
Title |
|---|
![]() Dormant Neural TrojansInternational Conference on Machine Learning and Applications (ICMLA), 2022 |
![]() BATT: Backdoor Attack with Transformation-based TriggersIEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2022 |
![]() Backdoor Defense via Suppressing Model ShortcutsIEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2022 |
![]() TransCAB: Transferable Clean-Annotation Backdoor to Object Detection
with Natural Trigger in Real-WorldIEEE International Symposium on Reliable Distributed Systems (SRDS), 2022 |
![]() Black-box Dataset Ownership Verification via Backdoor WatermarkingIEEE Transactions on Information Forensics and Security (IEEE TIFS), 2022 |
![]() Backdoor Attacks on Crowd CountingACM Multimedia (ACM MM), 2022 |
![]() Narcissus: A Practical Clean-Label Backdoor Attack with Limited
InformationConference on Computer and Communications Security (CCS), 2022 |
![]() Dynamic Backdoors with Global Average PoolingInternational Conference on Artificial Intelligence Circuits and Systems (ICAICS), 2022 |
![]() PolicyCleanse: Backdoor Detection and Mitigation in Reinforcement
LearningIEEE International Conference on Computer Vision (ICCV), 2022 |
![]() Backdoor Defense via Decoupling the Training ProcessInternational Conference on Learning Representations (ICLR), 2022 |
![]() Few-Shot Backdoor Attacks on Visual Object TrackingInternational Conference on Learning Representations (ICLR), 2022 |
![]() Defending against Model Stealing via Verifying Embedded External
FeaturesAAAI Conference on Artificial Intelligence (AAAI), 2021 |
![]() Robust Backdoor Attacks against Deep Neural Networks in Real Physical
WorldInternational Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2021 |
![]() Backdoor Learning: A SurveyIEEE Transactions on Neural Networks and Learning Systems (IEEE TNNLS), 2020 |