Backdoor Attack

LeechHijack: Covert Computational Resource Exploitation in Intelligent Agent Systems

Authors: Yuanhe Zhang, Weiliu Wang, Zhenhong Zhou, Kun Wang, Jie Zhang, Li Sun, Yang Liu, Sen Su | Published: 2025-12-02
Indirect Prompt Injection
Cybersecurity
Backdoor Attack

Critical Evaluation of Quantum Machine Learning for Adversarial Robustness

Authors: Saeefa Rubaiyet Nowmi, Jesus Lopez, Md Mahmudul Alam Imon, Shahrooz Pouryouse, Mohammad Saidur Rahman | Published: 2025-11-19
Backdoor Attack
Adversarial Learning
Quantum Machine Learning

Dynamic Black-box Backdoor Attacks on IoT Sensory Data

Authors: Ajesh Koyatan Chathoth, Stephen Lee | Published: 2025-11-18
Trigger Detection
Backdoor Attack
Generative Model

Enhancing All-to-X Backdoor Attacks with Optimized Target Class Mapping

Authors: Lei Wang, Yulong Tian, Hao Han, Fengyuan Xu | Published: 2025-11-17
Trigger Detection
Backdoor Attack
Watermark Evaluation

The ‘Sure’ Trap: Multi-Scale Poisoning Analysis of Stealthy Compliance-Only Backdoors in Fine-Tuned Large Language Models

Authors: Yuting Tan, Yi Huang, Zhuo Li | Published: 2025-11-16
Trigger Detection
Backdoor Detection
Backdoor Attack

Injection, Attack and Erasure: Revocable Backdoor Attacks via Machine Unlearning

Authors: Baogang Song, Dongdong Zhao, Jianwen Xiang, Qiben Xu, Zizhuo Yu | Published: 2025-10-15
Backdoor Attack
Model Protection Methods
Defense Mechanism

Cryptographic Backdoor for Neural Networks: Boon and Bane

Authors: Anh Tu Ngo, Anupam Chattopadhyay, Subhamoy Maitra | Published: 2025-09-25
Trigger Detection
Backdoor Attack
Watermark Design

Non-omniscient backdoor injection with a single poison sample: Proving the one-poison hypothesis for linear regression and linear classification

Authors: Thorsten Peinemann, Paula Arnold, Sebastian Berndt, Thomas Eisenbarth, Esfandiar Mohammadi | Published: 2025-08-07
Backdoor Attack
Backdoor Attack Techniques
Poisoning

Evasion Attacks Against Bayesian Predictive Models

Authors: Pablo G. Arce, Roi Naveiro, David Ríos Insua | Published: 2025-06-11
Backdoor Attack
Bayesian Adversarial Learning
Adversarial Perturbation Techniques

Backdoor Cleaning without External Guidance in MLLM Fine-tuning

Authors: Xuankun Rong, Wenke Huang, Jian Liang, Jinhe Bi, Xun Xiao, Yiming Li, Bo Du, Mang Ye | Published: 2025-05-22
LLM Security
Backdoor Attack