ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2211.05638
  4. Cited By
Untargeted Backdoor Attack against Object Detection
v1v2 (latest)

Untargeted Backdoor Attack against Object Detection

IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2022
2 November 2022
C. Luo
Yiming Li
Yong Jiang
Shutao Xia
    AAML
ArXiv (abs)PDFHTML

Papers citing "Untargeted Backdoor Attack against Object Detection"

11 / 11 papers shown
Title
Backdoor Attacks on Open Vocabulary Object Detectors via Multi-Modal Prompt Tuning
Backdoor Attacks on Open Vocabulary Object Detectors via Multi-Modal Prompt Tuning
Ankita Raj
Chetan Arora
ObjDAAMLVLM
201
0
0
16 Nov 2025
Survivability of Backdoor Attacks on Unconstrained Face Recognition Systems
Survivability of Backdoor Attacks on Unconstrained Face Recognition Systems
Quentin Le Roux
Yannick Teglia
Teddy Furon
Philippe Loubet-Moundi
Eric Bourbao
CVBMAAMLSILM
216
0
0
02 Jul 2025
AnywhereDoor: Multi-Target Backdoor Attacks on Object Detection
Jialin Lu
Junjie Shan
Ziqi Zhao
Ka-Ho Chow
AAML
417
1
0
09 Mar 2025
BadRefSR: Backdoor Attacks Against Reference-based Image Super Resolution
BadRefSR: Backdoor Attacks Against Reference-based Image Super ResolutionIEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2025
Xue Yang
Tao Chen
Lei Guo
Wenbo Jiang
Ji Guo
Yuchen Ren
Jiaming He
807
4
0
28 Feb 2025
PersGuard: Preventing Malicious Personalization via Backdoor Attacks on Pre-trained Text-to-Image Diffusion Models
PersGuard: Preventing Malicious Personalization via Backdoor Attacks on Pre-trained Text-to-Image Diffusion Models
Xinwei Liu
Xiaojun Jia
Yuan Xun
Qichuan Geng
Simeng Qin
DiffMAAML
255
1
0
22 Feb 2025
Graph Neural Backdoor: Fundamentals, Methodologies, Applications, and Future Directions
Graph Neural Backdoor: Fundamentals, Methodologies, Applications, and Future Directions
Xiao Yang
Gaolei Li
Jianhua Li
AAMLAI4CE
288
4
0
08 Jan 2025
Bounding-box Watermarking: Defense against Model Extraction Attacks on Object Detectors
Bounding-box Watermarking: Defense against Model Extraction Attacks on Object Detectors
Satoru Koda
I. Morikawa
AAML
352
1
0
20 Nov 2024
Invisibility Cloak: Disappearance under Human Pose Estimation via Backdoor Attacks
Invisibility Cloak: Disappearance under Human Pose Estimation via Backdoor Attacks
Minxing Zhang
Wenshu Fan
Xiao Zhang
Shui Yu
Michael Backes
Xiao Zhang
AAML
321
1
0
10 Oct 2024
BadFusion: 2D-Oriented Backdoor Attacks against 3D Object Detection
BadFusion: 2D-Oriented Backdoor Attacks against 3D Object Detection
Saket S. Chaturvedi
Lan Zhang
Wenbin Zhang
Pan He
Xiaoyong Yuan
3DPC
223
1
0
06 May 2024
Prompt Backdoors in Visual Prompt Learning
Prompt Backdoors in Visual Prompt Learning
Hai Huang
Subrat Kishore Dutta
Michael Backes
Yun Shen
Yang Zhang
VLMVPVLMAAMLSILM
183
3
0
11 Oct 2023
Versatile Backdoor Attack with Visible, Semantic, Sample-Specific, and
  Compatible Triggers
Versatile Backdoor Attack with Visible, Semantic, Sample-Specific, and Compatible Triggers
Ke Xu
Hongrui Chen
Zihao Zhu
Li Liu
Baoyuan Wu
DiffM
352
13
0
01 Jun 2023
1