LMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors Authors: Chengkun Wei, Wenlong Meng, Zhikun Zhang, Min Chen, Minghu Zhao, Wenjing Fang, Lei Wang, Zihui Zhang, Wenzhi Chen | Published: 2023-08-26 | Updated: 2023-10-14 Trigger DetectionBackdoor DetectionAttack Method 2023.08.26 2025.05.28 Literature Database
T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based Text Classification Authors: Ahmadreza Azizi, Ibrahim Asadullah Tahmid, Asim Waheed, Neal Mangaokar, Jiameng Pu, Mobin Javed, Chandan K. Reddy, Bimal Viswanath | Published: 2021-03-07 | Updated: 2021-03-11 Text Perturbation MethodBackdoor DetectionAttack Method 2021.03.07 2025.05.28 Literature Database
ONION: A Simple and Effective Defense Against Textual Backdoor Attacks Authors: Fanchao Qi, Yangyi Chen, Mukai Li, Yuan Yao, Zhiyuan Liu, Maosong Sun | Published: 2020-11-20 | Updated: 2021-11-03 Text Perturbation MethodTrigger DetectionBackdoor Detection 2020.11.20 2025.05.28 Literature Database
Backdoor Attacks to Graph Neural Networks Authors: Zaixi Zhang, Jinyuan Jia, Binghui Wang, Neil Zhenqiang Gong | Published: 2020-06-19 | Updated: 2021-12-17 Backdoor DetectionBackdoor AttackDefense Method 2020.06.19 2025.05.28 Literature Database
Februus: Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems Authors: Bao Gia Doan, Ehsan Abbasnejad, Damith C. Ranasinghe | Published: 2019-08-09 | Updated: 2020-09-28 Trigger DetectionTrojan DetectionBackdoor Detection 2019.08.09 2025.05.28 Literature Database
Supervised Machine Learning Techniques for Trojan Detection with Ring Oscillator Network Authors: Kyle Worley, Md Tauhidur Rahman | Published: 2019-03-12 Hardware SecurityBackdoor DetectionMulti-Class Classification 2019.03.12 2025.05.28 Literature Database
Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with Adversarial Traces Authors: Mohammad Saidur Rahman, Mohsen Imani, Nate Mathews, Matthew Wright | Published: 2019-02-18 | Updated: 2020-10-28 Backdoor DetectionAdversarial ExampleAdversarial Attack Methods 2019.02.18 2025.05.28 Literature Database
STRIP: A Defence Against Trojan Attacks on Deep Neural Networks Authors: Yansong Gao, Chang Xu, Derui Wang, Shiping Chen, Damith C. Ranasinghe, Surya Nepal | Published: 2019-02-18 | Updated: 2020-01-17 Trigger DetectionTrojan DetectionBackdoor Detection 2019.02.18 2025.05.28 Literature Database
Disguised-Nets: Image Disguising for Privacy-preserving Outsourced Deep Learning Authors: Sagar Sharma, Keke Chen | Published: 2019-02-05 | Updated: 2019-04-19 Backdoor DetectionDetection of Model Extraction AttacksVisual Privacy 2019.02.05 2025.05.28 Literature Database
Towards resilient machine learning for ransomware detection Authors: Li Chen, Chih-Yuan Yang, Anindya Paul, Ravi Sahita | Published: 2018-12-21 | Updated: 2019-05-16 Backdoor DetectionMalware Detection MethodGenerative Adversarial Network 2018.12.21 2025.05.28 Literature Database