ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2210.00875
  4. Cited By
Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset
  Copyright Protection

Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protection

27 September 2022
Yiming Li
Yang Bai
Yong Jiang
Yong-Liang Yang
Shutao Xia
Bo Li
    AAML
ArXivPDFHTML

Papers citing "Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protection"

21 / 71 papers shown
Title
A Proxy Attack-Free Strategy for Practically Improving the Poisoning
  Efficiency in Backdoor Attacks
A Proxy Attack-Free Strategy for Practically Improving the Poisoning Efficiency in Backdoor Attacks
Ziqiang Li
Hong Sun
Pengfei Xia
Beihao Xia
Xue Rui
Wei Zhang
Qinglang Guo
Bin Li
AAML
30
8
0
14 Jun 2023
Backdoor Attack with Sparse and Invisible Trigger
Backdoor Attack with Sparse and Invisible Trigger
Yinghua Gao
Yiming Li
Xueluan Gong
Zhifeng Li
Shutao Xia
Qianqian Wang
AAML
13
19
0
11 May 2023
Universal Adversarial Backdoor Attacks to Fool Vertical Federated
  Learning in Cloud-Edge Collaboration
Universal Adversarial Backdoor Attacks to Fool Vertical Federated Learning in Cloud-Edge Collaboration
Peng Chen
Xin Du
Zhihui Lu
Hongfeng Chai
FedML
AAML
26
10
0
22 Apr 2023
Backdoor Defense via Adaptively Splitting Poisoned Dataset
Backdoor Defense via Adaptively Splitting Poisoned Dataset
Kuofeng Gao
Yang Bai
Jindong Gu
Yong-Liang Yang
Shutao Xia
AAML
13
49
0
23 Mar 2023
Do Backdoors Assist Membership Inference Attacks?
Do Backdoors Assist Membership Inference Attacks?
Yumeki Goto
Nami Ashizawa
Toshiki Shibahara
Naoto Yanai
MIACV
12
2
0
22 Mar 2023
Did You Train on My Dataset? Towards Public Dataset Protection with
  Clean-Label Backdoor Watermarking
Did You Train on My Dataset? Towards Public Dataset Protection with Clean-Label Backdoor Watermarking
Ruixiang Tang
Qizhang Feng
Ninghao Liu
Fan Yang
Xia Hu
17
35
0
20 Mar 2023
SATBA: An Invisible Backdoor Attack Based On Spatial Attention
SATBA: An Invisible Backdoor Attack Based On Spatial Attention
Huasong Zhou
Xiaowei Xu
Zhenyu Wang
Leon Bevan Bullock
AAML
9
1
0
25 Feb 2023
Attacks in Adversarial Machine Learning: A Systematic Survey from the
  Life-cycle Perspective
Attacks in Adversarial Machine Learning: A Systematic Survey from the Life-cycle Perspective
Baoyuan Wu
Zihao Zhu
Li Liu
Qingshan Liu
Zhaofeng He
Siwei Lyu
AAML
44
21
0
19 Feb 2023
Algorithmic Collective Action in Machine Learning
Algorithmic Collective Action in Machine Learning
Moritz Hardt
Eric Mazumdar
Celestine Mendler-Dünner
Tijana Zrnic
11
21
0
08 Feb 2023
BackdoorBox: A Python Toolbox for Backdoor Learning
BackdoorBox: A Python Toolbox for Backdoor Learning
Yiming Li
Mengxi Ya
Yang Bai
Yong Jiang
Shutao Xia
AAML
36
40
0
01 Feb 2023
M-to-N Backdoor Paradigm: A Multi-Trigger and Multi-Target Attack to
  Deep Learning Models
M-to-N Backdoor Paradigm: A Multi-Trigger and Multi-Target Attack to Deep Learning Models
Linshan Hou
Zhongyun Hua
Yuhong Li
Yifeng Zheng
Leo Yu Zhang
AAML
13
2
0
03 Nov 2022
Untargeted Backdoor Attack against Object Detection
Untargeted Backdoor Attack against Object Detection
C. Luo
Yiming Li
Yong Jiang
Shutao Xia
AAML
18
31
0
02 Nov 2022
BATT: Backdoor Attack with Transformation-based Triggers
BATT: Backdoor Attack with Transformation-based Triggers
Tong Xu
Yiming Li
Yong Jiang
Shutao Xia
AAML
36
14
0
02 Nov 2022
Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural
  Networks
Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks
Run Wang
Jixing Ren
Boheng Li
Tianyi She
Wenhui Zhang
Liming Fang
Jing Chen
Chao Shen
Lina Wang
WIGM
15
16
0
14 Oct 2022
Robust and Imperceptible Black-box DNN Watermarking Based on Fourier
  Perturbation Analysis and Frequency Sensitivity Clustering
Robust and Imperceptible Black-box DNN Watermarking Based on Fourier Perturbation Analysis and Frequency Sensitivity Clustering
Yong-Jin Liu
Hanzhou Wu
Xinpeng Zhang
AAML
20
7
0
08 Aug 2022
Towards a Defense Against Federated Backdoor Attacks Under Continuous
  Training
Towards a Defense Against Federated Backdoor Attacks Under Continuous Training
Shuai Wang
J. Hayase
Giulia Fanti
Sewoong Oh
FedML
10
5
0
24 May 2022
On the Effectiveness of Adversarial Training against Backdoor Attacks
On the Effectiveness of Adversarial Training against Backdoor Attacks
Yinghua Gao
Dongxian Wu
Jingfeng Zhang
Guanhao Gan
Shutao Xia
Gang Niu
Masashi Sugiyama
AAML
16
22
0
22 Feb 2022
Few-Shot Backdoor Attacks on Visual Object Tracking
Few-Shot Backdoor Attacks on Visual Object Tracking
Yiming Li
Haoxiang Zhong
Xingjun Ma
Yong Jiang
Shutao Xia
AAML
34
53
0
31 Jan 2022
Manipulating SGD with Data Ordering Attacks
Manipulating SGD with Data Ordering Attacks
Ilia Shumailov
Zakhar Shumaylov
Dmitry Kazhdan
Yiren Zhao
Nicolas Papernot
Murat A. Erdogdu
Ross J. Anderson
AAML
112
90
0
19 Apr 2021
Deep Serial Number: Computational Watermarking for DNN Intellectual
  Property Protection
Deep Serial Number: Computational Watermarking for DNN Intellectual Property Protection
Ruixiang Tang
Mengnan Du
Xia Hu
14
3
0
17 Nov 2020
SentiNet: Detecting Localized Universal Attacks Against Deep Learning
  Systems
SentiNet: Detecting Localized Universal Attacks Against Deep Learning Systems
Edward Chou
Florian Tramèr
Giancarlo Pellegrino
AAML
168
284
0
02 Dec 2018
Previous
12