Trigger Detection

EIM-TRNG: Obfuscating Deep Neural Network Weights with Encoding-in-Memory True Random Number Generator via RowHammer

Authors: Ranyang Zhou, Abeer Matar A. Almalky, Gamana Aragonda, Sabbir Ahmed, Filip Roth Trønnes-Christensen, Adnan Siraj Rakin, Shaahin Angizi | Published: 2025-07-03
DRAMベースのTRNG
Trigger Detection
Hardware Design

ICLShield: Exploring and Mitigating In-Context Learning Backdoor Attacks

Authors: Zhiyao Ren, Siyuan Liang, Aishan Liu, Dacheng Tao | Published: 2025-07-02
ICL防御メカニズム
Trigger Detection
Backdoor Attack Techniques

A Review of Various Datasets for Machine Learning Algorithm-Based Intrusion Detection System: Advances and Challenges

Authors: Sudhanshu Sekhar Tripathy, Bichitrananda Behera | Published: 2025-06-03
Trigger Detection
Intrusion Detection System
Analysis of Detection Methods

Toward Malicious Clients Detection in Federated Learning

Authors: Zhihao Dou, Jiaqi Wang, Wei Sun, Zhuqing Liu, Minghong Fang | Published: 2025-05-14
Trigger Detection
Poisoning
悪意のあるクライアント検出

Bayesian Robust Aggregation for Federated Learning

Authors: Aleksandr Karakulev, Usama Zafar, Salman Toor, Prashant Singh | Published: 2025-05-05
Group-Based Robustness
Trigger Detection
Adversarial Learning

BackdoorDM: A Comprehensive Benchmark for Backdoor Learning on Diffusion Model

Authors: Weilin Lin, Nanjun Zhou, Yanyun Wang, Jianze Li, Hui Xiong, Li Liu | Published: 2025-02-17 | Updated: 2025-07-21
Trigger Detection
Backdoor Attack
Performance Evaluation

LMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors

Authors: Chengkun Wei, Wenlong Meng, Zhikun Zhang, Min Chen, Minghu Zhao, Wenjing Fang, Lei Wang, Zihui Zhang, Wenzhi Chen | Published: 2023-08-26 | Updated: 2023-10-14
Trigger Detection
Backdoor Detection
Attack Method

ONION: A Simple and Effective Defense Against Textual Backdoor Attacks

Authors: Fanchao Qi, Yangyi Chen, Mukai Li, Yuan Yao, Zhiyuan Liu, Maosong Sun | Published: 2020-11-20 | Updated: 2021-11-03
Text Perturbation Method
Trigger Detection
Backdoor Detection

Eternal Sunshine of the Spotless Net: Selective Forgetting in Deep Networks

Authors: Aditya Golatkar, Alessandro Achille, Stefano Soatto | Published: 2019-11-12 | Updated: 2020-03-31
Trigger Detection
Machine learning
Information Security

Februus: Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems

Authors: Bao Gia Doan, Ehsan Abbasnejad, Damith C. Ranasinghe | Published: 2019-08-09 | Updated: 2020-09-28
Trigger Detection
Trojan Detection
Backdoor Detection