Subtract the Corruption: Training-Data-Free Corrective Machine Unlearning using Task Arithmetic Authors: Mostafa Mozafari, Farooq Ahmad Wani, Maria Sofia Bucarelli, Fabrizio Silvestri | Published: 2025-11-24 Trigger DetectionBackdoor DetectionAdaptive Retraining Mechanism 2025.11.24 2025.11.26 Literature Database
Dynamic Black-box Backdoor Attacks on IoT Sensory Data Authors: Ajesh Koyatan Chathoth, Stephen Lee | Published: 2025-11-18 Trigger DetectionBackdoor AttackGenerative Model 2025.11.18 2025.11.20 Literature Database
Robust Client-Server Watermarking for Split Federated Learning Authors: Jiaxiong Tang, Zhengchunmin Dai, Liantao Wu, Peng Sun, Honglong Chen, Zhenfu Cao | Published: 2025-11-17 Trigger DetectionPrivacy TechniqueWatermark Evaluation 2025.11.17 2025.11.19 Literature Database
Enhancing All-to-X Backdoor Attacks with Optimized Target Class Mapping Authors: Lei Wang, Yulong Tian, Hao Han, Fengyuan Xu | Published: 2025-11-17 Trigger DetectionBackdoor AttackWatermark Evaluation 2025.11.17 2025.11.19 Literature Database
The ‘Sure’ Trap: Multi-Scale Poisoning Analysis of Stealthy Compliance-Only Backdoors in Fine-Tuned Large Language Models Authors: Yuting Tan, Yi Huang, Zhuo Li | Published: 2025-11-16 Trigger DetectionBackdoor DetectionBackdoor Attack 2025.11.16 2025.11.18 Literature Database
Toward Efficient Inference Attacks: Shadow Model Sharing via Mixture-of-Experts Authors: Li Bai, Qingqing Ye, Xinwei Zhang, Sen Zhang, Zi Liang, Jianliang Xu, Haibo Hu | Published: 2025-10-15 Trigger DetectionModel Architecture攻撃モデルの訓練 2025.10.15 2025.10.17 Literature Database
Fairness-Constrained Optimization Attack in Federated Learning Authors: Harsh Kasyap, Minghong Fang, Zhuqing Liu, Carsten Maple, Somanath Tripathy | Published: 2025-10-14 Trigger DetectionBiasFederated Learning 2025.10.14 2025.10.16 Literature Database
Cryptographic Backdoor for Neural Networks: Boon and Bane Authors: Anh Tu Ngo, Anupam Chattopadhyay, Subhamoy Maitra | Published: 2025-09-25 Trigger DetectionBackdoor AttackWatermark Design 2025.09.25 2025.09.27 Literature Database
EIM-TRNG: Obfuscating Deep Neural Network Weights with Encoding-in-Memory True Random Number Generator via RowHammer Authors: Ranyang Zhou, Abeer Matar A. Almalky, Gamana Aragonda, Sabbir Ahmed, Filip Roth Trønnes-Christensen, Adnan Siraj Rakin, Shaahin Angizi | Published: 2025-07-03 DRAMベースのTRNGTrigger DetectionHardware Design 2025.07.03 2025.07.05 Literature Database
ICLShield: Exploring and Mitigating In-Context Learning Backdoor Attacks Authors: Zhiyao Ren, Siyuan Liang, Aishan Liu, Dacheng Tao | Published: 2025-07-02 ICL防御メカニズムTrigger DetectionBackdoor Attack Techniques 2025.07.02 2025.07.04 Literature Database