Injection, Attack and Erasure: Revocable Backdoor Attacks via Machine Unlearning Authors: Baogang Song, Dongdong Zhao, Jianwen Xiang, Qiben Xu, Zizhuo Yu | Published: 2025-10-15 Backdoor AttackModel Protection MethodsDefense Mechanism 2025.10.15 2025.10.17 Literature Database
Cryptographic Backdoor for Neural Networks: Boon and Bane Authors: Anh Tu Ngo, Anupam Chattopadhyay, Subhamoy Maitra | Published: 2025-09-25 Trigger DetectionBackdoor AttackWatermark Design 2025.09.25 2025.09.27 Literature Database
Non-omniscient backdoor injection with a single poison sample: Proving the one-poison hypothesis for linear regression and linear classification Authors: Thorsten Peinemann, Paula Arnold, Sebastian Berndt, Thomas Eisenbarth, Esfandiar Mohammadi | Published: 2025-08-07 Backdoor AttackBackdoor Attack TechniquesPoisoning 2025.08.07 2025.08.09 Literature Database
Evasion Attacks Against Bayesian Predictive Models Authors: Pablo G. Arce, Roi Naveiro, David Ríos Insua | Published: 2025-06-11 Backdoor AttackBayesian Adversarial LearningAdversarial Perturbation Techniques 2025.06.11 2025.06.13 Literature Database
Backdoor Cleaning without External Guidance in MLLM Fine-tuning Authors: Xuankun Rong, Wenke Huang, Jian Liang, Jinhe Bi, Xun Xiao, Yiming Li, Bo Du, Mang Ye | Published: 2025-05-22 LLM SecurityBackdoor Attack 2025.05.22 2025.05.28 Literature Database
Finetuning-Activated Backdoors in LLMs Authors: Thibaud Gloaguen, Mark Vero, Robin Staab, Martin Vechev | Published: 2025-05-22 LLM SecurityBackdoor AttackPrompt Injection 2025.05.22 2025.05.28 Literature Database
Analysis of the vulnerability of machine learning regression models to adversarial attacks using data from 5G wireless networks Authors: Leonid Legashev, Artur Zhigalov, Denis Parfenov | Published: 2025-05-01 Backdoor AttackPoisoningAttack Type 2025.05.01 2025.05.27 Literature Database
How to Backdoor the Knowledge Distillation Authors: Chen Wu, Qian Ma, Prasenjit Mitra, Sencun Zhu | Published: 2025-04-30 Backdoor AttackAdversarial LearningVulnerabilities of Knowledge Distillation 2025.04.30 2025.05.27 Literature Database
Detecting Instruction Fine-tuning Attacks on Language Models using Influence Function Authors: Jiawei Li | Published: 2025-04-12 | Updated: 2025-09-30 Backdoor AttackPrompt validationSentiment Analysis 2025.04.12 2025.10.02 Literature Database
BadToken: Token-level Backdoor Attacks to Multi-modal Large Language Models Authors: Zenghui Yuan, Jiawen Shi, Pan Zhou, Neil Zhenqiang Gong, Lichao Sun | Published: 2025-03-20 Backdoor AttackPrompt InjectionLarge Language Model 2025.03.20 2025.05.27 Literature Database