Transferring Backdoors between Large Language Models by Knowledge Distillation Authors: Pengzhou Cheng, Zongru Wu, Tianjie Ju, Wei Du, Zhuosheng Zhang Gongshen Liu | Published: 2024-08-19 LLM SecurityBackdoor AttackPoisoning 2024.08.19 2025.05.27 Literature Database
Compromising Embodied Agents with Contextual Backdoor Attacks Authors: Aishan Liu, Yuguang Zhou, Xianglong Liu, Tianyuan Zhang, Siyuan Liang, Jiakai Wang, Yanjun Pu, Tianlin Li, Junqi Zhang, Wenbo Zhou, Qing Guo, Dacheng Tao | Published: 2024-08-06 Backdoor AttackPrompt Injection 2024.08.06 2025.05.27 Literature Database
Provable Robustness of (Graph) Neural Networks Against Data Poisoning and Backdoor Attacks Authors: Lukas Gosch, Mahalakshmi Sabanayagam, Debarghya Ghoshdastidar, Stephan Günnemann | Published: 2024-07-15 | Updated: 2024-10-14 Backdoor AttackPoisoningOptimization Problem 2024.07.15 2025.05.27 Literature Database
Model-agnostic clean-label backdoor mitigation in cybersecurity environments Authors: Giorgio Severi, Simona Boboila, John Holodnak, Kendra Kratkiewicz, Rauf Izmailov, Michael J. De Lucia, Alina Oprea | Published: 2024-07-11 | Updated: 2025-05-05 Backdoor DetectionBackdoor AttackDefense Mechanism 2024.07.11 2025.05.27 Literature Database
CleanGen: Mitigating Backdoor Attacks for Generation Tasks in Large Language Models Authors: Yuetai Li, Zhangchen Xu, Fengqing Jiang, Luyao Niu, Dinuka Sahabandu, Bhaskar Ramasubramanian, Radha Poovendran | Published: 2024-06-18 | Updated: 2025-03-27 LLM SecurityBackdoor AttackPrompt Injection 2024.06.18 2025.05.27 Literature Database
Trading Devil: Robust backdoor attack via Stochastic investment models and Bayesian approach Authors: Orson Mengara | Published: 2024-06-15 | Updated: 2024-09-16 Backdoor AttackFinancial Intelligence 2024.06.15 2025.05.27 Literature Database
RMF: A Risk Measurement Framework for Machine Learning Models Authors: Jan Schröder, Jakub Breier | Published: 2024-06-15 Backdoor AttackPoisoningRisk Management 2024.06.15 2025.05.27 Literature Database
A Study of Backdoors in Instruction Fine-tuned Language Models Authors: Jayaram Raghuram, George Kesidis, David J. Miller | Published: 2024-06-12 | Updated: 2024-08-21 LLM SecurityBackdoor AttackDefense Method 2024.06.12 2025.05.27 Literature Database
A Survey of Recent Backdoor Attacks and Defenses in Large Language Models Authors: Shuai Zhao, Meihuizi Jia, Zhongliang Guo, Leilei Gan, Xiaoyu Xu, Xiaobao Wu, Jie Fu, Yichao Feng, Fengjun Pan, Luu Anh Tuan | Published: 2024-06-10 | Updated: 2025-01-04 LLM SecurityBackdoor Attack 2024.06.10 2025.05.27 Literature Database
An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection Authors: Shenao Yan, Shen Wang, Yue Duan, Hanbin Hong, Kiho Lee, Doowon Kim, Yuan Hong | Published: 2024-06-10 LLM SecurityBackdoor AttackPrompt Injection 2024.06.10 2025.05.27 Literature Database