Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
2110.14880
Cited By
AEVA: Black-box Backdoor Detection Using Adversarial Extreme Value Analysis
28 October 2021
Junfeng Guo
Ang Li
Cong Liu
AAML
Re-assign community
ArXiv
PDF
HTML
Papers citing
"AEVA: Black-box Backdoor Detection Using Adversarial Extreme Value Analysis"
44 / 44 papers shown
Title
SFIBA: Spatial-based Full-target Invisible Backdoor Attacks
Yangxu Yin
H. Chen
Yudong Gao
Peng Sun
Z. Li
W. Liu
AAML
40
0
0
29 Apr 2025
DeBackdoor: A Deductive Framework for Detecting Backdoor Attacks on Deep Models with Limited Data
Dorde Popovic
Amin Sadeghi
Ting Yu
Sanjay Chawla
Issa M. Khalil
AAML
46
0
0
27 Mar 2025
Seal Your Backdoor with Variational Defense
Ivan Sabolić
Matej Grcić
Sinisa Segvic
AAML
100
0
0
11 Mar 2025
Class-Conditional Neural Polarizer: A Lightweight and Effective Backdoor Defense by Purifying Poisoned Features
Mingli Zhu
Shaokui Wei
Hongyuan Zha
Baoyuan Wu
AAML
37
0
0
23 Feb 2025
Revocable Backdoor for Deep Model Trading
Yiran Xu
Nan Zhong
Zhenxing Qian
Xinpeng Zhang
AAML
27
0
0
01 Aug 2024
Unveiling and Mitigating Backdoor Vulnerabilities based on Unlearning Weight Changes and Backdoor Activeness
Weilin Lin
Li Liu
Shaokui Wei
Jianze Li
Hui Xiong
AAML
40
2
0
30 May 2024
BAN: Detecting Backdoors Activated by Adversarial Neuron Noise
Xiaoyun Xu
Zhuoran Liu
Stefanos Koffas
Shujian Yu
S. Picek
AAML
29
1
0
30 May 2024
Not All Prompts Are Secure: A Switchable Backdoor Attack Against Pre-trained Vision Transformers
Shengyuan Yang
Jiawang Bai
Kuofeng Gao
Yong-Liang Yang
Yiming Li
Shu-Tao Xia
AAML
SILM
30
5
0
17 May 2024
BackdoorBench: A Comprehensive Benchmark and Analysis of Backdoor Learning
Baoyuan Wu
Hongrui Chen
Mingda Zhang
Zihao Zhu
Shaokui Wei
Danni Yuan
Mingli Zhu
Ruotong Wang
Li Liu
Chaoxiao Shen
AAML
ELM
56
9
0
26 Jan 2024
Pre-trained Trojan Attacks for Visual Recognition
Aishan Liu
Xinwei Zhang
Yisong Xiao
Yuguang Zhou
Siyuan Liang
Jiakai Wang
Xianglong Liu
Xiaochun Cao
Dacheng Tao
AAML
61
25
0
23 Dec 2023
Detection and Defense of Unlearnable Examples
Yifan Zhu
Lijia Yu
Xiao-Shan Gao
AAML
9
7
0
14 Dec 2023
Defenses in Adversarial Machine Learning: A Survey
Baoyuan Wu
Shaokui Wei
Mingli Zhu
Meixi Zheng
Zihao Zhu
Mingda Zhang
Hongrui Chen
Danni Yuan
Li Liu
Qingshan Liu
AAML
27
14
0
13 Dec 2023
Towards Sample-specific Backdoor Attack with Clean Labels via Attribute Trigger
Yiming Li
Mingyan Zhu
Junfeng Guo
Tao Wei
Shu-Tao Xia
Zhan Qin
AAML
59
1
0
03 Dec 2023
Domain Watermark: Effective and Harmless Dataset Copyright Protection is Closed at Hand
Junfeng Guo
Yiming Li
Lixu Wang
Shu-Tao Xia
Heng-Chiao Huang
Cong Liu
Boheng Li
30
50
0
09 Oct 2023
MASTERKEY: Practical Backdoor Attack Against Speaker Verification Systems
Hanqing Guo
Xun Chen
Junfeng Guo
Li Xiao
Qiben Yan
18
11
0
13 Sep 2023
PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection
Hanqing Guo
Guangjing Wang
Yuanda Wang
Bocheng Chen
Qiben Yan
Li Xiao
AAML
23
9
0
13 Sep 2023
XGBD: Explanation-Guided Graph Backdoor Detection
Zihan Guan
Mengnan Du
Ninghao Liu
AAML
11
9
0
08 Aug 2023
Adversarial Feature Map Pruning for Backdoor
Dong Huang
Qingwen Bu
AAML
14
4
0
21 Jul 2023
Shared Adversarial Unlearning: Backdoor Mitigation by Unlearning Shared Adversarial Examples
Shaokui Wei
Mingda Zhang
H. Zha
Baoyuan Wu
TPM
13
34
0
20 Jul 2023
Efficient Backdoor Removal Through Natural Gradient Fine-tuning
Nazmul Karim
Abdullah Al Arafat
Umar Khalid
Zhishan Guo
Naznin Rahnavard
AAML
13
1
0
30 Jun 2023
Neural Polarizer: A Lightweight and Effective Backdoor Defense via Purifying Poisoned Features
Mingli Zhu
Shaokui Wei
H. Zha
Baoyuan Wu
AAML
25
36
0
29 Jun 2023
A Proxy Attack-Free Strategy for Practically Improving the Poisoning Efficiency in Backdoor Attacks
Ziqiang Li
Hong Sun
Pengfei Xia
Beihao Xia
Xue Rui
Wei Zhang
Qinglang Guo
Bin Li
AAML
30
8
0
14 Jun 2023
Mask and Restore: Blind Backdoor Defense at Test Time with Masked Autoencoder
Tao Sun
Lu Pang
Chao Chen
Haibin Ling
AAML
33
9
0
27 Mar 2023
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency
Xiaogeng Liu
Minghui Li
Haoyu Wang
Shengshan Hu
Dengpan Ye
Hai Jin
Libing Wu
Chaowei Xiao
AAML
14
36
0
27 Mar 2023
Sibling-Attack: Rethinking Transferable Adversarial Attacks against Face Recognition
Zexin Li
Bangjie Yin
Taiping Yao
Junfeng Guo
Shouhong Ding
Simin Chen
Cong Liu
AAML
18
34
0
22 Mar 2023
Black-box Backdoor Defense via Zero-shot Image Purification
Yucheng Shi
Mengnan Du
Xuansheng Wu
Zihan Guan
Jin Sun
Ninghao Liu
32
26
0
21 Mar 2023
SATBA: An Invisible Backdoor Attack Based On Spatial Attention
Huasong Zhou
Xiaowei Xu
Zhenyu Wang
Leon Bevan Bullock
AAML
14
1
0
25 Feb 2023
SCALE-UP: An Efficient Black-box Input-level Backdoor Detection via Analyzing Scaled Prediction Consistency
Junfeng Guo
Yiming Li
Xun Chen
Hanqing Guo
Lichao Sun
Cong Liu
AAML
MLAU
16
94
0
07 Feb 2023
BackdoorBox: A Python Toolbox for Backdoor Learning
Yiming Li
Mengxi Ya
Yang Bai
Yong Jiang
Shutao Xia
AAML
36
40
0
01 Feb 2023
Distilling Cognitive Backdoor Patterns within an Image
Hanxun Huang
Xingjun Ma
S. Erfani
James Bailey
AAML
13
24
0
26 Jan 2023
DEJA VU: Continual Model Generalization For Unseen Domains
Chenxi Liu
Lixu Wang
Lingjuan Lyu
Chen Sun
Xiao Wang
Qi Zhu
CLL
OOD
16
22
0
25 Jan 2023
Backdoor Defense via Suppressing Model Shortcuts
Shengyuan Yang
Yiming Li
Yong Jiang
Shutao Xia
AAML
33
12
0
02 Nov 2022
Trap and Replace: Defending Backdoor Attacks by Trapping Them into an Easy-to-Replace Subnetwork
Haotao Wang
Junyuan Hong
Aston Zhang
Jiayu Zhou
Zhangyang Wang
AAML
28
12
0
12 Oct 2022
Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protection
Yiming Li
Yang Bai
Yong Jiang
Yong-Liang Yang
Shutao Xia
Bo Li
AAML
43
97
0
27 Sep 2022
Universal Backdoor Attacks Detection via Adaptive Adversarial Probe
Yuhang Wang
Huafeng Shi
Rui Min
Ruijia Wu
Siyuan Liang
Yichao Wu
Ding Liang
Aishan Liu
AAML
21
7
0
12 Sep 2022
Game of Trojans: A Submodular Byzantine Approach
D. Sahabandu
Arezoo Rajabi
Luyao Niu
B. Li
Bhaskar Ramasubramanian
Radha Poovendran
AAML
10
0
0
13 Jul 2022
Towards a Defense Against Federated Backdoor Attacks Under Continuous Training
Shuai Wang
J. Hayase
Giulia Fanti
Sewoong Oh
FedML
15
5
0
24 May 2022
Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning
Antonio Emanuele Cinà
Kathrin Grosse
Ambra Demontis
Sebastiano Vascon
Werner Zellinger
Bernhard A. Moser
Alina Oprea
Battista Biggio
Marcello Pelillo
Fabio Roli
AAML
17
116
0
04 May 2022
An Adaptive Black-box Backdoor Detection Method for Deep Neural Networks
Xinqiao Zhang
Huili Chen
Ke Huang
F. Koushanfar
AAML
14
1
0
08 Apr 2022
PolicyCleanse: Backdoor Detection and Mitigation in Reinforcement Learning
Junfeng Guo
Ang Li
Cong Liu
AAML
19
14
0
08 Feb 2022
Few-Shot Backdoor Attacks on Visual Object Tracking
Yiming Li
Haoxiang Zhong
Xingjun Ma
Yong Jiang
Shutao Xia
AAML
34
53
0
31 Jan 2022
Backdoor Learning: A Survey
Yiming Li
Yong Jiang
Zhifeng Li
Shutao Xia
AAML
35
585
0
17 Jul 2020
Sign-OPT: A Query-Efficient Hard-label Adversarial Attack
Minhao Cheng
Simranjit Singh
Patrick H. Chen
Pin-Yu Chen
Sijia Liu
Cho-Jui Hsieh
AAML
122
218
0
24 Sep 2019
Model-Reuse Attacks on Deep Learning Systems
Yujie Ji
Xinyang Zhang
S. Ji
Xiapu Luo
Ting Wang
SILM
AAML
123
186
0
02 Dec 2018
1