Backdoor Attack

Can You Hear It? Backdoor Attacks via Ultrasonic Triggers

Authors: Stefanos Koffas, Jing Xu, Mauro Conti, Stjepan Picek | Published: 2021-07-30 | Updated: 2022-03-06
Backdoor Attack
Adversarial attack
Security of Voice Recognition Systems

Accumulative Poisoning Attacks on Real-time Data

Authors: Tianyu Pang, Xiao Yang, Yinpeng Dong, Hang Su, Jun Zhu | Published: 2021-06-18 | Updated: 2021-10-26
Online Learning
Backdoor Attack
Federated Learning

Sleeper Agent: Scalable Hidden Trigger Backdoors for Neural Networks Trained from Scratch

Authors: Hossein Souri, Liam Fowl, Rama Chellappa, Micah Goldblum, Tom Goldstein | Published: 2021-06-16 | Updated: 2022-10-13
Backdoor Attack
Poisoning
Machine Learning

Stealthy Backdoors as Compression Artifacts

Authors: Yulong Tian, Fnu Suya, Fengyuan Xu, David Evans | Published: 2021-04-30
Backdoor Attack
Risks of Model Compression
Vulnerability Analysis

SPECTRE: Defending Against Backdoor Attacks Using Robust Statistics

Authors: Jonathan Hayase, Weihao Kong, Raghav Somani, Sewoong Oh | Published: 2021-04-22
Backdoor Attack
Poisoning
Poisoning Attack

Adversarial Training for Deep Learning-based Intrusion Detection Systems

Authors: Islam Debicha, Thibault Debatty, Jean-Michel Dricot, Wim Mees | Published: 2021-04-20
ML-Based IDS
Backdoor Attack
Adversarial Example

Defending Against Adversarial Denial-of-Service Data Poisoning Attacks

Authors: Nicolas M. Müller, Simon Roschmann, Konstantin Böttinger | Published: 2021-04-14 | Updated: 2021-11-30
Backdoor Attack
Poisoning
Poisoning Attack

Black-box Detection of Backdoor Attacks with Limited Information and Data

Authors: Yinpeng Dong, Xiao Yang, Zhijie Deng, Tianyu Pang, Zihao Xiao, Hang Su, Jun Zhu | Published: 2021-03-24
Backdoor Attack
Optimization Methods
Defense Mechanism

TAD: Trigger Approximation based Black-box Trojan Detection for AI

Authors: Xinqiao Zhang, Huili Chen, Farinaz Koushanfar | Published: 2021-02-03 | Updated: 2021-04-20
Watermarking
Trojan Detection
Backdoor Attack

Fast Training of Provably Robust Neural Networks by SingleProp

Authors: Akhilan Boopathy, Tsui-Wei Weng, Sijia Liu, Pin-Yu Chen, Gaoyuan Zhang, Luca Daniel | Published: 2021-02-01
Backdoor Attack
Model Performance Evaluation
Adversarial Training