Backdoor Attack

Backdoors in Neural Models of Source Code

Authors: Goutham Ramakrishnan, Aws Albarghouthi | Published: 2020-06-11
Backdoor Attack
Program Analysis
Poisoning

Backdoor Smoothing: Demystifying Backdoor Attacks on Deep Neural Networks

Authors: Kathrin Grosse, Taesung Lee, Battista Biggio, Youngja Park, Michael Backes, Ian Molloy | Published: 2020-06-11 | Updated: 2021-11-02
Backdoor Attack
Performance Evaluation
Attack Scenario Analysis

Bullseye Polytope: A Scalable Clean-Label Poisoning Attack with Improved Transferability

Authors: Hojjat Aghakhani, Dongyu Meng, Yu-Xiang Wang, Christopher Kruegel, Giovanni Vigna | Published: 2020-05-01 | Updated: 2021-03-14
Backdoor Attack
Poisoning
Defense Effectiveness Analysis

Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness

Authors: Pu Zhao, Pin-Yu Chen, Payel Das, Karthikeyan Natesan Ramamurthy, Xue Lin | Published: 2020-04-30 | Updated: 2020-07-03
Backdoor Attack
Poisoning
Robustness Improvement Method

Systematic Evaluation of Backdoor Data Poisoning Attacks on Image Classifiers

Authors: Loc Truong, Chace Jones, Brian Hutchinson, Andrew August, Brenda Praggastis, Robert Jasper, Nicole Nichols, Aaron Tuor | Published: 2020-04-24
Backdoor Attack
Robustness Analysis
Regularization

Weight Poisoning Attacks on Pre-trained Models

Authors: Keita Kurita, Paul Michel, Graham Neubig | Published: 2020-04-14
Backdoor Attack
Poisoning
Adversarial Learning

MetaPoison: Practical General-purpose Clean-label Data Poisoning

Authors: W. Ronny Huang, Jonas Geiping, Liam Fowl, Gavin Taylor, Tom Goldstein | Published: 2020-04-01 | Updated: 2021-02-21
Backdoor Attack
Poisoning
Adversarial Example

Adaptive Reward-Poisoning Attacks against Reinforcement Learning

Authors: Xuezhou Zhang, Yuzhe Ma, Adish Singla, Xiaojin Zhu | Published: 2020-03-27 | Updated: 2020-06-22
Q-Learning Algorithm
Backdoor Attack
Reinforcement Learning Attack

RAB: Provable Robustness Against Backdoor Attacks

Authors: Maurice Weber, Xiaojun Xu, Bojan Karlaš, Ce Zhang, Bo Li | Published: 2020-03-19 | Updated: 2023-08-03
Backdoor Attack
Robustness
Adversarial Example

Towards Probabilistic Verification of Machine Unlearning

Authors: David Marco Sommer, Liwei Song, Sameer Wagh, Prateek Mittal | Published: 2020-03-09 | Updated: 2020-12-01
Training Method
Backdoor Attack
Backdoor Attack Mitigation