ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2206.04823
  4. Cited By
Membership Inference via Backdooring

Membership Inference via Backdooring

International Joint Conference on Artificial Intelligence (IJCAI), 2022
10 June 2022
Hongsheng Hu
Z. Salcic
Gillian Dobbie
Jinjun Chen
Lichao Sun
Xuyun Zhang
    MIACV
ArXiv (abs)PDFHTML

Papers citing "Membership Inference via Backdooring"

21 / 21 papers shown
Title
Data Provenance Auditing of Fine-Tuned Large Language Models with a Text-Preserving Technique
Data Provenance Auditing of Fine-Tuned Large Language Models with a Text-Preserving Technique
Yanming Li
Seifeddine Ghozzi
Cédric Eichler
Nicolas Anciaux
Alexandra Bensamoun
Lorena Gonzalez-Manzano
WaLM
188
0
0
07 Oct 2025
SMS: Self-supervised Model Seeding for Verification of Machine Unlearning
SMS: Self-supervised Model Seeding for Verification of Machine UnlearningIEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2025
Weiqi Wang
Chenhan Zhang
Zhiyi Tian
Shui Yu
AAMLMU
116
0
0
30 Sep 2025
Federated Unlearning Made Practical: Seamless Integration via Negated Pseudo-Gradients
Federated Unlearning Made Practical: Seamless Integration via Negated Pseudo-Gradients
Alessio Mora
Carlo Mazzocca
R. Montanari
Paolo Bellavista
MU
230
0
0
08 Apr 2025
SCU: An Efficient Machine Unlearning Scheme for Deep Learning Enabled Semantic Communications
SCU: An Efficient Machine Unlearning Scheme for Deep Learning Enabled Semantic CommunicationsIEEE Transactions on Information Forensics and Security (TIFS), 2025
Weiqi Wang
Zhiyi Tian
Chenhan Zhang
Shui Yu
MU
277
5
0
27 Feb 2025
CRFU: Compressive Representation Forgetting Against Privacy Leakage on Machine UnlearningIEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2025
Weiqi Wang
Chenhan Zhang
Zhiyi Tian
Shushu Liu
Shui Yu
MU
277
3
0
27 Feb 2025
SoK: Dataset Copyright Auditing in Machine Learning Systems
SoK: Dataset Copyright Auditing in Machine Learning SystemsIEEE Symposium on Security and Privacy (S&P), 2024
L. Du
Xuanru Zhou
M. Chen
Chusong Zhang
Zhou Su
Peng Cheng
Jiming Chen
Zhikun Zhang
MLAU
378
15
0
22 Oct 2024
Forget to Flourish: Leveraging Machine-Unlearning on Pretrained Language
  Models for Privacy Leakage
Forget to Flourish: Leveraging Machine-Unlearning on Pretrained Language Models for Privacy LeakageAAAI Conference on Artificial Intelligence (AAAI), 2024
Md Rafi Ur Rashid
Jing Liu
T. Koike-Akino
Shagufta Mehnaz
Ye Wang
MUSILM
276
11
0
30 Aug 2024
Composite Concept Extraction through Backdooring
Composite Concept Extraction through BackdooringInternational Conference on Pattern Recognition (ICPR), 2024
Banibrata Ghosh
Haripriya Harikumar
Khoa D. Doan
Svetha Venkatesh
Santu Rana
252
0
0
19 Jun 2024
Physical Backdoor: Towards Temperature-based Backdoor Attacks in the
  Physical World
Physical Backdoor: Towards Temperature-based Backdoor Attacks in the Physical World
Wen Yin
Jian Lou
Pan Zhou
Yulai Xie
Dan Feng
Yuhua Sun
Tailai Zhang
Lichao Sun
AAML
135
11
0
30 Apr 2024
How to Forget Clients in Federated Online Learning to Rank?
How to Forget Clients in Federated Online Learning to Rank?European Conference on Information Retrieval (ECIR), 2024
Shuyi Wang
Bing Liu
Guido Zuccon
175
10
0
24 Jan 2024
Federated Unlearning: A Survey on Methods, Design Guidelines, and
  Evaluation Metrics
Federated Unlearning: A Survey on Methods, Design Guidelines, and Evaluation MetricsIEEE Transactions on Neural Networks and Learning Systems (TNNLS), 2024
Nicolò Romandini
Alessio Mora
Carlo Mazzocca
R. Montanari
Paolo Bellavista
FedMLMU
327
46
0
10 Jan 2024
Machine unlearning through fine-grained model parameters perturbation
Machine unlearning through fine-grained model parameters perturbationIEEE Transactions on Knowledge and Data Engineering (TKDE), 2024
Zhiwei Zuo
Zhuo Tang
KenLi Li
Anwitaman Datta
AAMLMU
422
4
0
09 Jan 2024
Data and Model Poisoning Backdoor Attacks on Wireless Federated
  Learning, and the Defense Mechanisms: A Comprehensive Survey
Data and Model Poisoning Backdoor Attacks on Wireless Federated Learning, and the Defense Mechanisms: A Comprehensive SurveyIEEE Communications Surveys and Tutorials (COMST), 2023
Yichen Wan
Youyang Qu
Wei Ni
Yong Xiang
Longxiang Gao
Ekram Hossain
AAML
254
74
0
14 Dec 2023
Exploring ChatGPT's Capabilities on Vulnerability Management
Exploring ChatGPT's Capabilities on Vulnerability ManagementUSENIX Security Symposium (USENIX Security), 2023
Peiyu Liu
Junming Liu
Lirong Fu
Kangjie Lu
Yifan Xia
Xuhong Zhang
Wenzhi Chen
Haiqin Weng
R. Beyah
Wenhai Wang
194
39
0
11 Nov 2023
Source Inference Attacks: Beyond Membership Inference Attacks in
  Federated Learning
Source Inference Attacks: Beyond Membership Inference Attacks in Federated LearningIEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2023
Hongsheng Hu
Xuyun Zhang
Z. Salcic
Lichao Sun
K. Choo
Gillian Dobbie
138
25
0
30 Sep 2023
Class-wise Federated Unlearning: Harnessing Active Forgetting with Teacher-Student Memory Generation
Class-wise Federated Unlearning: Harnessing Active Forgetting with Teacher-Student Memory GenerationKnowledge-Based Systems (KBS), 2023
Yuyuan Li
Chaochao Chen
Xiaolin Zheng
Jiaming Zhang
FedMLMU
237
7
0
07 Jul 2023
Watermarking Text Data on Large Language Models for Dataset Copyright
Watermarking Text Data on Large Language Models for Dataset Copyright
Yixin Liu
Hongsheng Hu
Xun Chen
Xuyun Zhang
Lichao Sun
WaLM
323
30
0
22 May 2023
Do Backdoors Assist Membership Inference Attacks?
Do Backdoors Assist Membership Inference Attacks?Security and Privacy in Communication Networks (SecureComm), 2023
Yumeki Goto
Nami Ashizawa
Toshiki Shibahara
Naoto Yanai
MIACV
133
2
0
22 Mar 2023
Attacks in Adversarial Machine Learning: A Systematic Survey from the
  Life-cycle Perspective
Attacks in Adversarial Machine Learning: A Systematic Survey from the Life-cycle Perspective
Baoyuan Wu
Zihao Zhu
Li Liu
Qingshan Liu
Zhaofeng He
Siwei Lyu
AAML
441
32
0
19 Feb 2023
Data Isotopes for Data Provenance in DNNs
Data Isotopes for Data Provenance in DNNsProceedings on Privacy Enhancing Technologies (PoPETs), 2022
Emily Wenger
Xiuyu Li
Ben Y. Zhao
Vitaly Shmatikov
162
17
0
29 Aug 2022
Backdoor Attacks on Crowd Counting
Backdoor Attacks on Crowd CountingACM Multimedia (ACM MM), 2022
Yuhua Sun
Tailai Zhang
Jiabo He
Pan Zhou
Jian Lou
Zichuan Xu
Xing Di
Yu Cheng
Lichao
AAML
199
16
0
12 Jul 2022
1