Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
2209.11715
Cited By
The "Beatrix'' Resurrections: Robust Backdoor Detection via Gram Matrices
23 September 2022
Wanlun Ma
Derui Wang
Ruoxi Sun
Minhui Xue
S. Wen
Yang Xiang
AAML
Re-assign community
ArXiv
PDF
HTML
Papers citing
"The "Beatrix'' Resurrections: Robust Backdoor Detection via Gram Matrices"
50 / 52 papers shown
Title
Stealthy Backdoor Attack in Self-Supervised Learning Vision Encoders for Large Vision Language Models
Zhaoyi Liu
Huan Zhang
AAML
105
1
0
25 Feb 2025
Backdooring Vision-Language Models with Out-Of-Distribution Data
Weimin Lyu
Jiachen Yao
Saumya Gupta
Lu Pang
Tao Sun
Lingjie Yi
Lijie Hu
Haibin Ling
Chao Chen
VLM
AAML
73
4
0
02 Oct 2024
Threats, Attacks, and Defenses in Machine Unlearning: A Survey
Ziyao Liu
Huanyi Ye
Chen Chen
Yongsen Zheng
K. Lam
AAML
MU
50
30
0
20 Mar 2024
BadEncoder: Backdoor Attacks to Pre-trained Encoders in Self-Supervised Learning
Jinyuan Jia
Yupei Liu
Neil Zhenqiang Gong
SILM
SSL
70
152
0
01 Aug 2021
Hidden Backdoors in Human-Centric Language Models
Shaofeng Li
Hui Liu
Tian Dong
Benjamin Zi Hao Zhao
Minhui Xue
Haojin Zhu
Jialiang Lu
SILM
62
149
0
01 May 2021
SPECTRE: Defending Against Backdoor Attacks Using Robust Statistics
J. Hayase
Weihao Kong
Raghav Somani
Sewoong Oh
AAML
29
150
0
22 Apr 2021
EX-RAY: Distinguishing Injected Backdoor from Natural Features in Neural Networks by Examining Differential Feature Symmetry
Yingqi Liu
Guangyu Shen
Guanhong Tao
Zhenting Wang
Shiqing Ma
Xinming Zhang
AAML
44
8
0
16 Mar 2021
T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based Text Classification
A. Azizi
I. A. Tahmid
Asim Waheed
Neal Mangaokar
Jiameng Pu
M. Javed
Chandan K. Reddy
Bimal Viswanath
AAML
30
78
0
07 Mar 2021
Learning Transferable Visual Models From Natural Language Supervision
Alec Radford
Jong Wook Kim
Chris Hallacy
Aditya A. Ramesh
Gabriel Goh
...
Amanda Askell
Pamela Mishkin
Jack Clark
Gretchen Krueger
Ilya Sutskever
CLIP
VLM
352
28,659
0
26 Feb 2021
TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors
Ren Pang
Zheng Zhang
Xiangshan Gao
Zhaohan Xi
S. Ji
Peng Cheng
Xiapu Luo
Ting Wang
AAML
40
32
0
16 Dec 2020
Invisible Backdoor Attack with Sample-Specific Triggers
Yuezun Li
Yiming Li
Baoyuan Wu
Longkang Li
Ran He
Siwei Lyu
AAML
DiffM
49
474
0
07 Dec 2020
Backdoor Attack against Speaker Verification
Tongqing Zhai
Yiming Li
Zi-Mou Zhang
Baoyuan Wu
Yong Jiang
Shutao Xia
AAML
39
101
0
22 Oct 2020
Input-Aware Dynamic Backdoor Attack
A. Nguyen
Anh Tran
AAML
42
425
0
16 Oct 2020
Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review
Yansong Gao
Bao Gia Doan
Zhi-Li Zhang
Siqi Ma
Jiliang Zhang
Anmin Fu
Surya Nepal
Hyoungshick Kim
AAML
54
224
0
21 Jul 2020
Reflection Backdoor: A Natural Backdoor Attack on Deep Neural Networks
Yunfei Liu
Xingjun Ma
James Bailey
Feng Lu
AAML
62
509
0
05 Jul 2020
BadNL: Backdoor Attacks against NLP Models with Semantic-preserving Improvements
Xiaoyi Chen
A. Salem
Dingfan Chen
Michael Backes
Shiqing Ma
Qingni Shen
Zhonghai Wu
Yang Zhang
SILM
39
234
0
01 Jun 2020
Rethinking the Trigger of Backdoor Attack
Yiming Li
Tongqing Zhai
Baoyuan Wu
Yong Jiang
Zhifeng Li
Shutao Xia
LLMSV
31
148
0
09 Apr 2020
Dynamic Backdoor Attacks Against Machine Learning Models
A. Salem
Rui Wen
Michael Backes
Shiqing Ma
Yang Zhang
AAML
77
273
0
07 Mar 2020
A Simple Framework for Contrastive Learning of Visual Representations
Ting-Li Chen
Simon Kornblith
Mohammad Norouzi
Geoffrey E. Hinton
SSL
93
18,523
0
13 Feb 2020
Label-Consistent Backdoor Attacks
Alexander Turner
Dimitris Tsipras
Aleksander Madry
AAML
16
387
0
05 Dec 2019
Detecting AI Trojans Using Meta Neural Analysis
Xiaojun Xu
Qi Wang
Huichen Li
Nikita Borisov
Carl A. Gunter
Yue Liu
48
322
0
08 Oct 2019
Hidden Trigger Backdoor Attacks
Aniruddha Saha
Akshayvarun Subramanya
Hamed Pirsiavash
49
619
0
30 Sep 2019
Comparing distributions:
ℓ
1
\ell_1
ℓ
1
geometry improves kernel two-sample testing
M. Scetbon
Gaël Varoquaux
30
10
0
19 Sep 2019
Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor Contamination Detection
Di Tang
Xiaofeng Wang
Haixu Tang
Kehuan Zhang
AAML
32
198
0
02 Aug 2019
StegaStamp: Invisible Hyperlinks in Physical Photographs
Matthew Tancik
B. Mildenhall
Ren Ng
WIGM
45
364
0
10 Apr 2019
STRIP: A Defence Against Trojan Attacks on Deep Neural Networks
Yansong Gao
Chang Xu
Derui Wang
Shiping Chen
Damith C. Ranasinghe
Surya Nepal
AAML
42
801
0
18 Feb 2019
A new Backdoor Attack in CNNs by training set corruption without label poisoning
Mauro Barni
Kassem Kallas
B. Tondi
AAML
84
353
0
12 Feb 2019
SentiNet: Detecting Localized Universal Attacks Against Deep Learning Systems
Edward Chou
Florian Tramèr
Giancarlo Pellegrino
AAML
186
291
0
02 Dec 2018
Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering
Bryant Chen
Wilka Carvalho
Wenjie Li
Heiko Ludwig
Benjamin Edwards
Chengyao Chen
Ziqiang Cao
Biplav Srivastava
AAML
55
786
0
09 Nov 2018
Spectral Signatures in Backdoor Attacks
Brandon Tran
Jerry Li
Aleksander Madry
AAML
42
778
0
01 Nov 2018
A Simple Unified Framework for Detecting Out-of-Distribution Samples and Adversarial Attacks
Kimin Lee
Kibok Lee
Honglak Lee
Jinwoo Shin
OODD
48
2,024
0
10 Jul 2018
How To Backdoor Federated Learning
Eugene Bagdasaryan
Andreas Veit
Yiqing Hua
D. Estrin
Vitaly Shmatikov
SILM
FedML
48
1,892
0
02 Jul 2018
Speech Commands: A Dataset for Limited-Vocabulary Speech Recognition
Pete Warden
32
1,599
0
09 Apr 2018
Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks
Ali Shafahi
Wenjie Huang
Mahyar Najibi
Octavian Suciu
Christoph Studer
Tudor Dumitras
Tom Goldstein
AAML
52
1,080
0
03 Apr 2018
DARTS: Deceiving Autonomous Cars with Toxic Signs
Chawin Sitawarin
A. Bhagoji
Arsalan Mosenia
M. Chiang
Prateek Mittal
AAML
71
234
0
18 Feb 2018
Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples
Anish Athalye
Nicholas Carlini
D. Wagner
AAML
121
3,171
0
01 Feb 2018
Scalable and accurate deep learning for electronic health records
A. Rajkomar
Eyal Oren
Kai Chen
Andrew M. Dai
Nissan Hajaj
...
A. Butte
M. Howell
Claire Cui
Greg S. Corrado
Jeffrey Dean
OOD
BDL
53
2,122
0
24 Jan 2018
Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning
Xinyun Chen
Chang-rui Liu
Yue Liu
Kimberly Lu
D. Song
AAML
SILM
60
1,818
0
15 Dec 2017
Enhancing The Reliability of Out-of-distribution Image Detection in Neural Networks
Shiyu Liang
Yixuan Li
R. Srikant
UQCV
OODD
76
2,046
0
08 Jun 2017
Demystifying Neural Style Transfer
Yanghao Li
Naiyan Wang
Jiaying Liu
Xiaodi Hou
37
521
0
04 Jan 2017
Membership Inference Attacks against Machine Learning Models
Reza Shokri
M. Stronati
Congzheng Song
Vitaly Shmatikov
SLR
MIALM
MIACV
186
4,075
0
18 Oct 2016
Grad-CAM: Visual Explanations from Deep Networks via Gradient-based Localization
Ramprasaath R. Selvaraju
Michael Cogswell
Abhishek Das
Ramakrishna Vedantam
Devi Parikh
Dhruv Batra
FAtt
132
19,725
0
07 Oct 2016
Concrete Problems in AI Safety
Dario Amodei
C. Olah
Jacob Steinhardt
Paul Christiano
John Schulman
Dandelion Mané
130
2,349
0
21 Jun 2016
Uncertain programming model for multi-item solid transportation problem
Hasan Dalman
53
730
0
31 May 2016
Identity Mappings in Deep Residual Networks
Kaiming He
Xinming Zhang
Shaoqing Ren
Jian Sun
185
10,149
0
16 Mar 2016
Deep Residual Learning for Image Recognition
Kaiming He
Xinming Zhang
Shaoqing Ren
Jian Sun
MedIm
673
192,638
0
10 Dec 2015
Fast Two-Sample Testing with Analytic Representations of Probability Measures
Kacper P. Chwialkowski
Aaditya Ramdas
Dino Sejdinovic
Arthur Gretton
22
154
0
15 Jun 2015
Generative Moment Matching Networks
Yujia Li
Kevin Swersky
R. Zemel
OOD
GAN
63
844
0
10 Feb 2015
Explaining and Harnessing Adversarial Examples
Ian Goodfellow
Jonathon Shlens
Christian Szegedy
AAML
GAN
95
18,922
0
20 Dec 2014
Very Deep Convolutional Networks for Large-Scale Image Recognition
Karen Simonyan
Andrew Zisserman
FAtt
MDE
367
99,991
0
04 Sep 2014
1
2
Next