Detecting AI Trojans Using Meta Neural Analysis Authors: Xiaojun Xu, Qi Wang, Huichen Li, Nikita Borisov, Carl A. Gunter, Bo Li | Published: 2019-10-08 | Updated: 2020-10-01 Backdoor AttackPoisoningAttack Evaluation 2019.10.08 2025.05.28 Literature Database
An Efficient and Margin-Approaching Zero-Confidence Adversarial Attack Authors: Yang Zhang, Shiyu Chang, Mo Yu, Kaizhi Qian | Published: 2019-10-01 Backdoor AttackModel Design and AccuracyAdversarial Attack Methods 2019.10.01 2025.05.28 Literature Database
Hidden Trigger Backdoor Attacks Authors: Aniruddha Saha, Akshayvarun Subramanya, Hamed Pirsiavash | Published: 2019-09-30 | Updated: 2019-12-21 Training Data GenerationBackdoor AttackAdversarial attack 2019.09.30 2025.05.28 Literature Database
Deep k-NN Defense against Clean-label Data Poisoning Attacks Authors: Neehar Peri, Neal Gupta, W. Ronny Huang, Liam Fowl, Chen Zhu, Soheil Feizi, Tom Goldstein, John P. Dickerson | Published: 2019-09-29 | Updated: 2020-08-13 Backdoor AttackPerformance EvaluationDetection of Poisonous Data 2019.09.29 2025.05.28 Literature Database
Detection of Backdoors in Trained Classifiers Without Access to the Training Set Authors: Zhen Xiang, David J. Miller, George Kesidis | Published: 2019-08-27 | Updated: 2020-08-19 Backdoor AttackAttack TypeAdversarial Attack Detection 2019.08.27 2025.05.28 Literature Database
Model Agnostic Defence against Backdoor Attacks in Machine Learning Authors: Sakshi Udeshi, Shanshan Peng, Gerald Woo, Lionell Loh, Louth Rawshan, Sudipta Chattopadhyay | Published: 2019-08-06 | Updated: 2022-03-31 Backdoor AttackAttack EvaluationContent Specialized for Toxicity Attacks 2019.08.06 2025.05.28 Literature Database
Explaining Vulnerabilities to Adversarial Machine Learning through Visual Analytics Authors: Yuxin Ma, Tiankai Xie, Jundong Li, Ross Maciejewski | Published: 2019-07-17 | Updated: 2019-10-03 Backdoor AttackPoisoningAdversarial Attack Methods 2019.07.17 2025.05.28 Literature Database
Poisoning Attacks with Generative Adversarial Nets Authors: Luis Muñoz-González, Bjarne Pfitzner, Matteo Russo, Javier Carnerero-Cano, Emil C. Lupu | Published: 2019-06-18 | Updated: 2019-09-25 Backdoor AttackAttack MethodGenerative Adversarial Network 2019.06.18 2025.05.28 Literature Database
On the Robustness of the Backdoor-based Watermarking in Deep Neural Networks Authors: Masoumeh Shafieinejad, Jiaqi Wang, Nils Lukas, Xinda Li, Florian Kerschbaum | Published: 2019-06-18 | Updated: 2019-11-26 DNN IP Protection MethodBackdoor AttackAttack Method 2019.06.18 2025.05.28 Literature Database
Securing Connected & Autonomous Vehicles: Challenges Posed by Adversarial Machine Learning and The Way Forward Authors: Adnan Qayyum, Muhammad Usama, Junaid Qadir, Ala Al-Fuqaha | Published: 2019-05-29 Backdoor AttackAdversarial ExampleAdversarial Attack Methods 2019.05.29 2025.05.28 Literature Database