On the Vulnerability of Deep Automatic Modulation Classifiers to Explainable Backdoor Threats Authors: Younes Salmi, Hanna Bogucka | Published: 2026-03-26 データ毒性Backdoor AttackAttackers and Malicious Devices 2026.03.26 2026.03.28 Literature Database
Physical Backdoor Attack Against Deep Learning-Based Modulation Classification Authors: Younes Salmi, Hanna Bogucka | Published: 2026-03-26 データ毒性Backdoor DetectionBackdoor Attack 2026.03.26 2026.03.28 Literature Database
Detecting and Eliminating Neural Network Backdoors Through Active Paths with Application to Intrusion Detection Authors: Eirik Høyheim, Magnus Wiik Eckhoff, Gudmund Grov, Robert Flood, David Aspinall | Published: 2026-03-11 データ毒性Backdoor AttackEvaluation Method 2026.03.11 2026.03.13 Literature Database
Hardware-Triggered Backdoors Authors: Jonas Möller, Erik Imgrund, Thorsten Eisenhofer, Konrad Rieck | Published: 2026-01-29 ハードウェアトリガー型バックドアBackdoor Attack数値的偏差 2026.01.29 2026.01.31 Literature Database
IoT-based Android Malware Detection Using Graph Neural Network With Adversarial Defense Authors: Rahul Yumlembam, Biju Issac, Seibu Mary Jacob, Longzhi Yang | Published: 2025-12-23 Backdoor AttackPoisoningGenerative Model 2025.12.23 2025.12.25 Literature Database
Behavior-Aware and Generalizable Defense Against Black-Box Adversarial Attacks for ML-Based IDS Authors: Sabrine Ennaji, Elhadj Benkhelifa, Luigi Vincenzo Mancini | Published: 2025-12-15 Backdoor AttackAnomaly Detection MethodVulnerability Assessment Method 2025.12.15 2025.12.17 Literature Database
LeechHijack: Covert Computational Resource Exploitation in Intelligent Agent Systems Authors: Yuanhe Zhang, Weiliu Wang, Zhenhong Zhou, Kun Wang, Jie Zhang, Li Sun, Yang Liu, Sen Su | Published: 2025-12-02 Indirect Prompt InjectionCybersecurityBackdoor Attack 2025.12.02 2025.12.04 Literature Database
Critical Evaluation of Quantum Machine Learning for Adversarial Robustness Authors: Saeefa Rubaiyet Nowmi, Jesus Lopez, Md Mahmudul Alam Imon, Shahrooz Pouryouse, Mohammad Saidur Rahman | Published: 2025-11-19 Backdoor AttackAdversarial LearningQuantum Machine Learning 2025.11.19 2025.11.21 Literature Database
Dynamic Black-box Backdoor Attacks on IoT Sensory Data Authors: Ajesh Koyatan Chathoth, Stephen Lee | Published: 2025-11-18 Trigger DetectionBackdoor AttackGenerative Model 2025.11.18 2025.11.20 Literature Database
Enhancing All-to-X Backdoor Attacks with Optimized Target Class Mapping Authors: Lei Wang, Yulong Tian, Hao Han, Fengyuan Xu | Published: 2025-11-17 Trigger DetectionBackdoor AttackWatermark Evaluation 2025.11.17 2025.11.19 Literature Database