ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2302.03251
  4. Cited By
SCALE-UP: An Efficient Black-box Input-level Backdoor Detection via
  Analyzing Scaled Prediction Consistency

SCALE-UP: An Efficient Black-box Input-level Backdoor Detection via Analyzing Scaled Prediction Consistency

7 February 2023
Junfeng Guo
Yiming Li
Xun Chen
Hanqing Guo
Lichao Sun
Cong Liu
    AAML
    MLAU
ArXivPDFHTML

Papers citing "SCALE-UP: An Efficient Black-box Input-level Backdoor Detection via Analyzing Scaled Prediction Consistency"

50 / 64 papers shown
Title
Mitigating Backdoor Triggered and Targeted Data Poisoning Attacks in Voice Authentication Systems
Mitigating Backdoor Triggered and Targeted Data Poisoning Attacks in Voice Authentication Systems
Alireza Mohammadi
Keshav Sood
D. Thiruvady
A. Nazari
AAML
27
0
0
06 May 2025
Cert-SSB: Toward Certified Sample-Specific Backdoor Defense
Cert-SSB: Toward Certified Sample-Specific Backdoor Defense
Ting Qiao
Y. Wang
Xing Liu
Sixing Wu
Jianbing Li
Yiming Li
AAML
SILM
64
0
0
30 Apr 2025
SFIBA: Spatial-based Full-target Invisible Backdoor Attacks
SFIBA: Spatial-based Full-target Invisible Backdoor Attacks
Yangxu Yin
H. Chen
Yudong Gao
Peng Sun
Z. Li
W. Liu
AAML
40
0
0
29 Apr 2025
Secure Transfer Learning: Training Clean Models Against Backdoor in (Both) Pre-trained Encoders and Downstream Datasets
Secure Transfer Learning: Training Clean Models Against Backdoor in (Both) Pre-trained Encoders and Downstream Datasets
Y. Zhang
Yuxuan Zhou
Tianyu Li
Minghui Li
Shengshan Hu
Wei Luo
L. Zhang
AAML
SILM
28
0
0
16 Apr 2025
DeBackdoor: A Deductive Framework for Detecting Backdoor Attacks on Deep Models with Limited Data
DeBackdoor: A Deductive Framework for Detecting Backdoor Attacks on Deep Models with Limited Data
Dorde Popovic
Amin Sadeghi
Ting Yu
Sanjay Chawla
Issa M. Khalil
AAML
46
0
0
27 Mar 2025
BadToken: Token-level Backdoor Attacks to Multi-modal Large Language Models
BadToken: Token-level Backdoor Attacks to Multi-modal Large Language Models
Zenghui Yuan
Jiawen Shi
Pan Zhou
Neil Zhenqiang Gong
Lichao Sun
AAML
66
1
0
20 Mar 2025
Test-Time Backdoor Detection for Object Detection Models
Test-Time Backdoor Detection for Object Detection Models
Hangtao Zhang
Yichen Wang
Shihui Yan
Chenyu Zhu
Ziqi Zhou
Linshan Hou
Shengshan Hu
Minghui Li
Yanjun Zhang
L. Zhang
AAML
46
0
0
19 Mar 2025
C^2 ATTACK: Towards Representation Backdoor on CLIP via Concept Confusion
Lijie Hu
Junchi Liao
Weimin Lyu
Shaopeng Fu
Tianhao Huang
Shu Yang
Guimin Hu
Di Wang
AAML
65
0
0
12 Mar 2025
Seal Your Backdoor with Variational Defense
Ivan Sabolić
Matej Grcić
Sinisa Segvic
AAML
73
0
0
11 Mar 2025
NaviDet: Efficient Input-level Backdoor Detection on Text-to-Image Synthesis via Neuron Activation Variation
Shengfang Zhai
Jiajun Li
Yue Liu
Huanran Chen
Zhihua Tian
Wenjie Qu
Qingni Shen
Ruoxi Jia
Yinpeng Dong
Jiaheng Zhang
AAML
44
0
0
09 Mar 2025
Class-Conditional Neural Polarizer: A Lightweight and Effective Backdoor Defense by Purifying Poisoned Features
Class-Conditional Neural Polarizer: A Lightweight and Effective Backdoor Defense by Purifying Poisoned Features
Mingli Zhu
Shaokui Wei
Hongyuan Zha
Baoyuan Wu
AAML
37
0
0
23 Feb 2025
Cut the Deadwood Out: Post-Training Model Purification with Selective Module Substitution
Cut the Deadwood Out: Post-Training Model Purification with Selective Module Substitution
Yao Tong
Weijun Li
Xuanli He
Haolan Zhan
Qiongkai Xu
AAML
28
1
0
31 Dec 2024
A Backdoor Attack Scheme with Invisible Triggers Based on Model Architecture Modification
A Backdoor Attack Scheme with Invisible Triggers Based on Model Architecture Modification
Yuan Ma
Xu Ma
Jiankang Wei
Jinmeng Tang
Xiaoyu Zhang
Yilun Lyu
Kehao Chen
Jingtong Huang
74
0
0
22 Dec 2024
One Pixel is All I Need
One Pixel is All I Need
Deng Siqin
Zhou Xiaoyi
ViT
83
0
0
14 Dec 2024
FLARE: Towards Universal Dataset Purification against Backdoor Attacks
FLARE: Towards Universal Dataset Purification against Backdoor Attacks
Linshan Hou
Wei Luo
Zhongyun Hua
Songhua Chen
L. Zhang
Yiming Li
AAML
65
0
0
29 Nov 2024
BadScan: An Architectural Backdoor Attack on Visual State Space Models
BadScan: An Architectural Backdoor Attack on Visual State Space Models
Om Suhas Deshmukh
Sankalp Nagaonkar
A. Tripathi
Ashish Mishra
Mamba
74
0
0
26 Nov 2024
Reliable Poisoned Sample Detection against Backdoor Attacks Enhanced by Sharpness Aware Minimization
Mingda Zhang
Mingli Zhu
Zihao Zhu
Baoyuan Wu
AAML
69
1
0
18 Nov 2024
ProP: Efficient Backdoor Detection via Propagation Perturbation for
  Overparametrized Models
ProP: Efficient Backdoor Detection via Propagation Perturbation for Overparametrized Models
Tao Ren
Qiongxiu Li
AAML
36
0
0
11 Nov 2024
Defending Deep Regression Models against Backdoor Attacks
Defending Deep Regression Models against Backdoor Attacks
Lingyu Du
Yupei Liu
Jinyuan Jia
Guohao Lan
AAML
21
1
0
07 Nov 2024
Backdoor in Seconds: Unlocking Vulnerabilities in Large Pre-trained
  Models via Model Editing
Backdoor in Seconds: Unlocking Vulnerabilities in Large Pre-trained Models via Model Editing
Dongliang Guo
Mengxuan Hu
Zihan Guan
Junfeng Guo
Thomas Hartvigsen
Sheng R. Li
AAML
21
0
0
23 Oct 2024
Backdoor Defense through Self-Supervised and Generative Learning
Backdoor Defense through Self-Supervised and Generative Learning
Ivan Sabolić
Ivan Grubišić
Siniša Šegvić
AAML
46
0
0
02 Sep 2024
BadMerging: Backdoor Attacks Against Model Merging
BadMerging: Backdoor Attacks Against Model Merging
Jinghuai Zhang
Jianfeng Chi
Zheng Li
Kunlin Cai
Yang Zhang
Yuan Tian
MoMe
FedML
AAML
32
14
0
14 Aug 2024
PSBD: Prediction Shift Uncertainty Unlocks Backdoor Detection
PSBD: Prediction Shift Uncertainty Unlocks Backdoor Detection
Wei Li
Pin-Yu Chen
Sijia Liu
Ren Wang
AAML
41
2
0
09 Jun 2024
Generalization Bound and New Algorithm for Clean-Label Backdoor Attack
Generalization Bound and New Algorithm for Clean-Label Backdoor Attack
Lijia Yu
Shuang Liu
Yibo Miao
Xiao-Shan Gao
Lijun Zhang
AAML
27
5
0
02 Jun 2024
BAN: Detecting Backdoors Activated by Adversarial Neuron Noise
BAN: Detecting Backdoors Activated by Adversarial Neuron Noise
Xiaoyun Xu
Zhuoran Liu
Stefanos Koffas
Shujian Yu
S. Picek
AAML
16
1
0
30 May 2024
Breaking the False Sense of Security in Backdoor Defense through
  Re-Activation Attack
Breaking the False Sense of Security in Backdoor Defense through Re-Activation Attack
Mingli Zhu
Siyuan Liang
Baoyuan Wu
AAML
37
14
0
25 May 2024
BDetCLIP: Multimodal Prompting Contrastive Test-Time Backdoor Detection
BDetCLIP: Multimodal Prompting Contrastive Test-Time Backdoor Detection
Yuwei Niu
Shuo He
Qi Wei
Feng Liu
Lei Feng
AAML
33
1
0
24 May 2024
Not All Prompts Are Secure: A Switchable Backdoor Attack Against
  Pre-trained Vision Transformers
Not All Prompts Are Secure: A Switchable Backdoor Attack Against Pre-trained Vision Transformers
Shengyuan Yang
Jiawang Bai
Kuofeng Gao
Yong-Liang Yang
Yiming Li
Shu-Tao Xia
AAML
SILM
30
5
0
17 May 2024
IBD-PSC: Input-level Backdoor Detection via Parameter-oriented Scaling
  Consistency
IBD-PSC: Input-level Backdoor Detection via Parameter-oriented Scaling Consistency
Linshan Hou
Ruili Feng
Zhongyun Hua
Wei Luo
Leo Yu Zhang
Yiming Li
AAML
30
19
0
16 May 2024
UFID: A Unified Framework for Input-level Backdoor Detection on Diffusion Models
UFID: A Unified Framework for Input-level Backdoor Detection on Diffusion Models
Zihan Guan
Mengxuan Hu
Sheng R. Li
Anil Vullikanti
DiffM
AAML
23
3
0
01 Apr 2024
Backdoor Secrets Unveiled: Identifying Backdoor Data with Optimized
  Scaled Prediction Consistency
Backdoor Secrets Unveiled: Identifying Backdoor Data with Optimized Scaled Prediction Consistency
Soumyadeep Pal
Yuguang Yao
Ren Wang
Bingquan Shen
Sijia Liu
AAML
34
8
0
15 Mar 2024
Model X-ray:Detect Backdoored Models via Decision Boundary
Model X-ray:Detect Backdoored Models via Decision Boundary
Yanghao Su
Jie Zhang
Ting Xu
Tianwei Zhang
Weiming Zhang
Neng H. Yu
AAML
31
0
0
27 Feb 2024
Game of Trojans: Adaptive Adversaries Against Output-based
  Trojaned-Model Detectors
Game of Trojans: Adaptive Adversaries Against Output-based Trojaned-Model Detectors
D. Sahabandu
Xiaojun Xu
Arezoo Rajabi
Luyao Niu
Bhaskar Ramasubramanian
Bo Li
Radha Poovendran
AAML
17
1
0
12 Feb 2024
BackdoorBench: A Comprehensive Benchmark and Analysis of Backdoor
  Learning
BackdoorBench: A Comprehensive Benchmark and Analysis of Backdoor Learning
Baoyuan Wu
Hongrui Chen
Mingda Zhang
Zihao Zhu
Shaokui Wei
Danni Yuan
Mingli Zhu
Ruotong Wang
Li Liu
Chaoxiao Shen
AAML
ELM
53
9
0
26 Jan 2024
WPDA: Frequency-based Backdoor Attack with Wavelet Packet Decomposition
WPDA: Frequency-based Backdoor Attack with Wavelet Packet Decomposition
Zhengyao Song
Yongqiang Li
Danni Yuan
Li Liu
Shaokui Wei
Baoyuan Wu
AAML
14
4
0
24 Jan 2024
Progressive Poisoned Data Isolation for Training-time Backdoor Defense
Progressive Poisoned Data Isolation for Training-time Backdoor Defense
Yiming Chen
Haiwei Wu
Jiantao Zhou
AAML
16
9
0
20 Dec 2023
Defenses in Adversarial Machine Learning: A Survey
Defenses in Adversarial Machine Learning: A Survey
Baoyuan Wu
Shaokui Wei
Mingli Zhu
Meixi Zheng
Zihao Zhu
Mingda Zhang
Hongrui Chen
Danni Yuan
Li Liu
Qingshan Liu
AAML
27
14
0
13 Dec 2023
Towards Sample-specific Backdoor Attack with Clean Labels via Attribute Trigger
Towards Sample-specific Backdoor Attack with Clean Labels via Attribute Trigger
Yiming Li
Mingyan Zhu
Junfeng Guo
Tao Wei
Shu-Tao Xia
Zhan Qin
AAML
59
1
0
03 Dec 2023
BadCLIP: Dual-Embedding Guided Backdoor Attack on Multimodal Contrastive
  Learning
BadCLIP: Dual-Embedding Guided Backdoor Attack on Multimodal Contrastive Learning
Siyuan Liang
Mingli Zhu
Aishan Liu
Baoyuan Wu
Xiaochun Cao
Ee-Chien Chang
24
48
0
20 Nov 2023
Label Poisoning is All You Need
Label Poisoning is All You Need
Rishi Jha
J. Hayase
Sewoong Oh
AAML
14
28
0
29 Oct 2023
Domain Watermark: Effective and Harmless Dataset Copyright Protection is
  Closed at Hand
Domain Watermark: Effective and Harmless Dataset Copyright Protection is Closed at Hand
Junfeng Guo
Yiming Li
Lixu Wang
Shu-Tao Xia
Heng-Chiao Huang
Cong Liu
Boheng Li
27
50
0
09 Oct 2023
MASTERKEY: Practical Backdoor Attack Against Speaker Verification
  Systems
MASTERKEY: Practical Backdoor Attack Against Speaker Verification Systems
Hanqing Guo
Xun Chen
Junfeng Guo
Li Xiao
Qiben Yan
13
11
0
13 Sep 2023
PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via
  Split-Second Phoneme Injection
PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection
Hanqing Guo
Guangjing Wang
Yuanda Wang
Bocheng Chen
Qiben Yan
Li Xiao
AAML
15
9
0
13 Sep 2023
BaDExpert: Extracting Backdoor Functionality for Accurate Backdoor Input
  Detection
BaDExpert: Extracting Backdoor Functionality for Accurate Backdoor Input Detection
Tinghao Xie
Xiangyu Qi
Ping He
Yiming Li
Jiachen T. Wang
Prateek Mittal
AAML
11
9
0
23 Aug 2023
What can Discriminator do? Towards Box-free Ownership Verification of
  Generative Adversarial Network
What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Network
Zi-Shun Huang
Boheng Li
Yan Cai
Run Wang
Shangwei Guo
Liming Fang
Jing Chen
Lina Wang
23
11
0
29 Jul 2023
Shared Adversarial Unlearning: Backdoor Mitigation by Unlearning Shared
  Adversarial Examples
Shared Adversarial Unlearning: Backdoor Mitigation by Unlearning Shared Adversarial Examples
Shaokui Wei
Mingda Zhang
H. Zha
Baoyuan Wu
TPM
13
34
0
20 Jul 2023
Towards Stealthy Backdoor Attacks against Speech Recognition via
  Elements of Sound
Towards Stealthy Backdoor Attacks against Speech Recognition via Elements of Sound
Hanbo Cai
Pengcheng Zhang
Hai Dong
Yan Xiao
Stefanos Koffas
Yiming Li
AAML
21
28
0
17 Jul 2023
A Proxy Attack-Free Strategy for Practically Improving the Poisoning
  Efficiency in Backdoor Attacks
A Proxy Attack-Free Strategy for Practically Improving the Poisoning Efficiency in Backdoor Attacks
Ziqiang Li
Hong Sun
Pengfei Xia
Beihao Xia
Xue Rui
Wei Zhang
Qinglang Guo
Bin Li
AAML
25
8
0
14 Jun 2023
Backdoor Attack with Sparse and Invisible Trigger
Backdoor Attack with Sparse and Invisible Trigger
Yinghua Gao
Yiming Li
Xueluan Gong
Zhifeng Li
Shutao Xia
Qianqian Wang
AAML
13
19
0
11 May 2023
Exploring the Landscape of Machine Unlearning: A Comprehensive Survey
  and Taxonomy
Exploring the Landscape of Machine Unlearning: A Comprehensive Survey and Taxonomy
T. Shaik
Xiaohui Tao
Haoran Xie
Lin Li
Xiaofeng Zhu
Qingyuan Li
MU
30
25
0
10 May 2023
12
Next