Backdoor Attack

Practical Detection of Trojan Neural Networks: Data-Limited and Data-Free Cases

Authors: Ren Wang, Gaoyuan Zhang, Sijia Liu, Pin-Yu Chen, Jinjun Xiong, Meng Wang | Published: 2020-07-31
Backdoor Attack
Poisoning
Attack Method

Label-Only Membership Inference Attacks

Authors: Christopher A. Choquette-Choo, Florian Tramer, Nicholas Carlini, Nicolas Papernot | Published: 2020-07-28 | Updated: 2021-12-05
Backdoor Attack
Membership Inference
Attack Method

Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review

Authors: Yansong Gao, Bao Gia Doan, Zhi Zhang, Siqi Ma, Jiliang Zhang, Anmin Fu, Surya Nepal, Hyoungshick Kim | Published: 2020-07-21 | Updated: 2020-08-02
Backdoor Attack
Poisoning
Attack Method

Mitigating backdoor attacks in LSTM-based Text Classification Systems by Backdoor Keyword Identification

Authors: Chuanshuai Chen, Jiazhu Dai | Published: 2020-07-11 | Updated: 2021-03-15
Text Generation Method
Backdoor Attack
Poisoning

Defending against Backdoors in Federated Learning with Robust Learning Rate

Authors: Mustafa Safa Ozdayi, Murat Kantarcioglu, Yulia R. Gel | Published: 2020-07-07 | Updated: 2021-07-29
Backdoor Attack
Adversarial Learning
Defense Mechanism

Model-Targeted Poisoning Attacks with Provable Convergence

Authors: Fnu Suya, Saeed Mahloujifar, Anshuman Suri, David Evans, Yuan Tian | Published: 2020-06-30 | Updated: 2021-04-21
Backdoor Attack
Poisoning
Attack Scenario Analysis

Can We Mitigate Backdoor Attack Using Adversarial Detection Methods?

Authors: Kaidi Jin, Tianwei Zhang, Chao Shen, Yufei Chen, Ming Fan, Chenhao Lin, Ting Liu | Published: 2020-06-26 | Updated: 2022-07-28
Backdoor Attack
Adversarial Example Detection
Adversarial attack

Subpopulation Data Poisoning Attacks

Authors: Matthew Jagielski, Giorgio Severi, Niklas Pousette Harger, Alina Oprea | Published: 2020-06-24 | Updated: 2021-05-12
Backdoor Attack
Poisoning
Poisoning Attack

Backdoor Attacks to Graph Neural Networks

Authors: Zaixi Zhang, Jinyuan Jia, Binghui Wang, Neil Zhenqiang Gong | Published: 2020-06-19 | Updated: 2021-12-17
Backdoor Detection
Backdoor Attack
Defense Method

Backdoor Attacks on Federated Meta-Learning

Authors: Chien-Lun Chen, Leana Golubchik, Marco Paolieri | Published: 2020-06-12 | Updated: 2020-12-16
Backdoor Attack
Poisoning
Federated Learning