Backdoor Cleaning without External Guidance in MLLM Fine-tuning Authors: Xuankun Rong, Wenke Huang, Jian Liang, Jinhe Bi, Xun Xiao, Yiming Li, Bo Du, Mang Ye | Published: 2025-05-22 LLM SecurityBackdoor Attack 2025.05.22 2025.05.28 Literature Database
Finetuning-Activated Backdoors in LLMs Authors: Thibaud Gloaguen, Mark Vero, Robin Staab, Martin Vechev | Published: 2025-05-22 LLM SecurityBackdoor AttackPrompt Injection 2025.05.22 2025.05.28 Literature Database
Analysis of the vulnerability of machine learning regression models to adversarial attacks using data from 5G wireless networks Authors: Leonid Legashev, Artur Zhigalov, Denis Parfenov | Published: 2025-05-01 Backdoor AttackPoisoningAttack Type 2025.05.01 2025.05.27 Literature Database
How to Backdoor the Knowledge Distillation Authors: Chen Wu, Qian Ma, Prasenjit Mitra, Sencun Zhu | Published: 2025-04-30 Backdoor AttackAdversarial LearningVulnerabilities of Knowledge Distillation 2025.04.30 2025.05.27 Literature Database
BadToken: Token-level Backdoor Attacks to Multi-modal Large Language Models Authors: Zenghui Yuan, Jiawen Shi, Pan Zhou, Neil Zhenqiang Gong, Lichao Sun | Published: 2025-03-20 Backdoor AttackPrompt InjectionLarge Language Model 2025.03.20 2025.05.27 Literature Database
Trust Under Siege: Label Spoofing Attacks against Machine Learning for Android Malware Detection Authors: Tianwei Lan, Luca Demetrio, Farid Nait-Abdesselam, Yufei Han, Simone Aonzo | Published: 2025-03-14 Backdoor AttackLabelAttack Method 2025.03.14 2025.05.27 Literature Database
ToxicSQL: Migrating SQL Injection Threats into Text-to-SQL Models via Backdoor Attack Authors: Meiyu Lin, Haichuan Zhang, Jiale Lao, Renyuan Li, Yuanchun Zhou, Carl Yang, Yang Cao, Mingjie Tang | Published: 2025-03-07 | Updated: 2025-04-03 Backdoor DetectionBackdoor AttackModel Performance Evaluation 2025.03.07 2025.05.27 Literature Database
Provably effective detection of effective data poisoning attacks Authors: Jonathan Gallagher, Yasaman Esfandiari, Callen MacPhee, Michael Warren | Published: 2025-01-21 Backdoor AttackPoisoningExperimental Validation 2025.01.21 2025.05.27 Literature Database
BADTV: Unveiling Backdoor Threats in Third-Party Task Vectors Authors: Chia-Yi Hsu, Yu-Lin Tsai, Yu Zhe, Yan-Lun Chen, Chih-Hsun Lin, Chia-Mu Yu, Yang Zhang, Chun-Ying Huang, Jun Sakuma | Published: 2025-01-04 Backdoor AttackDefense Method 2025.01.04 2025.05.27 Literature Database
Mingling with the Good to Backdoor Federated Learning Authors: Nuno Neves | Published: 2025-01-03 Backdoor AttackPoisoning 2025.01.03 2025.05.27 Literature Database