Unlearning Backdoor Attacks for LLMs with Weak-to-Strong Knowledge Distillation Authors: Shuai Zhao, Xiaobao Wu, Cong-Duy Nguyen, Yanhao Jia, Meihuizi Jia, Yichao Feng, Luu Anh Tuan | Published: 2024-10-18 | Updated: 2025-05-20 Backdoor DetectionBackdoor Attack TechniquesKnowledge Distillation 2024.10.18 2025.05.28 Literature Database
Infighting in the Dark: Multi-Label Backdoor Attack in Federated Learning Authors: Ye Li, Yanchao Zhao, Chengcheng Zhu, Jiale Zhang | Published: 2024-09-29 | Updated: 2025-03-22 ID Mapping ConstructionBackdoor DetectionAdversarial attack 2024.09.29 2025.05.27 Literature Database
Model-agnostic clean-label backdoor mitigation in cybersecurity environments Authors: Giorgio Severi, Simona Boboila, John Holodnak, Kendra Kratkiewicz, Rauf Izmailov, Michael J. De Lucia, Alina Oprea | Published: 2024-07-11 | Updated: 2025-05-05 Backdoor DetectionBackdoor AttackDefense Mechanism 2024.07.11 2025.05.27 Literature Database
Defending Against Weight-Poisoning Backdoor Attacks for Parameter-Efficient Fine-Tuning Authors: Shuai Zhao, Leilei Gan, Luu Anh Tuan, Jie Fu, Lingjuan Lyu, Meihuizi Jia, Jinming Wen | Published: 2024-02-19 | Updated: 2024-03-29 Backdoor DetectionAttack MethodDefense Method 2024.02.19 2025.05.27 Literature Database
LMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors Authors: Chengkun Wei, Wenlong Meng, Zhikun Zhang, Min Chen, Minghu Zhao, Wenjing Fang, Lei Wang, Zihui Zhang, Wenzhi Chen | Published: 2023-08-26 | Updated: 2023-10-14 Trigger DetectionBackdoor DetectionAttack Method 2023.08.26 2025.05.28 Literature Database
T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based Text Classification Authors: Ahmadreza Azizi, Ibrahim Asadullah Tahmid, Asim Waheed, Neal Mangaokar, Jiameng Pu, Mobin Javed, Chandan K. Reddy, Bimal Viswanath | Published: 2021-03-07 | Updated: 2021-03-11 Text Perturbation MethodBackdoor DetectionAttack Method 2021.03.07 2025.05.28 Literature Database
ONION: A Simple and Effective Defense Against Textual Backdoor Attacks Authors: Fanchao Qi, Yangyi Chen, Mukai Li, Yuan Yao, Zhiyuan Liu, Maosong Sun | Published: 2020-11-20 | Updated: 2021-11-03 Text Perturbation MethodTrigger DetectionBackdoor Detection 2020.11.20 2025.05.28 Literature Database
Backdoor Attacks to Graph Neural Networks Authors: Zaixi Zhang, Jinyuan Jia, Binghui Wang, Neil Zhenqiang Gong | Published: 2020-06-19 | Updated: 2021-12-17 Backdoor DetectionBackdoor AttackDefense Method 2020.06.19 2025.05.28 Literature Database
Februus: Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems Authors: Bao Gia Doan, Ehsan Abbasnejad, Damith C. Ranasinghe | Published: 2019-08-09 | Updated: 2020-09-28 Trigger DetectionTrojan DetectionBackdoor Detection 2019.08.09 2025.05.28 Literature Database
Supervised Machine Learning Techniques for Trojan Detection with Ring Oscillator Network Authors: Kyle Worley, Md Tauhidur Rahman | Published: 2019-03-12 Hardware SecurityBackdoor DetectionMulti-Class Classification 2019.03.12 2025.05.28 Literature Database