LeechHijack: Covert Computational Resource Exploitation in Intelligent Agent Systems Authors: Yuanhe Zhang, Weiliu Wang, Zhenhong Zhou, Kun Wang, Jie Zhang, Li Sun, Yang Liu, Sen Su | Published: 2025-12-02 Indirect Prompt InjectionCybersecurityBackdoor Attack 2025.12.02 2025.12.04 Literature Database
Critical Evaluation of Quantum Machine Learning for Adversarial Robustness Authors: Saeefa Rubaiyet Nowmi, Jesus Lopez, Md Mahmudul Alam Imon, Shahrooz Pouryouse, Mohammad Saidur Rahman | Published: 2025-11-19 Backdoor AttackAdversarial LearningQuantum Machine Learning 2025.11.19 2025.11.21 Literature Database
Dynamic Black-box Backdoor Attacks on IoT Sensory Data Authors: Ajesh Koyatan Chathoth, Stephen Lee | Published: 2025-11-18 Trigger DetectionBackdoor AttackGenerative Model 2025.11.18 2025.11.20 Literature Database
Enhancing All-to-X Backdoor Attacks with Optimized Target Class Mapping Authors: Lei Wang, Yulong Tian, Hao Han, Fengyuan Xu | Published: 2025-11-17 Trigger DetectionBackdoor AttackWatermark Evaluation 2025.11.17 2025.11.19 Literature Database
The ‘Sure’ Trap: Multi-Scale Poisoning Analysis of Stealthy Compliance-Only Backdoors in Fine-Tuned Large Language Models Authors: Yuting Tan, Yi Huang, Zhuo Li | Published: 2025-11-16 Trigger DetectionBackdoor DetectionBackdoor Attack 2025.11.16 2025.11.18 Literature Database
Injection, Attack and Erasure: Revocable Backdoor Attacks via Machine Unlearning Authors: Baogang Song, Dongdong Zhao, Jianwen Xiang, Qiben Xu, Zizhuo Yu | Published: 2025-10-15 Backdoor AttackModel Protection MethodsDefense Mechanism 2025.10.15 2025.10.17 Literature Database
Cryptographic Backdoor for Neural Networks: Boon and Bane Authors: Anh Tu Ngo, Anupam Chattopadhyay, Subhamoy Maitra | Published: 2025-09-25 Trigger DetectionBackdoor AttackWatermark Design 2025.09.25 2025.09.27 Literature Database
Non-omniscient backdoor injection with a single poison sample: Proving the one-poison hypothesis for linear regression and linear classification Authors: Thorsten Peinemann, Paula Arnold, Sebastian Berndt, Thomas Eisenbarth, Esfandiar Mohammadi | Published: 2025-08-07 Backdoor AttackBackdoor Attack TechniquesPoisoning 2025.08.07 2025.08.09 Literature Database
Evasion Attacks Against Bayesian Predictive Models Authors: Pablo G. Arce, Roi Naveiro, David Ríos Insua | Published: 2025-06-11 Backdoor AttackBayesian Adversarial LearningAdversarial Perturbation Techniques 2025.06.11 2025.06.13 Literature Database
Backdoor Cleaning without External Guidance in MLLM Fine-tuning Authors: Xuankun Rong, Wenke Huang, Jian Liang, Jinhe Bi, Xun Xiao, Yiming Li, Bo Du, Mang Ye | Published: 2025-05-22 LLM SecurityBackdoor Attack 2025.05.22 2025.05.28 Literature Database