2025
Yuxiao Chen
Shuo Shao
Enhao Huang
Yiming Li
Pin-Yu Chen
Zhan Qin
Kui Ren
AAML
185
15
0
22 Feb 2025
BackdoorMBTI: A Backdoor Learning Multimodal Benchmark Tool Kit for Backdoor Defense EvaluationKnowledge Discovery and Data Mining (KDD), 2024
Haiyang Yu
Tian Xie
Jiaping Gui
Pengyang Wang
P. Yi
Yue Wu
282
2
0
17 Nov 2024
ProP: Efficient Backdoor Detection via Propagation Perturbation for
  Overparametrized Models
ProP: Efficient Backdoor Detection via Propagation Perturbation for Overparametrized Models
Tao Ren
Qiongxiu Li
AAML
146
0
0
11 Nov 2024
Backdoor in Seconds: Unlocking Vulnerabilities in Large Pre-trained
  Models via Model Editing
Backdoor in Seconds: Unlocking Vulnerabilities in Large Pre-trained Models via Model Editing
Dongliang Guo
Mengxuan Hu
Zihan Guan
Junfeng Guo
Thomas Hartvigsen
Sheng Li
AAML
276
4
0
23 Oct 2024
Backdoor Attack on Vertical Federated Graph Neural Network Learning
Backdoor Attack on Vertical Federated Graph Neural Network LearningInternational Joint Conference on Artificial Intelligence (IJCAI), 2024
Jirui Yang
Peng Chen
Zhihui Lu
Ruijun Deng
Qiang Duan
Jianping Zeng
AAMLFedML
832
1
0
15 Oct 2024
Mitigating Backdoor Threats to Large Language Models: Advancement and
  Challenges
Mitigating Backdoor Threats to Large Language Models: Advancement and Challenges
Qin Liu
Wenjie Mo
Terry Tong
Lyne Tchapmi
Fei Wang
Chaowei Xiao
Muhao Chen
AAML
211
9
0
30 Sep 2024
Persistent Backdoor Attacks in Continual Learning
Persistent Backdoor Attacks in Continual Learning
Zhen Guo
Abhinav Kumar
R. Tourani
AAML
226
7
0
20 Sep 2024
VFLIP: A Backdoor Defense for Vertical Federated Learning via
  Identification and Purification
VFLIP: A Backdoor Defense for Vertical Federated Learning via Identification and PurificationEuropean Symposium on Research in Computer Security (ESORICS), 2024
Yungi Cho
Woorim Han
Miseon Yu
Younghan Lee
Ho Bae
Y. Paek
AAMLFedML
169
6
0
28 Aug 2024
DeepBaR: Fault Backdoor Attack on Deep Neural Network Layers
DeepBaR: Fault Backdoor Attack on Deep Neural Network Layers
Camilo A. Mart´ınez-Mej´ıa
Jesus Solano
J. Breier
Dominik Bucko
Xiaolu Hou
AAML
141
0
0
30 Jul 2024
Imperceptible Rhythm Backdoor Attacks: Exploring Rhythm Transformation
  for Embedding Undetectable Vulnerabilities on Speech Recognition
Imperceptible Rhythm Backdoor Attacks: Exploring Rhythm Transformation for Embedding Undetectable Vulnerabilities on Speech Recognition
Wenhan Yao
Jiangkun Yang
yongqiang He
Jia Liu
Weiping Wen
258
4
0
16 Jun 2024
DiffPhysBA: Diffusion-based Physical Backdoor Attack against Person
  Re-Identification in Real-World
DiffPhysBA: Diffusion-based Physical Backdoor Attack against Person Re-Identification in Real-World
Wenli Sun
Xinyang Jiang
Dongsheng Li
Cairong Zhao
DiffMAAML
196
2
0
30 May 2024
IBD-PSC: Input-level Backdoor Detection via Parameter-oriented Scaling
  Consistency
IBD-PSC: Input-level Backdoor Detection via Parameter-oriented Scaling ConsistencyInternational Conference on Machine Learning (ICML), 2024
Linshan Hou
Ruili Feng
Zhongyun Hua
Wei Luo
Leo Yu Zhang
Yiming Li
AAML
231
37
0
16 May 2024
Physical Backdoor: Towards Temperature-based Backdoor Attacks in the
  Physical World
Physical Backdoor: Towards Temperature-based Backdoor Attacks in the Physical World
Wen Yin
Jian Lou
Pan Zhou
Yulai Xie
Dan Feng
Yuhua Sun
Tailai Zhang
Lichao Sun
AAML
119
11
0
30 Apr 2024
Dual Model Replacement:invisible Multi-target Backdoor Attack based on
  Federal Learning
Dual Model Replacement:invisible Multi-target Backdoor Attack based on Federal Learning
Rong Wang
Guichen Zhou
Mingjun Gao
Yunpeng Xiao
AAMLFedML
105
5
0
22 Apr 2024
Invisible Backdoor Attack Through Singular Value Decomposition
Invisible Backdoor Attack Through Singular Value DecompositionChinese Conference on Pattern Recognition and Computer Vision (CPRCV), 2024
Wenmin Chen
Xiaowei Xu
AAML
164
2
0
18 Mar 2024
Be Persistent: Towards a Unified Solution for Mitigating Shortcuts in
  Deep Learning
Be Persistent: Towards a Unified Solution for Mitigating Shortcuts in Deep Learning
H. M. Dolatabadi
S. Erfani
Christopher Leckie
AAML
157
0
0
17 Feb 2024
Test-Time Backdoor Attacks on Multimodal Large Language Models
Test-Time Backdoor Attacks on Multimodal Large Language Models
Dong Lu
Tianyu Pang
Chao Du
Qian Liu
Xianjun Yang
Min Lin
AAML
308
35
0
13 Feb 2024
The last Dance : Robust backdoor attack via diffusion models and
  bayesian approach
The last Dance : Robust backdoor attack via diffusion models and bayesian approach
Orson Mengara
DiffM
461
4
0
05 Feb 2024
BELT: Old-School Backdoor Attacks can Evade the State-of-the-Art Defense
  with Backdoor Exclusivity Lifting
BELT: Old-School Backdoor Attacks can Evade the State-of-the-Art Defense with Backdoor Exclusivity LiftingIEEE Symposium on Security and Privacy (S&P), 2023
Huming Qiu
Junjie Sun
Mi Zhang
Xudong Pan
Min Yang
AAML
241
6
0
08 Dec 2023
Towards Sample-specific Backdoor Attack with Clean Labels via Attribute Trigger
Towards Sample-specific Backdoor Attack with Clean Labels via Attribute TriggerIEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2023
Yiming Li
Mingyan Zhu
Junfeng Guo
Tao Wei
Shu-Tao Xia
Zhan Qin
AAML
264
5
0
03 Dec 2023
A Unified Hardware-based Threat Detector for AI Accelerators
A Unified Hardware-based Threat Detector for AI Accelerators
Xiaobei Yan
Han Qiu
Tianwei Zhang
160
2
0
28 Nov 2023
Domain Watermark: Effective and Harmless Dataset Copyright Protection is
  Closed at Hand
Domain Watermark: Effective and Harmless Dataset Copyright Protection is Closed at HandNeural Information Processing Systems (NeurIPS), 2023
Junfeng Guo
Yiming Li
Lixu Wang
Shu-Tao Xia
Heng-Chiao Huang
Cong Liu
Boheng Li
245
82
0
09 Oct 2023
Physical Invisible Backdoor Based on Camera Imaging
Physical Invisible Backdoor Based on Camera ImagingACM Multimedia (ACM MM), 2023
Yusheng Guo
Nan Zhong
Zhenxing Qian
Xinpeng Zhang
DiffM
181
3
0
14 Sep 2023
Towards Robust Model Watermark via Reducing Parametric Vulnerability
Towards Robust Model Watermark via Reducing Parametric VulnerabilityIEEE International Conference on Computer Vision (ICCV), 2023
Guanhao Gan
Yiming Li
Dongxian Wu
Shu-Tao Xia
AAML
163
18
0
09 Sep 2023
BaDExpert: Extracting Backdoor Functionality for Accurate Backdoor Input
  Detection
BaDExpert: Extracting Backdoor Functionality for Accurate Backdoor Input DetectionInternational Conference on Learning Representations (ICLR), 2023
Tinghao Xie
Xiangyu Qi
Ping He
Yiming Li
Jiachen T. Wang
Prateek Mittal
AAML
160
12
0
23 Aug 2023
PatchBackdoor: Backdoor Attack against Deep Neural Networks without
  Model Modification
PatchBackdoor: Backdoor Attack against Deep Neural Networks without Model ModificationACM Multimedia (ACM MM), 2023
Yizhen Yuan
Rui Kong
Shenghao Xie
Yan Liang
Yunxin Liu
78
11
0
22 Aug 2023
Towards Stealthy Backdoor Attacks against Speech Recognition via
  Elements of Sound
Towards Stealthy Backdoor Attacks against Speech Recognition via Elements of SoundIEEE Transactions on Information Forensics and Security (IEEE TIFS), 2023
Hanbo Cai
Pengcheng Zhang
Hai Dong
Yan Xiao
Stefanos Koffas
Yiming Li
AAML
275
47
0
17 Jul 2023
Versatile Backdoor Attack with Visible, Semantic, Sample-Specific, and
  Compatible Triggers
Versatile Backdoor Attack with Visible, Semantic, Sample-Specific, and Compatible Triggers
Ke Xu
Hongrui Chen
Zihao Zhu
Li Liu
Baoyuan Wu
DiffM
264
13
0
01 Jun 2023
Backdoor Attack with Sparse and Invisible Trigger
Backdoor Attack with Sparse and Invisible TriggerIEEE Transactions on Information Forensics and Security (IEEE TIFS), 2023
Yinghua Gao
Yiming Li
Xueluan Gong
Zhifeng Li
Shutao Xia
Qianqian Wang
AAML
264
34
0
11 May 2023
Mask and Restore: Blind Backdoor Defense at Test Time with Masked Autoencoder
Mask and Restore: Blind Backdoor Defense at Test Time with Masked Autoencoder
Tao Sun
Lu Pang
Chao Chen
Haibin Ling
Haibin Ling
AAML
223
10
0
27 Mar 2023
Backdoor Defense via Adaptively Splitting Poisoned Dataset
Backdoor Defense via Adaptively Splitting Poisoned DatasetComputer Vision and Pattern Recognition (CVPR), 2023
Kuofeng Gao
Yang Bai
Jindong Gu
Yong-Liang Yang
Shutao Xia
AAML
143
66
0
23 Mar 2023
Black-box Backdoor Defense via Zero-shot Image Purification
Black-box Backdoor Defense via Zero-shot Image PurificationNeural Information Processing Systems (NeurIPS), 2023
Yucheng Shi
Mengnan Du
Xuansheng Wu
Zihan Guan
Jin Sun
Ninghao Liu
228
41
0
21 Mar 2023
SATBA: An Invisible Backdoor Attack Based On Spatial Attention
SATBA: An Invisible Backdoor Attack Based On Spatial AttentionInternational Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2023
Huasong Zhou
Xiaowei Xu
Zhenyu Wang
Leon Bevan Bullock
AAML
123
2
0
25 Feb 2023
Defending Against Backdoor Attacks by Layer-wise Feature Analysis
Defending Against Backdoor Attacks by Layer-wise Feature AnalysisPacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD), 2023
N. Jebreel
J. Domingo-Ferrer
Yiming Li
AAML
176
20
0
24 Feb 2023
Poisoning Web-Scale Training Datasets is Practical
Poisoning Web-Scale Training Datasets is PracticalIEEE Symposium on Security and Privacy (IEEE S&P), 2023
Nicholas Carlini
Matthew Jagielski
Christopher A. Choquette-Choo
Daniel Paleka
Will Pearce
Hyrum S. Anderson
Seth Neel
Kurt Thomas
Florian Tramèr
SILM
331
265
0
20 Feb 2023
Backdoor Learning for NLP: Recent Advances, Challenges, and Future
  Research Directions
Backdoor Learning for NLP: Recent Advances, Challenges, and Future Research Directions
Marwan Omar
SILMAAML
169
21
0
14 Feb 2023
SCALE-UP: An Efficient Black-box Input-level Backdoor Detection via
  Analyzing Scaled Prediction Consistency
SCALE-UP: An Efficient Black-box Input-level Backdoor Detection via Analyzing Scaled Prediction ConsistencyInternational Conference on Learning Representations (ICLR), 2023
Junfeng Guo
Yiming Li
Hang Zhang
Hanqing Guo
Lichao Sun
Cong Liu
AAMLMLAU
129
132
0
07 Feb 2023
BackdoorBox: A Python Toolbox for Backdoor Learning
BackdoorBox: A Python Toolbox for Backdoor Learning
Yiming Li
Mengxi Ya
Yang Bai
Yong Jiang
Shutao Xia
AAML
190
49
0
01 Feb 2023
Salient Conditional Diffusion for Defending Against Backdoor Attacks
Salient Conditional Diffusion for Defending Against Backdoor Attacks
Brandon B. May
N. Joseph Tatro
Dylan Walker
Piyush Kumar
N. Shnidman
DiffM
164
10
0
31 Jan 2023
Towards Understanding How Self-training Tolerates Data Backdoor
  Poisoning
Towards Understanding How Self-training Tolerates Data Backdoor Poisoning
Soumyadeep Pal
Ren Wang
Yuguang Yao
Sijia Liu
178
7
0
20 Jan 2023
12
Next