Backdoor Attack

On the Vulnerability of Deep Automatic Modulation Classifiers to Explainable Backdoor Threats

Authors: Younes Salmi, Hanna Bogucka | Published: 2026-03-26
データ毒性
Backdoor Attack
Attackers and Malicious Devices

Physical Backdoor Attack Against Deep Learning-Based Modulation Classification

Authors: Younes Salmi, Hanna Bogucka | Published: 2026-03-26
データ毒性
Backdoor Detection
Backdoor Attack

Detecting and Eliminating Neural Network Backdoors Through Active Paths with Application to Intrusion Detection

Authors: Eirik Høyheim, Magnus Wiik Eckhoff, Gudmund Grov, Robert Flood, David Aspinall | Published: 2026-03-11
データ毒性
Backdoor Attack
Evaluation Method

Hardware-Triggered Backdoors

Authors: Jonas Möller, Erik Imgrund, Thorsten Eisenhofer, Konrad Rieck | Published: 2026-01-29
ハードウェアトリガー型バックドア
Backdoor Attack
数値的偏差

IoT-based Android Malware Detection Using Graph Neural Network With Adversarial Defense

Authors: Rahul Yumlembam, Biju Issac, Seibu Mary Jacob, Longzhi Yang | Published: 2025-12-23
Backdoor Attack
Poisoning
Generative Model

Behavior-Aware and Generalizable Defense Against Black-Box Adversarial Attacks for ML-Based IDS

Authors: Sabrine Ennaji, Elhadj Benkhelifa, Luigi Vincenzo Mancini | Published: 2025-12-15
Backdoor Attack
Anomaly Detection Method
Vulnerability Assessment Method

LeechHijack: Covert Computational Resource Exploitation in Intelligent Agent Systems

Authors: Yuanhe Zhang, Weiliu Wang, Zhenhong Zhou, Kun Wang, Jie Zhang, Li Sun, Yang Liu, Sen Su | Published: 2025-12-02
Indirect Prompt Injection
Cybersecurity
Backdoor Attack

Critical Evaluation of Quantum Machine Learning for Adversarial Robustness

Authors: Saeefa Rubaiyet Nowmi, Jesus Lopez, Md Mahmudul Alam Imon, Shahrooz Pouryouse, Mohammad Saidur Rahman | Published: 2025-11-19
Backdoor Attack
Adversarial Learning
Quantum Machine Learning

Dynamic Black-box Backdoor Attacks on IoT Sensory Data

Authors: Ajesh Koyatan Chathoth, Stephen Lee | Published: 2025-11-18
Trigger Detection
Backdoor Attack
Generative Model

Enhancing All-to-X Backdoor Attacks with Optimized Target Class Mapping

Authors: Lei Wang, Yulong Tian, Hao Han, Fengyuan Xu | Published: 2025-11-17
Trigger Detection
Backdoor Attack
Watermark Evaluation