ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2112.01148
  4. Cited By
FIBA: Frequency-Injection based Backdoor Attack in Medical Image
  Analysis

FIBA: Frequency-Injection based Backdoor Attack in Medical Image Analysis

2 December 2021
Yu Feng
Benteng Ma
Jing Zhang
Shanshan Zhao
Yong-quan Xia
Dacheng Tao
    AAML
ArXivPDFHTML

Papers citing "FIBA: Frequency-Injection based Backdoor Attack in Medical Image Analysis"

50 / 51 papers shown
Title
SFIBA: Spatial-based Full-target Invisible Backdoor Attacks
SFIBA: Spatial-based Full-target Invisible Backdoor Attacks
Yangxu Yin
H. Chen
Yudong Gao
Peng Sun
Z. Li
W. Liu
AAML
40
0
0
29 Apr 2025
Mitigating Object Hallucinations in MLLMs via Multi-Frequency Perturbations
Mitigating Object Hallucinations in MLLMs via Multi-Frequency Perturbations
Shuo Li
Jiajun Sun
Guodong Zheng
Xiaoran Fan
Yujiong Shen
...
Wenming Tan
Tao Ji
Tao Gui
Qi Zhang
Xuanjing Huang
AAML
VLM
87
0
0
19 Mar 2025
One Pixel is All I Need
One Pixel is All I Need
Deng Siqin
Zhou Xiaoyi
ViT
129
0
0
14 Dec 2024
Robust and Transferable Backdoor Attacks Against Deep Image Compression
  With Selective Frequency Prior
Robust and Transferable Backdoor Attacks Against Deep Image Compression With Selective Frequency Prior
Yi Yu
Yufei Wang
Wenhan Yang
Lanqing Guo
Shijian Lu
Ling-yu Duan
Yap-Peng Tan
Alex C. Kot
AAML
83
4
0
02 Dec 2024
Adversarial Attacks on Hyperbolic Networks
Adversarial Attacks on Hyperbolic Networks
Max van Spengler
Jan Zahálka
Pascal Mettes
AAML
OOD
94
0
0
02 Dec 2024
LADDER: Multi-objective Backdoor Attack via Evolutionary Algorithm
LADDER: Multi-objective Backdoor Attack via Evolutionary Algorithm
Dazhuang Liu
Yanqi Qiao
Rui Wang
K. Liang
Georgios Smaragdakis
AAML
73
0
0
28 Nov 2024
BadScan: An Architectural Backdoor Attack on Visual State Space Models
BadScan: An Architectural Backdoor Attack on Visual State Space Models
Om Suhas Deshmukh
Sankalp Nagaonkar
A. Tripathi
Ashish Mishra
Mamba
79
0
0
26 Nov 2024
Act in Collusion: A Persistent Distributed Multi-Target Backdoor in
  Federated Learning
Act in Collusion: A Persistent Distributed Multi-Target Backdoor in Federated Learning
Tao Liu
Wu Yang
Chen Xu
Jiguang Lv
Huanran Wang
Yuhang Zhang
Shuchun Xu
Dapeng Man
AAML
FedML
30
0
0
06 Nov 2024
Backdoor in Seconds: Unlocking Vulnerabilities in Large Pre-trained
  Models via Model Editing
Backdoor in Seconds: Unlocking Vulnerabilities in Large Pre-trained Models via Model Editing
Dongliang Guo
Mengxuan Hu
Zihan Guan
Junfeng Guo
Thomas Hartvigsen
Sheng R. Li
AAML
26
0
0
23 Oct 2024
BadCM: Invisible Backdoor Attack Against Cross-Modal Learning
BadCM: Invisible Backdoor Attack Against Cross-Modal Learning
Zheng Zhang
Xu Yuan
Lei Zhu
Jingkuan Song
Liqiang Nie
AAML
45
11
0
03 Oct 2024
NoiseAttack: An Evasive Sample-Specific Multi-Targeted Backdoor Attack
  Through White Gaussian Noise
NoiseAttack: An Evasive Sample-Specific Multi-Targeted Backdoor Attack Through White Gaussian Noise
Abdullah Arafat Miah
Kaan Icer
Resit Sendag
Yu Bi
AAML
DiffM
27
1
0
03 Sep 2024
Large Language Models are Good Attackers: Efficient and Stealthy Textual
  Backdoor Attacks
Large Language Models are Good Attackers: Efficient and Stealthy Textual Backdoor Attacks
Ziqiang Li
Yueqi Zeng
Pengfei Xia
Lei Liu
Zhangjie Fu
Bin Li
SILM
AAML
47
2
0
21 Aug 2024
BAPLe: Backdoor Attacks on Medical Foundational Models using Prompt
  Learning
BAPLe: Backdoor Attacks on Medical Foundational Models using Prompt Learning
Asif Hanif
Fahad Shamshad
Muhammad Awais
Muzammal Naseer
F. Khan
Karthik Nandakumar
Salman Khan
Rao Muhammad Anwer
MedIm
AAML
40
3
0
14 Aug 2024
Event Trojan: Asynchronous Event-based Backdoor Attacks
Event Trojan: Asynchronous Event-based Backdoor Attacks
Ruofei Wang
Qing Guo
Haoliang Li
Renjie Wan
61
3
0
09 Jul 2024
DiffPhysBA: Diffusion-based Physical Backdoor Attack against Person
  Re-Identification in Real-World
DiffPhysBA: Diffusion-based Physical Backdoor Attack against Person Re-Identification in Real-World
Wenli Sun
Xinyang Jiang
Dongsheng Li
Cairong Zhao
DiffM
AAML
27
2
0
30 May 2024
Nearest is Not Dearest: Towards Practical Defense against
  Quantization-conditioned Backdoor Attacks
Nearest is Not Dearest: Towards Practical Defense against Quantization-conditioned Backdoor Attacks
Boheng Li
Yishuo Cai
Haowei Li
Feng Xue
Zhifeng Li
Yiming Li
MQ
AAML
27
20
0
21 May 2024
Invisible Backdoor Attack Through Singular Value Decomposition
Invisible Backdoor Attack Through Singular Value Decomposition
Wenmin Chen
Xiaowei Xu
AAML
38
0
0
18 Mar 2024
AS-FIBA: Adaptive Selective Frequency-Injection for Backdoor Attack on Deep Face Restoration
AS-FIBA: Adaptive Selective Frequency-Injection for Backdoor Attack on Deep Face Restoration
Zhenbo Song
Wenhao Gao
Kaihao Zhang
Wenhan Luo
AAML
42
0
0
11 Mar 2024
Low-Frequency Black-Box Backdoor Attack via Evolutionary Algorithm
Low-Frequency Black-Box Backdoor Attack via Evolutionary Algorithm
Yanqi Qiao
Dazhuang Liu
Rui Wang
Kaitai Liang
AAML
26
1
0
23 Feb 2024
WPDA: Frequency-based Backdoor Attack with Wavelet Packet Decomposition
WPDA: Frequency-based Backdoor Attack with Wavelet Packet Decomposition
Zhengyao Song
Yongqiang Li
Danni Yuan
Li Liu
Shaokui Wei
Baoyuan Wu
AAML
32
4
0
24 Jan 2024
Spy-Watermark: Robust Invisible Watermarking for Backdoor Attack
Spy-Watermark: Robust Invisible Watermarking for Backdoor Attack
Ruofei Wang
Renjie Wan
Zongyu Guo
Qing-Wu Guo
Rui Huang
31
6
0
04 Jan 2024
Backdoor Attack on Unpaired Medical Image-Text Foundation Models: A
  Pilot Study on MedCLIP
Backdoor Attack on Unpaired Medical Image-Text Foundation Models: A Pilot Study on MedCLIP
Ruinan Jin
Chun-Yin Huang
Chenyu You
Xiaoxiao Li
AAML
MedIm
30
2
0
01 Jan 2024
A clean-label graph backdoor attack method in node classification task
A clean-label graph backdoor attack method in node classification task
Xiaogang Xing
Ming Xu
Yujing Bai
Dongdong Yang
AAML
89
7
0
30 Dec 2023
SkyMask: Attack-agnostic Robust Federated Learning with Fine-grained
  Learnable Masks
SkyMask: Attack-agnostic Robust Federated Learning with Fine-grained Learnable Masks
Peishen Yan
Hao Wang
Tao Song
Yang Hua
Ruhui Ma
Ningxin Hu
M. Haghighat
Haibing Guan
AAML
FedML
28
2
0
19 Dec 2023
Data and Model Poisoning Backdoor Attacks on Wireless Federated
  Learning, and the Defense Mechanisms: A Comprehensive Survey
Data and Model Poisoning Backdoor Attacks on Wireless Federated Learning, and the Defense Mechanisms: A Comprehensive Survey
Yichen Wan
Youyang Qu
Wei Ni
Yong Xiang
Longxiang Gao
Ekram Hossain
AAML
47
33
0
14 Dec 2023
Trainwreck: A damaging adversarial attack on image classifiers
Trainwreck: A damaging adversarial attack on image classifiers
Jan Zahálka
15
1
0
24 Nov 2023
WaveAttack: Asymmetric Frequency Obfuscation-based Backdoor Attacks
  Against Deep Neural Networks
WaveAttack: Asymmetric Frequency Obfuscation-based Backdoor Attacks Against Deep Neural Networks
Jun Xia
Zhihao Yue
Yingbo Zhou
Zhiwei Ling
Xian Wei
Mingsong Chen
AAML
21
0
0
17 Oct 2023
Robust Backdoor Attacks on Object Detection in Real World
Robust Backdoor Attacks on Object Detection in Real World
Yaguan Qian
Boyuan Ji
Shuke He
Shenhui Huang
Xiang Ling
Bin Wang
Wen Wang
44
3
0
16 Sep 2023
Backdoor Federated Learning by Poisoning Backdoor-Critical Layers
Backdoor Federated Learning by Poisoning Backdoor-Critical Layers
Haomin Zhuang
Mingxian Yu
Hao Wang
Yang Hua
Jian Li
Xu Yuan
FedML
24
9
0
08 Aug 2023
A Dual Stealthy Backdoor: From Both Spatial and Frequency Perspectives
A Dual Stealthy Backdoor: From Both Spatial and Frequency Perspectives
Yudong Gao
Honglong Chen
Peng Sun
Junjian Li
Anqing Zhang
Zhibo Wang
AAML
22
13
0
03 Jul 2023
Efficient Backdoor Attacks for Deep Neural Networks in Real-world
  Scenarios
Efficient Backdoor Attacks for Deep Neural Networks in Real-world Scenarios
Ziqiang Li
Hong Sun
Pengfei Xia
Heng Li
Beihao Xia
Yi Wu
Bin Li
AAML
24
8
0
14 Jun 2023
A Proxy Attack-Free Strategy for Practically Improving the Poisoning
  Efficiency in Backdoor Attacks
A Proxy Attack-Free Strategy for Practically Improving the Poisoning Efficiency in Backdoor Attacks
Ziqiang Li
Hong Sun
Pengfei Xia
Beihao Xia
Xue Rui
Wei Zhang
Qinglang Guo
Bin Li
AAML
32
8
0
14 Jun 2023
UNICORN: A Unified Backdoor Trigger Inversion Framework
UNICORN: A Unified Backdoor Trigger Inversion Framework
Zhenting Wang
Kai Mei
Juan Zhai
Shiqing Ma
LLMSV
27
44
0
05 Apr 2023
Don't FREAK Out: A Frequency-Inspired Approach to Detecting Backdoor
  Poisoned Samples in DNNs
Don't FREAK Out: A Frequency-Inspired Approach to Detecting Backdoor Poisoned Samples in DNNs
Hasan Hammoud
Adel Bibi
Philip H. S. Torr
Bernard Ghanem
AAML
30
5
0
23 Mar 2023
Backdoor Defense via Deconfounded Representation Learning
Backdoor Defense via Deconfounded Representation Learning
Zaixin Zhang
Qi Liu
Zhicai Wang
Zepu Lu
Qingyong Hu
AAML
49
39
0
13 Mar 2023
Backdoor Attacks and Defenses in Federated Learning: Survey, Challenges
  and Future Research Directions
Backdoor Attacks and Defenses in Federated Learning: Survey, Challenges and Future Research Directions
Thuy-Dung Nguyen
Tuan Nguyen
Phi Le Nguyen
Hieu H. Pham
Khoa D. Doan
Kok-Seng Wong
AAML
FedML
32
56
0
03 Mar 2023
Backdoor Attacks Against Deep Image Compression via Adaptive Frequency
  Trigger
Backdoor Attacks Against Deep Image Compression via Adaptive Frequency Trigger
Yi Yu
Yufei Wang
Wenhan Yang
Shijian Lu
Yap-Peng Tan
Alex C. Kot
63
41
0
28 Feb 2023
Attacks in Adversarial Machine Learning: A Systematic Survey from the
  Life-cycle Perspective
Attacks in Adversarial Machine Learning: A Systematic Survey from the Life-cycle Perspective
Baoyuan Wu
Zihao Zhu
Li Liu
Qingshan Liu
Zhaofeng He
Siwei Lyu
AAML
44
21
0
19 Feb 2023
Distilling Cognitive Backdoor Patterns within an Image
Distilling Cognitive Backdoor Patterns within an Image
Hanxun Huang
Xingjun Ma
S. Erfani
James Bailey
AAML
26
24
0
26 Jan 2023
Enhancement attacks in biomedical machine learning
Enhancement attacks in biomedical machine learning
M. Rosenblatt
J. Dadashkarimi
D. Scheinost
AAML
19
4
0
05 Jan 2023
Look, Listen, and Attack: Backdoor Attacks Against Video Action
  Recognition
Look, Listen, and Attack: Backdoor Attacks Against Video Action Recognition
Hasan Hammoud
Shuming Liu
Mohammad Alkhrashi
Fahad Albalawi
Bernard Ghanem
AAML
32
8
0
03 Jan 2023
Membership Inference Attacks Against Semantic Segmentation Models
Membership Inference Attacks Against Semantic Segmentation Models
Tomás Chobola
Dmitrii Usynin
Georgios Kaissis
MIACV
24
6
0
02 Dec 2022
Invisible Backdoor Attack with Dynamic Triggers against Person
  Re-identification
Invisible Backdoor Attack with Dynamic Triggers against Person Re-identification
Wenli Sun
Xinyang Jiang
Shuguang Dou
Dongsheng Li
Duoqian Miao
Cheng Deng
Cairong Zhao
AAML
22
8
0
20 Nov 2022
Backdoor Attacks for Remote Sensing Data with Wavelet Transform
Backdoor Attacks for Remote Sensing Data with Wavelet Transform
Nikolaus Drager
Yonghao Xu
Pedram Ghamisi
AAML
23
13
0
15 Nov 2022
Secure and Trustworthy Artificial Intelligence-Extended Reality (AI-XR)
  for Metaverses
Secure and Trustworthy Artificial Intelligence-Extended Reality (AI-XR) for Metaverses
Adnan Qayyum
M. A. Butt
Hassan Ali
Muhammad Usman
O. Halabi
Ala I. Al-Fuqaha
Q. Abbasi
Muhammad Ali Imran
Junaid Qadir
28
32
0
24 Oct 2022
Backdoor Attack and Defense in Federated Generative Adversarial
  Network-based Medical Image Synthesis
Backdoor Attack and Defense in Federated Generative Adversarial Network-based Medical Image Synthesis
Ruinan Jin
Xiaoxiao Li
FedML
AAML
MedIm
38
23
0
19 Oct 2022
Feather-Light Fourier Domain Adaptation in Magnetic Resonance Imaging
Feather-Light Fourier Domain Adaptation in Magnetic Resonance Imaging
Ivan Zakazov
V. Shaposhnikov
Iaroslav Bespalov
Dmitry V. Dylov
OOD
20
8
0
31 Jul 2022
BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean
  Label
BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label
Shengshan Hu
Ziqi Zhou
Yechao Zhang
L. Zhang
Yifeng Zheng
Yuanyuan HE
Hai Jin
AAML
22
44
0
01 Jul 2022
Few-shot Backdoor Defense Using Shapley Estimation
Few-shot Backdoor Defense Using Shapley Estimation
Jiyang Guan
Zhuozhuo Tu
Ran He
Dacheng Tao
AAML
26
53
0
30 Dec 2021
Check Your Other Door! Creating Backdoor Attacks in the Frequency Domain
Check Your Other Door! Creating Backdoor Attacks in the Frequency Domain
Hasan Hammoud
Bernard Ghanem
AAML
18
13
0
12 Sep 2021
12
Next