Cryptographic Backdoor for Neural Networks: Boon and Bane Authors: Anh Tu Ngo, Anupam Chattopadhyay, Subhamoy Maitra | Published: 2025-09-25 Trigger DetectionBackdoor AttackWatermark Design 2025.09.25 2025.09.27 Literature Database
EIM-TRNG: Obfuscating Deep Neural Network Weights with Encoding-in-Memory True Random Number Generator via RowHammer Authors: Ranyang Zhou, Abeer Matar A. Almalky, Gamana Aragonda, Sabbir Ahmed, Filip Roth Trønnes-Christensen, Adnan Siraj Rakin, Shaahin Angizi | Published: 2025-07-03 DRAMベースのTRNGTrigger DetectionHardware Design 2025.07.03 2025.07.05 Literature Database
ICLShield: Exploring and Mitigating In-Context Learning Backdoor Attacks Authors: Zhiyao Ren, Siyuan Liang, Aishan Liu, Dacheng Tao | Published: 2025-07-02 ICL防御メカニズムTrigger DetectionBackdoor Attack Techniques 2025.07.02 2025.07.04 Literature Database
A Review of Various Datasets for Machine Learning Algorithm-Based Intrusion Detection System: Advances and Challenges Authors: Sudhanshu Sekhar Tripathy, Bichitrananda Behera | Published: 2025-06-03 Trigger DetectionIntrusion Detection SystemAnalysis of Detection Methods 2025.06.03 2025.06.05 Literature Database
Toward Malicious Clients Detection in Federated Learning Authors: Zhihao Dou, Jiaqi Wang, Wei Sun, Zhuqing Liu, Minghong Fang | Published: 2025-05-14 Trigger DetectionPoisoning悪意のあるクライアント検出 2025.05.14 2025.05.28 Literature Database
Bayesian Robust Aggregation for Federated Learning Authors: Aleksandr Karakulev, Usama Zafar, Salman Toor, Prashant Singh | Published: 2025-05-05 Group-Based RobustnessTrigger DetectionAdversarial Learning 2025.05.05 2025.05.27 Literature Database
BackdoorDM: A Comprehensive Benchmark for Backdoor Learning on Diffusion Model Authors: Weilin Lin, Nanjun Zhou, Yanyun Wang, Jianze Li, Hui Xiong, Li Liu | Published: 2025-02-17 | Updated: 2025-07-21 Trigger DetectionBackdoor AttackPerformance Evaluation 2025.02.17 2025.07.23 Literature Database
Chain-of-Scrutiny: Detecting Backdoor Attacks for Large Language Models Authors: Xi Li, Ruofan Mao, Yusen Zhang, Renze Lou, Chen Wu, Jiaqi Wang | Published: 2024-06-10 | Updated: 2025-10-30 Indirect Prompt InjectionTrigger DetectionPrompt leaking 2024.06.10 2025.11.01 Literature Database
LMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors Authors: Chengkun Wei, Wenlong Meng, Zhikun Zhang, Min Chen, Minghu Zhao, Wenjing Fang, Lei Wang, Zihui Zhang, Wenzhi Chen | Published: 2023-08-26 | Updated: 2023-10-14 Trigger DetectionBackdoor DetectionAttack Method 2023.08.26 2025.05.28 Literature Database
WW-FL: Secure and Private Large-Scale Federated Learning Authors: Felix Marx, Thomas Schneider, Ajith Suresh, Tobias Wehrle, Christian Weinert, Hossein Yalame | Published: 2023-02-20 | Updated: 2025-10-14 Trigger DetectionPrivacy Enhancing TechnologyPoisoning 2023.02.20 2025.10.16 Literature Database