SoK: Security and Privacy Risks of Medical AI Authors: Yuanhaur Chang, Han Liu, Evin Jaff, Chenyang Lu, Ning Zhang | Published: 2024-09-11 Backdoor AttackPrivacy ProtectionThreats of Medical AI 2024.09.11 2025.05.27 Literature Database
2DSig-Detect: a semi-supervised framework for anomaly detection on image data using 2D-signatures Authors: Xinheng Xie, Kureha Yamaguchi, Margaux Leblanc, Simon Malzard, Varun Chhabra, Victoria Nockles, Yue Wu | Published: 2024-09-08 | Updated: 2025-03-20 Backdoor AttackPoisoningEvaluation Method 2024.09.08 2025.05.27 Literature Database
Understanding Data Importance in Machine Learning Attacks: Does Valuable Data Pose Greater Harm? Authors: Rui Wen, Michael Backes, Yang Zhang | Published: 2024-09-05 Backdoor AttackPrivacy Protection MethodMembership Inference 2024.09.05 2025.05.27 Literature Database
Adversarial Attacks on Machine Learning-Aided Visualizations Authors: Takanori Fujiwara, Kostiantyn Kucher, Junpeng Wang, Rafael M. Martins, Andreas Kerren, Anders Ynnerman | Published: 2024-09-04 | Updated: 2024-09-24 Backdoor AttackAdversarial ExampleVulnerability of Visualization 2024.09.04 2025.05.27 Literature Database
Exploiting the Vulnerability of Large Language Models via Defense-Aware Architectural Backdoor Authors: Abdullah Arafat Miah, Yu Bi | Published: 2024-09-03 | Updated: 2024-09-09 Backdoor AttackModel Performance Evaluation 2024.09.03 2025.05.27 Literature Database
Large Language Models are Good Attackers: Efficient and Stealthy Textual Backdoor Attacks Authors: Ziqiang Li, Yueqi Zeng, Pengfei Xia, Lei Liu, Zhangjie Fu, Bin Li | Published: 2024-08-21 Backdoor AttackPoisoning 2024.08.21 2025.05.27 Literature Database
Transferring Backdoors between Large Language Models by Knowledge Distillation Authors: Pengzhou Cheng, Zongru Wu, Tianjie Ju, Wei Du, Zhuosheng Zhang Gongshen Liu | Published: 2024-08-19 LLM SecurityBackdoor AttackPoisoning 2024.08.19 2025.05.27 Literature Database
Compromising Embodied Agents with Contextual Backdoor Attacks Authors: Aishan Liu, Yuguang Zhou, Xianglong Liu, Tianyuan Zhang, Siyuan Liang, Jiakai Wang, Yanjun Pu, Tianlin Li, Junqi Zhang, Wenbo Zhou, Qing Guo, Dacheng Tao | Published: 2024-08-06 Backdoor AttackPrompt Injection 2024.08.06 2025.05.27 Literature Database
Provable Robustness of (Graph) Neural Networks Against Data Poisoning and Backdoor Attacks Authors: Lukas Gosch, Mahalakshmi Sabanayagam, Debarghya Ghoshdastidar, Stephan Günnemann | Published: 2024-07-15 | Updated: 2024-10-14 Backdoor AttackPoisoningOptimization Problem 2024.07.15 2025.05.27 Literature Database
Model-agnostic clean-label backdoor mitigation in cybersecurity environments Authors: Giorgio Severi, Simona Boboila, John Holodnak, Kendra Kratkiewicz, Rauf Izmailov, Michael J. De Lucia, Alina Oprea | Published: 2024-07-11 | Updated: 2025-05-05 Backdoor DetectionBackdoor AttackDefense Mechanism 2024.07.11 2025.05.27 Literature Database