Trust Under Siege: Label Spoofing Attacks against Machine Learning for Android Malware Detection Authors: Tianwei Lan, Luca Demetrio, Farid Nait-Abdesselam, Yufei Han, Simone Aonzo | Published: 2025-03-14 Backdoor AttackLabelAttack Method 2025.03.14 2025.05.27 Literature Database
ToxicSQL: Migrating SQL Injection Threats into Text-to-SQL Models via Backdoor Attack Authors: Meiyu Lin, Haichuan Zhang, Jiale Lao, Renyuan Li, Yuanchun Zhou, Carl Yang, Yang Cao, Mingjie Tang | Published: 2025-03-07 | Updated: 2025-04-03 Backdoor DetectionBackdoor AttackModel Performance Evaluation 2025.03.07 2025.05.27 Literature Database
Steering Dialogue Dynamics for Robustness against Multi-turn Jailbreaking Attacks Authors: Hanjiang Hu, Alexander Robey, Changliu Liu | Published: 2025-02-28 | Updated: 2025-08-25 Backdoor AttackPrompt InjectionWatermark 2025.02.28 2025.08.27 Literature Database
BackdoorDM: A Comprehensive Benchmark for Backdoor Learning on Diffusion Model Authors: Weilin Lin, Nanjun Zhou, Yanyun Wang, Jianze Li, Hui Xiong, Li Liu | Published: 2025-02-17 | Updated: 2025-07-21 Trigger DetectionBackdoor AttackPerformance Evaluation 2025.02.17 2025.07.23 Literature Database
Provably effective detection of effective data poisoning attacks Authors: Jonathan Gallagher, Yasaman Esfandiari, Callen MacPhee, Michael Warren | Published: 2025-01-21 Backdoor AttackPoisoningExperimental Validation 2025.01.21 2025.05.27 Literature Database
BADTV: Unveiling Backdoor Threats in Third-Party Task Vectors Authors: Chia-Yi Hsu, Yu-Lin Tsai, Yu Zhe, Yan-Lun Chen, Chih-Hsun Lin, Chia-Mu Yu, Yang Zhang, Chun-Ying Huang, Jun Sakuma | Published: 2025-01-04 Backdoor AttackDefense Method 2025.01.04 2025.05.27 Literature Database
Mingling with the Good to Backdoor Federated Learning Authors: Nuno Neves | Published: 2025-01-03 Backdoor AttackPoisoning 2025.01.03 2025.05.27 Literature Database
HoneypotNet: Backdoor Attacks Against Model Extraction Authors: Yixu Wang, Tianle Gu, Yan Teng, Yingchun Wang, Xingjun Ma | Published: 2025-01-02 Backdoor AttackModel Extraction Attack 2025.01.02 2025.05.27 Literature Database
CL-Attack: Textual Backdoor Attacks via Cross-Lingual Triggers Authors: Jingyi Zheng, Tianyi Hu, Tianshuo Cong, Xinlei He | Published: 2024-12-26 | Updated: 2025-03-31 LLM SecurityBackdoor AttackVulnerability of Adversarial Examples 2024.12.26 2025.05.27 Literature Database
A Backdoor Attack Scheme with Invisible Triggers Based on Model Architecture Modification Authors: Yuan Ma, Xu Ma, Jiankang Wei, Jinmeng Tang, Xiaoyu Zhang, Yilun Lyu, Kehao Chen, Jingtong Huang | Published: 2024-12-22 | Updated: 2025-01-06 Backdoor AttackPoisoning 2024.12.22 2025.05.27 Literature Database