Backdoor Detection

T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based Text Classification

Authors: Ahmadreza Azizi, Ibrahim Asadullah Tahmid, Asim Waheed, Neal Mangaokar, Jiameng Pu, Mobin Javed, Chandan K. Reddy, Bimal Viswanath | Published: 2021-03-07 | Updated: 2021-03-11
Text Perturbation Method
Backdoor Detection
Attack Method

ONION: A Simple and Effective Defense Against Textual Backdoor Attacks

Authors: Fanchao Qi, Yangyi Chen, Mukai Li, Yuan Yao, Zhiyuan Liu, Maosong Sun | Published: 2020-11-20 | Updated: 2021-11-03
Text Perturbation Method
Trigger Detection
Backdoor Detection

Backdoor Attacks to Graph Neural Networks

Authors: Zaixi Zhang, Jinyuan Jia, Binghui Wang, Neil Zhenqiang Gong | Published: 2020-06-19 | Updated: 2021-12-17
Backdoor Detection
Backdoor Attack
Defense Method

Februus: Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems

Authors: Bao Gia Doan, Ehsan Abbasnejad, Damith C. Ranasinghe | Published: 2019-08-09 | Updated: 2020-09-28
Trigger Detection
Trojan Detection
Backdoor Detection

Supervised Machine Learning Techniques for Trojan Detection with Ring Oscillator Network

Authors: Kyle Worley, Md Tauhidur Rahman | Published: 2019-03-12
Hardware Security
Backdoor Detection
Multi-Class Classification

Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with Adversarial Traces

Authors: Mohammad Saidur Rahman, Mohsen Imani, Nate Mathews, Matthew Wright | Published: 2019-02-18 | Updated: 2020-10-28
Backdoor Detection
Adversarial Example
Adversarial Attack Methods

STRIP: A Defence Against Trojan Attacks on Deep Neural Networks

Authors: Yansong Gao, Chang Xu, Derui Wang, Shiping Chen, Damith C. Ranasinghe, Surya Nepal | Published: 2019-02-18 | Updated: 2020-01-17
Trigger Detection
Trojan Detection
Backdoor Detection

Disguised-Nets: Image Disguising for Privacy-preserving Outsourced Deep Learning

Authors: Sagar Sharma, Keke Chen | Published: 2019-02-05 | Updated: 2019-04-19
Backdoor Detection
Detection of Model Extraction Attacks
Visual Privacy

Towards resilient machine learning for ransomware detection

Authors: Li Chen, Chih-Yuan Yang, Anindya Paul, Ravi Sahita | Published: 2018-12-21 | Updated: 2019-05-16
Backdoor Detection
Malware Detection Method
Generative Adversarial Network

A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks

Authors: Jinghui Chen, Dongruo Zhou, Jinfeng Yi, Quanquan Gu | Published: 2018-11-27 | Updated: 2019-09-15
Backdoor Detection
Model Performance Evaluation
Selection and Evaluation of Optimization Algorithms