Can You Hear It? Backdoor Attacks via Ultrasonic Triggers Authors: Stefanos Koffas, Jing Xu, Mauro Conti, Stjepan Picek | Published: 2021-07-30 | Updated: 2022-03-06 Backdoor AttackAdversarial attackSecurity of Voice Recognition Systems 2021.07.30 2025.05.28 Literature Database
Accumulative Poisoning Attacks on Real-time Data Authors: Tianyu Pang, Xiao Yang, Yinpeng Dong, Hang Su, Jun Zhu | Published: 2021-06-18 | Updated: 2021-10-26 Online LearningBackdoor AttackFederated Learning 2021.06.18 2025.05.28 Literature Database
Sleeper Agent: Scalable Hidden Trigger Backdoors for Neural Networks Trained from Scratch Authors: Hossein Souri, Liam Fowl, Rama Chellappa, Micah Goldblum, Tom Goldstein | Published: 2021-06-16 | Updated: 2022-10-13 Backdoor AttackPoisoningMachine Learning 2021.06.16 2025.05.28 Literature Database
Stealthy Backdoors as Compression Artifacts Authors: Yulong Tian, Fnu Suya, Fengyuan Xu, David Evans | Published: 2021-04-30 Backdoor AttackRisks of Model CompressionVulnerability Analysis 2021.04.30 2025.05.28 Literature Database
SPECTRE: Defending Against Backdoor Attacks Using Robust Statistics Authors: Jonathan Hayase, Weihao Kong, Raghav Somani, Sewoong Oh | Published: 2021-04-22 Backdoor AttackPoisoningPoisoning Attack 2021.04.22 2025.05.28 Literature Database
Adversarial Training for Deep Learning-based Intrusion Detection Systems Authors: Islam Debicha, Thibault Debatty, Jean-Michel Dricot, Wim Mees | Published: 2021-04-20 ML-Based IDSBackdoor AttackAdversarial Example 2021.04.20 2025.05.28 Literature Database
Defending Against Adversarial Denial-of-Service Data Poisoning Attacks Authors: Nicolas M. Müller, Simon Roschmann, Konstantin Böttinger | Published: 2021-04-14 | Updated: 2021-11-30 Backdoor AttackPoisoningPoisoning Attack 2021.04.14 2025.05.28 Literature Database
Black-box Detection of Backdoor Attacks with Limited Information and Data Authors: Yinpeng Dong, Xiao Yang, Zhijie Deng, Tianyu Pang, Zihao Xiao, Hang Su, Jun Zhu | Published: 2021-03-24 Backdoor AttackOptimization MethodsDefense Mechanism 2021.03.24 2025.05.28 Literature Database
TAD: Trigger Approximation based Black-box Trojan Detection for AI Authors: Xinqiao Zhang, Huili Chen, Farinaz Koushanfar | Published: 2021-02-03 | Updated: 2021-04-20 WatermarkingTrojan DetectionBackdoor Attack 2021.02.03 2025.05.28 Literature Database
Fast Training of Provably Robust Neural Networks by SingleProp Authors: Akhilan Boopathy, Tsui-Wei Weng, Sijia Liu, Pin-Yu Chen, Gaoyuan Zhang, Luca Daniel | Published: 2021-02-01 Backdoor AttackModel Performance EvaluationAdversarial Training 2021.02.01 2025.05.28 Literature Database