|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 63 occurrences of 54 keywords
|
|
|
Results
Found 1221 publication records. Showing 1221 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
165 | Lionel Paris, Richard Ostrowski, Pierre Siegel, Lakhdar Sais |
From Horn Strong Backdoor Sets to Ordered Strong Backdoor Sets. |
MICAI |
2007 |
DBLP DOI BibTeX RDF |
|
143 | Stefan Szeider |
Backdoor Sets for DLL Subsolvers. |
J. Autom. Reason. |
2005 |
DBLP DOI BibTeX RDF |
unit propagation, pure literal elimination, backdoor sets, W[P]-completeness, satisfiability, parameterized complexity |
117 | Jin Taek Kim, Jeong-Ho Kho, Min-Seok Hong, Choul Woong Son, Do-Won Lee, Sang-Jo Youk, Geuk Lee |
A study on intrusion protection techniques against Linux kernel backdoor. |
ICHIT |
2009 |
DBLP DOI BibTeX RDF |
|
94 | Loïc Duflot |
CPU Bugs, CPU Backdoors and Consequences on Security. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
hardware bug, hardware backdoor, CPU, x86 |
91 | Sherri Sparks, Shawn Embleton, Cliff Changchun Zou |
A chipset level network backdoor: bypassing host-based firewall & IDS. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
network backdoor, rootkit, hardware security |
83 | Bistra Dilkina, Carla P. Gomes, Ashish Sabharwal |
Tradeoffs in the Complexity of Backdoor Detection. |
CP |
2007 |
DBLP DOI BibTeX RDF |
|
77 | Bistra Dilkina, Carla P. Gomes, Yuri Malitsky, Ashish Sabharwal, Meinolf Sellmann |
Backdoors to Combinatorial Optimization: Feasibility and Optimality. |
CPAIOR |
2009 |
DBLP DOI BibTeX RDF |
backdoor sets, search, variable selection |
69 | Stephan Kottler, Michael Kaufmann 0001, Carsten Sinz |
A New Bound for an NP-Hard Subclass of 3-SAT Using Backdoors. |
SAT |
2008 |
DBLP DOI BibTeX RDF |
|
69 | Adam L. Young, Moti Yung |
Space-Efficient Kleptography Without Random Oracles. |
Information Hiding |
2007 |
DBLP DOI BibTeX RDF |
twisted elliptic curves, elliptic curve, Key exchange, kleptography |
66 | Adam L. Young, Moti Yung |
A Timing-Resistant Elliptic Curve Backdoor in RSA. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
Twisted elliptic curves, RSA, subliminal channel, kleptography |
66 | Stefan Szeider |
Matched Formulas and Backdoor Sets. |
SAT |
2007 |
DBLP DOI BibTeX RDF |
|
66 | Lionel Paris, Richard Ostrowski, Pierre Siegel, Lakhdar Sais |
Computing Horn Strong Backdoor Sets Thanks to Local Search. |
ICTAI |
2006 |
DBLP DOI BibTeX RDF |
|
57 | Marko Samer, Stefan Szeider |
Backdoor Sets of Quantified Boolean Formulas. |
J. Autom. Reason. |
2009 |
DBLP DOI BibTeX RDF |
Backdoor sets, Variable dependencies, Parameterized complexity, Quantified Boolean formulas |
52 | Loïc Duflot |
CPU bugs, CPU backdoors and consequences on security. |
J. Comput. Virol. |
2009 |
DBLP DOI BibTeX RDF |
|
52 | Naomi Nishimura, Prabhakar Ragde, Stefan Szeider |
Solving #SAT using vertex covers. |
Acta Informatica |
2007 |
DBLP DOI BibTeX RDF |
|
52 | Naomi Nishimura, Prabhakar Ragde, Stefan Szeider |
Solving #SAT Using Vertex Covers. |
SAT |
2006 |
DBLP DOI BibTeX RDF |
|
48 | Marko Samer, Stefan Szeider |
Backdoor Sets of Quantified Boolean Formulas. |
SAT |
2007 |
DBLP DOI BibTeX RDF |
|
48 | Adam L. Young, Moti Yung |
An Elliptic Curve Backdoor Algorithm for RSASSA. |
Information Hiding |
2006 |
DBLP DOI BibTeX RDF |
|
43 | Matti Järvisalo, Tommi A. Junttila |
Limitations of restricted branching in clause learning. |
Constraints An Int. J. |
2009 |
DBLP DOI BibTeX RDF |
Branching heuristics, Clause learning, Backdoor sets, Proof complexity, Propositional satisfiability, DPLL, Problem structure |
43 | Shih-Yao Dai, Sy-Yen Kuo |
MAPMon: A Host-Based Malware Detection Tool. |
PRDC |
2007 |
DBLP DOI BibTeX RDF |
Auto-Start Extensibility Point, Malware Attacking Points, Honeypot, Malicious Software, Backdoor |
43 | Hyungwoo Kang, Soon Jwa Hong, Dong Hoon Lee 0001 |
Matching Connection Pairs. |
PDCAT |
2004 |
DBLP DOI BibTeX RDF |
Connection pairs, Detoured attack, Traceback, Stepping stone, Backdoor |
31 | Adam L. Young, Moti Yung |
A Space Efficient Backdoor in RSA and Its Applications. |
Selected Areas in Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Decision Diffie-Hellman, black-box ciphers, twist on elliptic curves, RSA, elliptic curve cryptography, tamper-resistance, Diffie-Hellman, Key recovery, SETUP |
31 | Adam L. Young, Moti Yung |
Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
hidden ciphers, obfuscated ciphers, black-box ciphers, Huffman compression, reverse-engineering, data compression, entropy, subliminal channel, Digital Rights Management (DRM), Symmetric ciphers, kleptography |
28 | Haibin Zheng, Haiyang Xiong, Jinyin Chen, Haonan Ma, Guohan Huang |
Motif-Backdoor: Rethinking the Backdoor Attack on Graph Neural Networks via Motifs. |
IEEE Trans. Comput. Soc. Syst. |
2024 |
DBLP DOI BibTeX RDF |
|
28 | Haibin Zheng, Haiyang Xiong, Haonan Ma, Guohan Huang, Jinyin Chen |
Link-Backdoor: Backdoor Attack on Link Prediction via Node Injection. |
IEEE Trans. Comput. Soc. Syst. |
2024 |
DBLP DOI BibTeX RDF |
|
28 | Jinyin Chen, Haiyang Xiong, Haibin Zheng, Jian Zhang 0023, Yi Liu 0024 |
Dyn-Backdoor: Backdoor Attack on Dynamic Link Prediction. |
IEEE Trans. Netw. Sci. Eng. |
2024 |
DBLP DOI BibTeX RDF |
|
28 | Soumyadeep Pal, Yuguang Yao, Ren Wang 0008, Bingquan Shen, Sijia Liu 0001 |
Backdoor Secrets Unveiled: Identifying Backdoor Data with Optimized Scaled Prediction Consistency. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
28 | Siyuan Liang, Kuanrong Liu, Jiajun Gong, Jiawei Liang, Yuan Xun, Ee-Chien Chang, Xiaochun Cao |
Unlearning Backdoor Threats: Enhancing Backdoor Defense in Multimodal Contrastive Learning via Local Token Unlearning. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
28 | Shangxi Wu, Qiuyang He, Yi Zhang 0101, Dongyuan Lu, Jitao Sang |
Debiasing backdoor attack: A benign application of backdoor attack in eliminating data bias. |
Inf. Sci. |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Arthur Mercier, Nikita Smolin, Oliver Sihlovec, Stefanos Koffas, Stjepan Picek |
Backdoor Pony: Evaluating backdoor attacks and defenses in different domains. |
SoftwareX |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Tinghao Xie, Xiangyu Qi, Ping He, Yiming Li, Jiachen T. Wang, Prateek Mittal |
BaDExpert: Extracting Backdoor Functionality for Accurate Backdoor Input Detection. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Huming Qiu, Junjie Sun, Mi Zhang, Xudong Pan, Min Yang |
BELT: Old-School Backdoor Attacks can Evade the State-of-the-Art Defense with Backdoor Exclusivity Lifting. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Shangxi Wu, Qiuyang He, Fangzhao Wu, Jitao Sang, Yaowei Wang, Changsheng Xu |
Backdoor for Debias: Mitigating Model Bias with Backdoor Attack-based Artificial Bias. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Min Liu, Alberto L. Sangiovanni-Vincentelli, Xiangyu Yue |
Backdoor Defense with Non-Adversarial Backdoor. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Haomin Zhuang, Mingxian Yu, Hao Wang 0022, Yang Hua, Jian Li 0008, Xu Yuan 0001 |
Backdoor Federated Learning by Poisoning Backdoor-Critical Layers. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Bingxu Mu, Zhenxing Niu, Le Wang 0003, Xue Wang, Qiguang Mia, Rong Jin, Gang Hua 0001 |
Progressive Backdoor Erasing via connecting Backdoor and Adversarial Attacks. |
CVPR |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Shang Wang, Yansong Gao, Anmin Fu, Zhi Zhang 0001, Yuqing Zhang 0001, Willy Susilo, Dongxi Liu |
CASSOCK: Viable Backdoor Attacks against DNN in the Wall of Source-Specific Backdoor Defenses. |
AsiaCCS |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Haibin Zheng, Haiyang Xiong, Haonan Ma, Guohan Huang, Jinyin Chen |
Link-Backdoor: Backdoor Attack on Link Prediction via Node Injection. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Haibin Zheng, Haiyang Xiong, Jinyin Chen, Haonan Ma, Guohan Huang |
Motif-Backdoor: Rethinking the Backdoor Attack on Graph Neural Networks via Motifs. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Shang Wang, Yansong Gao, Anmin Fu, Zhi Zhang 0001, Yuqing Zhang 0001, Willy Susilo |
CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Khoa D. Doan, Yingjie Lao, Ping Li 0001 |
Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Shangxi Wu, Qiuyang He, Yi Zhang 0101, Jitao Sang |
Debiasing Backdoor Attack: A Benign Application of Backdoor Attack in Eliminating Data Bias. |
CoRR |
2022 |
DBLP BibTeX RDF |
|
28 | Kathrin Grosse, Taesung Lee, Battista Biggio, Youngja Park, Michael Backes 0001, Ian M. Molloy |
Backdoor smoothing: Demystifying backdoor attacks on deep neural networks. |
Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Rui Ning, Jiang Li 0001, Chunsheng Xin, Hongyi Wu, Chonggang Wang |
Hibernated Backdoor: A Mutual Information Empowered Backdoor Attack to Deep Neural Networks. |
AAAI |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Khoa D. Doan, Yingjie Lao, Ping Li 0001 |
Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class. |
NeurIPS |
2022 |
DBLP BibTeX RDF |
|
28 | Yue Gao 0011, Jack W. Stokes, Manoj Ajith Prasad, Andrew T. Marshall, Kassem Fawaz, Emre Kiciman |
I Know Your Triggers: Defending Against Textual Backdoor Attacks with Benign Backdoor Augmentation. |
MILCOM |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Chuanshuai Chen, Jiazhu Dai |
Mitigating backdoor attacks in LSTM-based text classification systems by Backdoor Keyword Identification. |
Neurocomputing |
2021 |
DBLP DOI BibTeX RDF |
|
28 | Antonio Emanuele Cinà, Kathrin Grosse, Sebastiano Vascon, Ambra Demontis, Battista Biggio, Fabio Roli, Marcello Pelillo |
Backdoor Learning Curves: Explaining Backdoor Poisoning Beyond Influence Functions. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
28 | Jinyin Chen, Haiyang Xiong, Haibin Zheng, Jian Zhang 0023, Guodong Jiang, Yi Liu 0024 |
Dyn-Backdoor: Backdoor Attack on Dynamic Link Prediction. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
28 | Ziqi Wei, Junjian Shi, Yihe Duan, Ranyang Liu, Ye Han, Zheli Liu |
Backdoor Filter: Mitigating Visible Backdoor Triggers in Dataset. |
DTPI |
2021 |
DBLP DOI BibTeX RDF |
|
28 | Zahra Ashktorab, Casey Dugan, James Johnson, Aabhas Sharma, Dustin Ramsey Torres, Ingrid Lange, Benjamin Hoover, Heiko Ludwig, Bryant Chen, Nathalie Baracaldo, Werner Geyer, Qian Pan |
The Design and Development of a Game to Study Backdoor Poisoning Attacks: The Backdoor Game. |
IUI |
2021 |
DBLP DOI BibTeX RDF |
|
28 | Shuang Li, Hongwei Li 0001, Hanxiao Chen |
Stand-in Backdoor: A Stealthy and Powerful Backdoor Attack. |
GLOBECOM |
2021 |
DBLP DOI BibTeX RDF |
|
28 | Meirong Liu, Hong Zheng, Qin Liu 0001, Xiaofei Xing, Yinglong Dai |
A Backdoor Embedding Method for Backdoor Detection in Deep Neural Networks. |
UbiSec |
2021 |
DBLP DOI BibTeX RDF |
|
28 | Chuanshuai Chen, Jiazhu Dai |
Mitigating backdoor attacks in LSTM-based Text Classification Systems by Backdoor Keyword Identification. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
28 | Yunfei Liu, Xingjun Ma, James Bailey 0001, Feng Lu 0005 |
Reflection Backdoor: A Natural Backdoor Attack on Deep Neural Networks. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
28 | Hyun Kwon, Hyunsoo Yoon, Ki-Woong Park |
Multi-Targeted Backdoor: Indentifying Backdoor Attack for Multiple Deep Neural Networks. |
IEICE Trans. Inf. Syst. |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Kota Yoshida, Takeshi Fujino |
Disabling Backdoor and Identifying Poison Data by using Knowledge Distillation in Backdoor Attacks on Deep Neural Networks. |
AISec@CCS |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Hyun Kwon, Hyunsoo Yoon, Ki-Woong Park |
FriendNet Backdoor: Indentifying Backdoor Attack that is safe for Friendly Deep Neural Network. |
ICSIM |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Yunfei Liu, Xingjun Ma, James Bailey 0001, Feng Lu 0005 |
Reflection Backdoor: A Natural Backdoor Attack on Deep Neural Networks. |
ECCV (10) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Guillaume Escamocher, Mohamed Siala 0002, Barry O'Sullivan |
From Backdoor Key to Backdoor Completability: Improving a Known Measure of Hardness for the Satisfiable CSP. |
CPAIOR |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Constantinos Patsakis, Nikolaos Alexandris |
A New SETUP for Factoring Based Algorithms. |
IIH-MSP |
2010 |
DBLP DOI BibTeX RDF |
Secretly Embedded Trapdoor with Universal Protection, Coppersmith's theorem, cryptovirology, RSA, public key cryptography, factoring, backdoor |
17 | Siddharth Gupta 0001, Christopher Hunter, Patrick Murphy, Ashutosh Sabharwal |
WARPnet: clean slate research on deployed wireless networks. |
MobiHoc |
2009 |
DBLP DOI BibTeX RDF |
warpnet, measurement, wireless, control, warp |
17 | S. Momina Tabish, M. Zubair Shafiq, Muddassar Farooq |
Malware detection using statistical analysis of byte-level file content. |
KDD Workshop on CyberSecurity and Intelligence Informatics |
2009 |
DBLP DOI BibTeX RDF |
computer malware, data mining, forensics |
17 | Bistra Dilkina, Carla P. Gomes, Ashish Sabharwal |
Backdoors in the Context of Learning. |
SAT |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Yong Gao 0001 |
Random Instances of W[2]-Complete Problems: Thresholds, Complexity, and Algorithms. |
SAT |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Stephan Kottler, Michael Kaufmann 0001, Carsten Sinz |
Computation of Renameable Horn Backdoors. |
SAT |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Jian-Xia Wang, Wan-Zhen Zhou, Yun-Feng Xu |
Embedded Intrusion Detection and Authority Management System. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Peter Gregory, Maria Fox 0001, Derek Long |
A New Empirical Study of Weak Backdoors. |
CP |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Chun-Ming Leung, Yuen-Yan Chan |
Network Forensic on Encrypted Peer-to-Peer VoIP Traffics and the Detection, Blocking, and Prioritization of Skype Traffics. |
WETICE |
2007 |
DBLP DOI BibTeX RDF |
Enterprise Network Security, Network Foren- sics, Traffic Prioritiza- tion, Reverse Engineering, Blocking, Traffic Analysis, Skype, NAT Traversal |
17 | José M. González, Vern Paxson |
Enhancing Network Intrusion Detection with Integrated Sampling and Filtering. |
RAID |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Seungwon Shin, Jaeyeon Jung, Hari Balakrishnan |
Malware prevalence in the KaZaA file-sharing network. |
Internet Measurement Conference |
2006 |
DBLP DOI BibTeX RDF |
KaZaA, virus prevalence, peer-to-peer |
17 | Tzer-Shyong Chen, Fuh-Gwo Jeng, Yu-Chia Liu |
Hacking Tricks Toward Security on Network Environments. |
PDCAT |
2006 |
DBLP DOI BibTeX RDF |
Hacking tricks, Trojan programs, Intrusion detection system, Firewall, Phishing |
17 | Kevin Borders, Atul Prakash 0001 |
Web tap: detecting covert web traffic. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
spyware detection, intrusion detection, anomaly detection, HTTP, covert channels, tunnels |
17 | Inês Lynce, João Marques-Silva 0001 |
Hidden Structure in Unsatisfiable Random 3-SAT: An Empirical Study. |
ICTAI |
2004 |
DBLP DOI BibTeX RDF |
|
17 | A. Murat Fiskiran, Ruby B. Lee |
Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution. |
ICCD |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Joel M. Gompert |
Local Search with Maximal Independent Sets. |
CP |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Mauro Borchardt, Carlos Maziero, Edgard Jamhour |
An Architecture for On-the-Fly File Integrity Checking. |
LADC |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Claude Crépeau, Alain Slakmon |
Simple Backdoors for RSA Key Generation. |
CT-RSA |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Yuyuan Sun, Yuliang Lu, Xuehu Yan, Xuan Wang |
Invisible backdoor learning in regional transform domain. |
Neural Comput. Appl. |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Tao Xiang 0001, Fei Ouyang, Di Zhang, Chunlong Xie, Hao Wang 0003 |
NLPSweep: A comprehensive defense scheme for mitigating NLP backdoor attacks. |
Inf. Sci. |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Orson Mengara, Anderson R. Avila, Tiago H. Falk |
Backdoor Attacks to Deep Neural Networks: A Survey of the Literature, Challenges, and Future Research Directions. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Chengxu Yu, Yulai Zhang |
Defending Against Backdoor Attacks by Quarantine Training. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Quentin Le Roux, Eric Bourbao, Yannick Teglia, Kassem Kallas |
A Comprehensive Survey on Backdoor Attacks and Their Defenses in Face Recognition Systems. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Xiangyu Zhao, Hanzhou Wu, Xinpeng Zhang 0001 |
Effective Backdoor Attack on Graph Neural Networks in Spectral Domain. |
IEEE Internet Things J. |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Yongkang Wang, Di-Hua Zhai, Dongyu Han, Yuyin Guan, Yuanqing Xia |
MITDBA: Mitigating Dynamic Backdoor Attacks in Federated Learning for IoT Applications. |
IEEE Internet Things J. |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Xinfeng Li, Junning Ze, Chen Yan 0001, Yushi Cheng, Xiaoyu Ji 0001, Wenyuan Xu 0001 |
Enrollment-Stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound. |
IEEE Internet Things J. |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Jianyao Yin, Honglong Chen, Junjian Li, Yudong Gao |
Enhanced Coalescence Backdoor Attack Against DNN Based on Pixel Gradient. |
Neural Process. Lett. |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Yu Tang, Lijuan Sun, Xiaolong Xu 0002 |
SilentTrig: An imperceptible backdoor attack against speaker identification with hidden triggers. |
Pattern Recognit. Lett. |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Mingfu Xue, Yinghao Wu, Shifeng Ni, Leo Yu Zhang, Yushu Zhang, Weiqiang Liu 0001 |
Untargeted Backdoor Attack Against Deep Neural Networks With Imperceptible Trigger. |
IEEE Trans. Ind. Informatics |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Yongkang Wang, Di-Hua Zhai, Yuanqing Xia, Danyang Liu |
PerVK: A Robust Personalized Federated Framework to Defend Against Backdoor Attacks for IoT Applications. |
IEEE Trans. Ind. Informatics |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Shingo Yashiki, Chako Takahashi, Koutarou Suzuki |
Backdoor Attacks on Graph Neural Networks Trained with Data Augmentation. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Yinbo Yu, Jiajia Liu 0001, Hongzhi Guo, Bomin Mao, Nei Kato |
A Spatiotemporal Backdoor Attack Against Behavior-Oriented Decision Makers in Metaverse: From Perspective of Autonomous Driving. |
IEEE J. Sel. Areas Commun. |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Zhou Yang 0003, Bowen Xu, Jie M. Zhang, Hong Jin Kang, Jieke Shi, Junda He, David Lo 0001 |
Stealthy Backdoor Attack for Code Models. |
IEEE Trans. Software Eng. |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Jin Lee, Crystal Abidin |
Backdoor advertising scandals, Yingyeo culture, and cancel culture among YouTube Influencers in South Korea. |
New Media Soc. |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Ruinan Jin, Chun-Yin Huang, Chenyu You, Xiaoxiao Li |
Backdoor Attack on Unpaired Medical Image-Text Foundation Models: A Pilot Study on MedCLIP. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Qiannan Wang, Changchun Yin, Liming Fang 0001, Lu Zhou 0002, Zhe Liu 0001, Run Wang, Chenhao Lin |
SSL-OTA: Unveiling Backdoor Threats in Self-Supervised Learning for Object Detection. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Zihan Guan 0001, Mengxuan Hu, Sheng Li 0001, Anil Vullikanti |
UFID: A Unified Framework for Input-level Backdoor Detection on Diffusion Models. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Xiaoxuan Han, Songlin Yang, Wei Wang 0025, Ziwen He, Jing Dong 0003 |
Is It Possible to Backdoor Face Forgery Detection with Natural Triggers? |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Khondoker Murad Hossain, Tim Oates 0001 |
TEN-GUARD: Tensor Decomposition for Backdoor Attack Detection in Deep Neural Networks. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Zhenbo Song, Wenhao Gao, Kaihao Zhang, Wenhan Luo, Zhaoxin Fan, Jianfeng Lu |
AS-FIBA: Adaptive Selective Frequency-Injection for Backdoor Attack on Deep Face Restoration. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 1221 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|