Unlearning Backdoor Attacks through Gradient-Based Model Pruning Authors: Kealan Dunnett, Reza Arablouei, Dimity Miller, Volkan Dedeoglu, Raja Jurdak | Published: 2024-05-07 Backdoor AttackModel Performance Evaluation 2024.05.07 2025.05.27 Literature Database
TuBA: Cross-Lingual Transferability of Backdoor Attacks in LLMs with Instruction Tuning Authors: Xuanli He, Jun Wang, Qiongkai Xu, Pasquale Minervini, Pontus Stenetorp, Benjamin I. P. Rubinstein, Trevor Cohn | Published: 2024-04-30 | Updated: 2025-03-17 Content ModerationBackdoor AttackPrompt Injection 2024.04.30 2025.05.27 Literature Database
Watch Out for Your Guidance on Generation! Exploring Conditional Backdoor Attacks against Large Language Models Authors: Jiaming He, Wenbo Jiang, Guanyu Hou, Wenshu Fan, Rui Zhang, Hongwei Li | Published: 2024-04-23 | Updated: 2025-01-08 LLM SecurityBackdoor AttackPoisoning 2024.04.23 2025.05.27 Literature Database
Competition Report: Finding Universal Jailbreak Backdoors in Aligned LLMs Authors: Javier Rando, Francesco Croce, Kryštof Mitka, Stepan Shabalin, Maksym Andriushchenko, Nicolas Flammarion, Florian Tramèr | Published: 2024-04-22 | Updated: 2024-06-06 LLM SecurityBackdoor AttackPrompt Injection 2024.04.22 2025.05.27 Literature Database
Physical Backdoor Attack can Jeopardize Driving with Vision-Large-Language Models Authors: Zhenyang Ni, Rui Ye, Yuxi Wei, Zhen Xiang, Yanfeng Wang, Siheng Chen | Published: 2024-04-19 | Updated: 2024-04-22 Backdoor AttackVulnerabilities in Autonomous Driving Technology 2024.04.19 2025.05.27 Literature Database
Exploring Backdoor Vulnerabilities of Chat Models Authors: Yunzhuo Hao, Wenkai Yang, Yankai Lin | Published: 2024-04-03 Backdoor AttackPrompt Injection 2024.04.03 2025.05.27 Literature Database
Privacy Backdoors: Enhancing Membership Inference through Poisoning Pre-trained Models Authors: Yuxin Wen, Leo Marchyok, Sanghyun Hong, Jonas Geiping, Tom Goldstein, Nicholas Carlini | Published: 2024-04-01 Backdoor AttackPoisoningMembership Inference 2024.04.01 2025.05.27 Literature Database
A Backdoor Approach with Inverted Labels Using Dirty Label-Flipping Attacks Authors: Orson Mengara | Published: 2024-03-29 | Updated: 2024-04-07 Dataset GenerationBackdoor AttackPoisoning 2024.03.29 2025.05.27 Literature Database
Backdoor Secrets Unveiled: Identifying Backdoor Data with Optimized Scaled Prediction Consistency Authors: Soumyadeep Pal, Yuguang Yao, Ren Wang, Bingquan Shen, Sijia Liu | Published: 2024-03-15 WatermarkingBackdoor AttackPoisoning 2024.03.15 2025.05.27 Literature Database
Interactive Trimming against Evasive Online Data Manipulation Attacks: A Game-Theoretic Approach Authors: Yue Fu, Qingqing Ye, Rong Du, Haibo Hu | Published: 2024-03-15 Backdoor AttackPrivacy Protection MethodStrategic Game 2024.03.15 2025.05.27 Literature Database