@inproceedings{bb144800, AUTHOR = "Yang, C.H. and Liu, Y. and Chen, P. and Ma, X. and Tsai, Y.J.", TITLE = "When Causal Intervention Meets Adversarial Examples and Image Masking for Deep Neural Networks", BOOKTITLE = ICIP19, YEAR = "2019", PAGES = "3811-3815", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140787"} @inproceedings{bb144801, AUTHOR = "Yao, H. and Regan, M. and Yang, Y. and Ren, Y.", TITLE = "Image Decomposition and Classification Through a Generative Model", BOOKTITLE = ICIP19, YEAR = "2019", PAGES = "400-404", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140788"} @inproceedings{bb144802, AUTHOR = "Li, J. and Ji, R. and Liu, H. and Hong, X. and Gao, Y. and Tian, Q.", TITLE = "Universal Perturbation Attack Against Image Retrieval", BOOKTITLE = ICCV19, YEAR = "2019", PAGES = "4898-4907", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140789"} @inproceedings{bb144803, AUTHOR = "Finlay, C. and Pooladian, A. and Oberman, A.", TITLE = "The LogBarrier Adversarial Attack: Making Effective Use of Decision Boundary Information", BOOKTITLE = ICCV19, YEAR = "2019", PAGES = "4861-4869", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140790"} @inproceedings{bb144804, AUTHOR = "Jandial, S. and Mangla, P. and Varshney, S. and Balasubramanian, V.", TITLE = "AdvGAN++: Harnessing Latent Layers for Adversary Generation", BOOKTITLE = NeruArch19, YEAR = "2019", PAGES = "2045-2048", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140791"} @inproceedings{bb144805, AUTHOR = "Wang, C.L. and Bunel, R. and Dvijotham, K. and Huang, P.S. and Grefenstette, E. and Kohli, P.", TITLE = "Knowing When to Stop: Evaluation and Verification of Conformity to Output-Size Specifications", BOOKTITLE = CVPR19, YEAR = "2019", PAGES = "12252-12261", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140792"} @inproceedings{bb144806, AUTHOR = "Modas, A. and Moosavi Dezfooli, S.M. and Frossard, P.", TITLE = "SparseFool: A Few Pixels Make a Big Difference", BOOKTITLE = CVPR19, YEAR = "2019", PAGES = "9079-9088", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140793"} @inproceedings{bb144807, AUTHOR = "Yao, Z.W. and Gholami, A. and Xu, P. and Keutzer, K. and Mahoney, M.W.", TITLE = "Trust Region Based Adversarial Attack on Neural Networks", BOOKTITLE = CVPR19, YEAR = "2019", PAGES = "11342-11351", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140794"} @inproceedings{bb144808, AUTHOR = "Zeng, X.H. and Liu, C.X. and Wang, Y.S. and Qiu, W.C. and Xie, L.X. and Tai, Y.W. and Tang, C.K. and Yuille, A.L.", TITLE = "Adversarial Attacks Beyond the Image Space", BOOKTITLE = CVPR19, YEAR = "2019", PAGES = "4297-4306", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140795"} @inproceedings{bb144809, AUTHOR = "Corneanu, C.A. and Madadi, M. and Escalera, S. and Martinez, A.M.", TITLE = "What Does It Mean to Learn in Deep Networks? And, How Does One Detect Adversarial Attacks?", BOOKTITLE = CVPR19, YEAR = "2019", PAGES = "4752-4761", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140796"} @inproceedings{bb144810, AUTHOR = "Liu, X.Q. and Hsieh, C.J.", TITLE = "Rob-GAN: Generator, Discriminator, and Adversarial Attacker", BOOKTITLE = CVPR19, YEAR = "2019", PAGES = "11226-11235", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140797"} @inproceedings{bb144811, AUTHOR = "Gupta, P. and Rahtu, E.", TITLE = "MLAttack: Fooling Semantic Segmentation Networks by Multi-layer Attacks", BOOKTITLE = GCPR19, YEAR = "2019", PAGES = "401-413", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140798"} @inproceedings{bb144812, AUTHOR = "Zhao, W. and Yang, P.P. and Ni, R.R. and Zhao, Y. and Li, W.J.", TITLE = "Cycle GAN-Based Attack on Recaptured Images to Fool both Human and Machine", BOOKTITLE = IWDW18, YEAR = "2018", PAGES = "83-92", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140799"} @inproceedings{bb144813, AUTHOR = "Xu, X.J. and Chen, X.Y. and Liu, C. and Rohrbach, A. and Darrell, T.J. and Song, D.", TITLE = "Fooling Vision and Language Models Despite Localization and Attention Mechanism", BOOKTITLE = CVPR18, YEAR = "2018", PAGES = "4951-4961", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140800"} @inproceedings{bb144814, AUTHOR = "Dong, Y. and Liao, F. and Pang, T. and Su, H. and Zhu, J. and Hu, X. and Li, J.", TITLE = "Boosting Adversarial Attacks with Momentum", BOOKTITLE = CVPR18, YEAR = "2018", PAGES = "9185-9193", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140801"} @inproceedings{bb144815, AUTHOR = "Eykholt, K. and Evtimov, I. and Fernandes, E. and Li, B. and Rahmati, A. and Xiao, C. and Prakash, A. and Kohno, T. and Song, D.", TITLE = "Robust Physical-World Attacks on Deep Learning Visual Classification", BOOKTITLE = CVPR18, YEAR = "2018", PAGES = "1625-1634", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140802"} @article{bb144816, AUTHOR = "Zhang, J. and Chen, D.D. and Huang, Q.D. and Liao, J. and Zhang, W.M. and Feng, H.M. and Hua, G. and Yu, N.H.", TITLE = "Poison Ink: Robust and Invisible Backdoor Attack", JOURNAL = IP, VOLUME = "31", YEAR = "2022", PAGES = "5691-5705", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140803"} @article{bb144817, AUTHOR = "Gao, Y.H. and Li, Y.M. and Zhu, L. and Wu, D.X. and Jiang, Y. and Xia, S.T.", TITLE = "Not All Samples Are Born Equal: Towards Effective Clean-Label Backdoor Attacks", JOURNAL = PR, VOLUME = "139", YEAR = "2023", PAGES = "109512", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140804"} @article{bb144818, AUTHOR = "Wang, Z. and Wang, B.H. and Zhang, C.L. and Liu, Y. and Guo, J.X.", TITLE = "Robust Feature-Guided Generative Adversarial Network for Aerial Image Semantic Segmentation against Backdoor Attacks", JOURNAL = RS, VOLUME = "15", YEAR = "2023", NUMBER = "10", PAGES = "xx-yy", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140805"} @article{bb144819, AUTHOR = "Wang, Z. and Wang, B.H. and Zhang, C.L. and Liu, Y.", TITLE = "Defense against Adversarial Patch Attacks for Aerial Image Semantic Segmentation by Robust Feature Extraction", JOURNAL = RS, VOLUME = "15", YEAR = "2023", NUMBER = "6", PAGES = "1690", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140806"} @article{bb144820, AUTHOR = "Wang, Z. and Wang, B.H. and Zhang, C.L. and Liu, Y. and Guo, J.X.", TITLE = "Defending against Poisoning Attacks in Aerial Image Semantic Segmentation with Robust Invariant Feature Enhancement", JOURNAL = RS, VOLUME = "15", YEAR = "2023", NUMBER = "12", PAGES = "xx-yy", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140807"} @article{bb144821, AUTHOR = "Ma, Q.L. and Qin, J.P. and Yan, K. and Wang, L. and Sun, H.", TITLE = "Stealthy Frequency-Domain Backdoor Attacks: Fourier Decomposition and Fundamental Frequency Injection", JOURNAL = SPLetters, VOLUME = "30", YEAR = "2023", PAGES = "1677-1681", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140808"} @article{bb144822, AUTHOR = "Zhang, Z. and Yuan, X. and Zhu, L. and Song, J.K. and Nie, L.Q.", TITLE = "BadCM: Invisible Backdoor Attack Against Cross-Modal Learning", JOURNAL = IP, VOLUME = "33", YEAR = "2024", PAGES = "2558-2571", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140809"} @inproceedings{bb144823, AUTHOR = "Zhu, Z.X. and Wang, R. and Zou, C. and Jing, L.H.", TITLE = "The Victim and The Beneficiary: Exploiting a Poisoned Model to Train a Clean Model on Poisoned Data", BOOKTITLE = ICCV23, YEAR = "2023", PAGES = "155-164", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140810"} @inproceedings{bb144824, AUTHOR = "Ding, R. and Duan, S.J. and Xu, X.L. and Fei, Y.", TITLE = "VertexSerum: Poisoning Graph Neural Networks for Link Inference", BOOKTITLE = ICCV23, YEAR = "2023", PAGES = "4509-4518", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140811"} @inproceedings{bb144825, AUTHOR = "Bansal, H. and Yin, F. and Singhi, N. and Grover, A. and Yang, Y. and Chang, K.W.", TITLE = "CleanCLIP: Mitigating Data Poisoning Attacks in Multimodal Contrastive Learning", BOOKTITLE = ICCV23, YEAR = "2023", PAGES = "112-123", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140812"} @inproceedings{bb144826, AUTHOR = "Sur, I. and Sikka, K. and Walmer, M. and Koneripalli, K. and Roy, A. and Lin, X. and Divakaran, A. and Jha, S.", TITLE = "TIJO: Trigger Inversion with Joint Optimization for Defending Multimodal Backdoored Models", BOOKTITLE = ICCV23, YEAR = "2023", PAGES = "165-175", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140813"} @inproceedings{bb144827, AUTHOR = "Li, C.J. and Pang, R. and Xi, Z. and Du, T.Y. and Ji, S. and Yao, Y. and Wang, T.", TITLE = "An Embarrassingly Simple Backdoor Attack on Self-supervised Learning", BOOKTITLE = ICCV23, YEAR = "2023", PAGES = "4344-4355", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140814"} @inproceedings{bb144828, AUTHOR = "Zhu, M.L. and Wei, S. and Shen, L. and Fan, Y.B. and Wu, B.Y.", TITLE = "Enhancing Fine-Tuning based Backdoor Defense with Sharpness-Aware Minimization", BOOKTITLE = ICCV23, YEAR = "2023", PAGES = "4443-4454", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140815"} @inproceedings{bb144829, AUTHOR = "Liu, M. and Sangiovanni Vincentelli, A. and Yue, X.Y.", TITLE = "Beating Backdoor Attack at Its Own Game", BOOKTITLE = ICCV23, YEAR = "2023", PAGES = "4597-4606", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140816"} @inproceedings{bb144830, AUTHOR = "Huang, S.Q. and Li, Y.J. and Chen, C. and Shi, L. and Gao, Y.", TITLE = "Multi-metrics adaptively identifies backdoors in Federated learning", BOOKTITLE = ICCV23, YEAR = "2023", PAGES = "4629-4639", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140817"} @inproceedings{bb144831, AUTHOR = "Guo, J.F. and Li, A. and Wang, L. and Liu, C.", TITLE = "PolicyCleanse: Backdoor Detection and Mitigation for Competitive Reinforcement Learning", BOOKTITLE = ICCV23, YEAR = "2023", PAGES = "4676-4685", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140818"} @inproceedings{bb144832, AUTHOR = "Shejwalkar, V. and Lyu, L.J. and Houmansadr, A.", TITLE = "The Perils of Learning From Unlabeled Data: Backdoor Attacks on Semi-supervised Learning", BOOKTITLE = ICCV23, YEAR = "2023", PAGES = "4707-4717", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140819"} @inproceedings{bb144833, AUTHOR = "Wu, Y.T. and Han, X. and Qiu, H. and Zhang, T.W.", TITLE = "Computation and Data Efficient Backdoor Attacks", BOOKTITLE = ICCV23, YEAR = "2023", PAGES = "4782-4791", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140820"} @inproceedings{bb144834, AUTHOR = "Han, G. and Choi, J. and Hong, H.G. and Kim, J.", TITLE = "Data Poisoning Attack Aiming the Vulnerability of Continual Learning", BOOKTITLE = ICIP23, YEAR = "2023", PAGES = "1905-1909", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140821"} @inproceedings{bb144835, AUTHOR = "Huang, B. and Wang, Z.", TITLE = "Efficient any-Target Backdoor Attack with Pseudo Poisoned Samples", BOOKTITLE = ICIP23, YEAR = "2023", PAGES = "3319-3323", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140822"} @inproceedings{bb144836, AUTHOR = "Shen, Z. and Hou, W. and Li, Y.", TITLE = "CSSBA: A Clean Label Sample-Specific Backdoor Attack", BOOKTITLE = ICIP23, YEAR = "2023", PAGES = "965-969", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140823"} @inproceedings{bb144837, AUTHOR = "Sun, M.J. and Kolter, Z.", TITLE = "Single Image Backdoor Inversion via Robust Smoothed Classifiers", BOOKTITLE = CVPR23, YEAR = "2023", PAGES = "8113-8122", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140824"} @inproceedings{bb144838, AUTHOR = "Hammoud, H.A.A.K. and Bibi, A. and Torr, P.H.S. and Ghanem, B.", TITLE = "Don't FREAK Out: A Frequency-Inspired Approach to Detecting Backdoor Poisoned Samples in DNNs", BOOKTITLE = AML23, YEAR = "2023", PAGES = "2338-2345", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140825"} @inproceedings{bb144839, AUTHOR = "Gao, K.F. and Bai, Y. and Gu, J.D. and Yang, Y. and Xia, S.T.", TITLE = "Backdoor Defense via Adaptively Splitting Poisoned Dataset", BOOKTITLE = CVPR23, YEAR = "2023", PAGES = "4005-4014", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140826"} @inproceedings{bb144840, AUTHOR = "Chou, S.Y. and Chen, P.Y. and Ho, T.Y.", TITLE = "How to Backdoor Diffusion Models?", BOOKTITLE = CVPR23, YEAR = "2023", PAGES = "4015-4024", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140827"} @inproceedings{bb144841, AUTHOR = "Zheng, R.K. and Tang, R.J. and Li, J.Z. and Liu, L.", TITLE = "Data-Free Backdoor Removal Based on Channel Lipschitzness", BOOKTITLE = ECCV22, YEAR = "2022", PAGES = "V:175-191", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140828"} @inproceedings{bb144842, AUTHOR = "Dolatabadi, H.M. and Erfani, S. and Leckie, C.", TITLE = "Collider: A Robust Training Framework for Backdoor Data", BOOKTITLE = ACCV22, YEAR = "2022", PAGES = "VI:681-698", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140829"} @inproceedings{bb144843, AUTHOR = "Ji, H.X. and Li, J. and Wu, C.", TITLE = "CRAB: Certified Patch Robustness Against Poisoning-Based Backdoor Attacks", BOOKTITLE = ICIP22, YEAR = "2022", PAGES = "2486-2490", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140830"} @inproceedings{bb144844, AUTHOR = "Liu, Y.Q. and Shen, G.Y. and Tao, G.H. and Wang, Z.T. and Ma, S.Q. and Zhang, X.Y.", TITLE = "Complex Backdoor Detection by Symmetric Feature Differencing", BOOKTITLE = CVPR22, YEAR = "2022", PAGES = "14983-14993", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140831"} @inproceedings{bb144845, AUTHOR = "Guan, J. and Tu, Z. and He, R. and Tao, D.C.", TITLE = "Few-shot Backdoor Defense Using Shapley Estimation", BOOKTITLE = CVPR22, YEAR = "2022", PAGES = "13348-13357", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140832"} @inproceedings{bb144846, AUTHOR = "Tao, G.H. and Shen, G.Y. and Liu, Y.Q. and An, S.W. and Xu, Q.L. and Ma, S.Q. and Li, P. and Zhang, X.Y.", TITLE = "Better Trigger Inversion Optimization in Backdoor Scanning", BOOKTITLE = CVPR22, YEAR = "2022", PAGES = "13358-13368", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140833"} @inproceedings{bb144847, AUTHOR = "Chan, S.H. and Dong, Y.P. and Zhu, J. and Zhang, X.L. and Zhou, J.", TITLE = "Baddet: Backdoor Attacks on Object Detection", BOOKTITLE = AdvRob22, YEAR = "2022", PAGES = "396-412", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140834"} @inproceedings{bb144848, AUTHOR = "Ramakrishnan, G. and Albarghouthi, A.", TITLE = "Backdoors in Neural Models of Source Code", BOOKTITLE = "ICPR22", YEAR = "2022", PAGES = "2892-2899", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140835"} @inproceedings{bb144849, AUTHOR = "Phan, H. and Shi, C. and Xie, Y. and Zhang, T.F. and Li, Z.H. and Zhao, T.M. and Liu, J. and Wang, Y. and Chen, Y.Y. and Yuan, B.", TITLE = "RIBAC: Towards Robust and Imperceptible Backdoor Attack against Compact DNN", BOOKTITLE = ECCV22, YEAR = "2022", PAGES = "IV:708-724", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140836"} @inproceedings{bb144850, AUTHOR = "Feng, Y. and Ma, B. and Zhang, J. and Zhao, S.S. and Xia, Y. and Tao, D.C.", TITLE = "FIBA: Frequency-Injection based Backdoor Attack in Medical Image Analysis", BOOKTITLE = CVPR22, YEAR = "2022", PAGES = "20844-20853", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140837"} @inproceedings{bb144851, AUTHOR = "Zhao, Z.D. and Chen, X.J. and Xuan, Y.X. and Dong, Y. and Wang, D. and Liang, K.", TITLE = "DEFEAT: Deep Hidden Feature Backdoor Attacks by Imperceptible Perturbation and Latent Representation Constraints", BOOKTITLE = CVPR22, YEAR = "2022", PAGES = "15192-15201", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140838"} @inproceedings{bb144852, AUTHOR = "Li, Y.Z. and Li, Y.M. and Wu, B.Y. and Li, L.K. and He, R. and Lyu, S.W.", TITLE = "Invisible Backdoor Attack with Sample-Specific Triggers", BOOKTITLE = ICCV21, YEAR = "2021", PAGES = "16443-16452", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140839"} @inproceedings{bb144853, AUTHOR = "Doan, K. and Lao, Y.J. and Zhao, W.J. and Li, P.", TITLE = "LIRA: Learnable, Imperceptible and Robust Backdoor Attacks", BOOKTITLE = ICCV21, YEAR = "2021", PAGES = "11946-11956", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140840"} @inproceedings{bb144854, AUTHOR = "Xiang, Z. and Miller, D.J. and Chen, S. and Li, X. and Kesidis, G.", TITLE = "A Backdoor Attack against 3D Point Cloud Classifiers", BOOKTITLE = ICCV21, YEAR = "2021", PAGES = "7577-7587", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140841"} @inproceedings{bb144855, AUTHOR = "Ren, Y.K. and Li, L.F. and Zhou, J.", TITLE = "Simtrojan: Stealthy Backdoor Attack", BOOKTITLE = ICIP21, YEAR = "2021", PAGES = "819-823", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140842"} @inproceedings{bb144856, AUTHOR = "Zhu, L. and Ning, R. and Xin, C.S. and Wang, C.G. and Wu, H.Y.", TITLE = "CLEAR: Clean-up Sample-Targeted Backdoor in Neural Networks", BOOKTITLE = ICCV21, YEAR = "2021", PAGES = "16433-16442", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140843"} @inproceedings{bb144857, AUTHOR = "Zeng, Y. and Park, W. and Mao, Z.M. and Jia, R.", TITLE = "Rethinking the Backdoor Attacks' Triggers: A Frequency Perspective", BOOKTITLE = ICCV21, YEAR = "2021", PAGES = "16453-16461", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140844"} @inproceedings{bb144858, AUTHOR = "Raj, A. and Pal, A. and Arora, C.", TITLE = "Identifying Physically Realizable Triggers for Backdoored Face Recognition Networks", BOOKTITLE = ICIP21, YEAR = "2021", PAGES = "3023-3027", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140845"} @inproceedings{bb144859, AUTHOR = "Wang, R. and Zhang, G.Y. and Liu, S.J. and Chen, P.Y. and Xiong, J.J. and Wang, M.", TITLE = "Practical Detection of Trojan Neural Networks: Data-limited and Data-free Cases", BOOKTITLE = ECCV20, YEAR = "2020", PAGES = "XXIII:222-238", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140846"} @inproceedings{bb144860, AUTHOR = "Liu, Y.F. and Ma, X.J. and Bailey, J. and Lu, F.", TITLE = "Reflection Backdoor: A Natural Backdoor Attack on Deep Neural Networks", BOOKTITLE = ECCV20, YEAR = "2020", PAGES = "X:182-199", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140847"} @inproceedings{bb144861, AUTHOR = "Zhao, S. and Ma, X. and Zheng, X. and Bailey, J. and Chen, J. and Jiang, Y.", TITLE = "Clean-Label Backdoor Attacks on Video Recognition Models", BOOKTITLE = CVPR20, YEAR = "2020", PAGES = "14431-14440", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140848"} @inproceedings{bb144862, AUTHOR = "Kolouri, S. and Saha, A. and Pirsiavash, H. and Hoffmann, H.", TITLE = "Universal Litmus Patterns: Revealing Backdoor Attacks in CNNs", BOOKTITLE = CVPR20, YEAR = "2020", PAGES = "298-307", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140849"} @inproceedings{bb144863, AUTHOR = "Truong, L. and Jones, C. and Hutchinson, B. and August, A. and Praggastis, B. and Jasper, R. and Nichols, N. and Tuor, A.", TITLE = "Systematic Evaluation of Backdoor Data Poisoning Attacks on Image Classifiers", BOOKTITLE = AML-CV20, YEAR = "2020", PAGES = "3422-3431", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140850"} @inproceedings{bb144864, AUTHOR = "Barni, M. and Kallas, K. and Tondi, B.", TITLE = "A New Backdoor Attack in CNNS by Training Set Corruption Without Label Poisoning", BOOKTITLE = ICIP19, YEAR = "2019", PAGES = "101-105", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140851"} @article{bb144865, AUTHOR = "Goldblum, M. and Tsipras, D. and Xie, C. and Chen, X.Y. and Schwarzschild, A. and Song, D. and Madry, A. and Li, B. and Goldstein, T.", TITLE = "Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses", JOURNAL = PAMI, VOLUME = "45", YEAR = "2023", NUMBER = "2", MONTH = "February", PAGES = "1563-1580", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT140852"} @inproceedings{bb144866, AUTHOR = "Mu, B.X. and Niu, Z.X. and Wang, L. and Wang, X. and Mia, Q.G. and Jin, R. and Hua, G.", TITLE = "Progressive Backdoor Erasing via connecting Backdoor and Adversarial Attacks", BOOKTITLE = CVPR23, YEAR = "2023", PAGES = "20495-20503", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT140853"} @inproceedings{bb144867, AUTHOR = "Pang, L. and Sun, T. and Ling, H.B. and Chen, C.", TITLE = "Backdoor Cleansing with Unlabeled Data", BOOKTITLE = CVPR23, YEAR = "2023", PAGES = "12218-12227", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT140854"} @inproceedings{bb144868, AUTHOR = "Zhang, Z. and Liu, Q. and Wang, Z.C. and Lu, Z. and Hu, Q.Y.", TITLE = "Backdoor Defense via Deconfounded Representation Learning", BOOKTITLE = CVPR23, YEAR = "2023", PAGES = "12228-12238", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT140855"} @inproceedings{bb144869, AUTHOR = "Yu, Y. and Wang, Y.F. and Yang, W.H. and Lu, S.J. and Tan, Y.P. and Kot, A.C.", TITLE = "Backdoor Attacks Against Deep Image Compression via Adaptive Frequency Trigger", BOOKTITLE = CVPR23, YEAR = "2023", PAGES = "12250-12259", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT140856"} @inproceedings{bb144870, AUTHOR = "Feng, S.W. and Tao, G.H. and Cheng, S.Y. and Shen, G.Y. and Xu, X.Z. and Liu, Y.Q. and Zhang, K. and Ma, S.Q. and Zhang, X.Y.", TITLE = "Detecting Backdoors in Pre-trained Encoders", BOOKTITLE = CVPR23, YEAR = "2023", PAGES = "16352-16362", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT140857"} @inproceedings{bb144871, AUTHOR = "Liu, X. and Li, M.H. and Wang, H.Y. and Hu, S. and Ye, D. and Jin, H. and Wu, L. and Xiao, C.W.", TITLE = "Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency", BOOKTITLE = CVPR23, YEAR = "2023", PAGES = "16363-16372", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT140858"} @inproceedings{bb144872, AUTHOR = "Xu, Q. and Tao, G.N. and Honorio, J. and Liu, Y.Q. and An, S.W. and Shen, G.Y. and Cheng, S.Y. and Zhang, X.Y.", TITLE = "MEDIC: Remove Model Backdoors via Importance Driven Cloning", BOOKTITLE = CVPR23, YEAR = "2023", PAGES = "20485-20494", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT140859"} @inproceedings{bb144873, AUTHOR = "Chen, S. and Chen, H.L. and Haque, M. and Liu, C. and Yang, W.", TITLE = "The Dark Side of Dynamic Routing Neural Networks: Towards Efficiency Backdoor Injection", BOOKTITLE = CVPR23, YEAR = "2023", PAGES = "24585-24594", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT140860"} @inproceedings{bb144874, AUTHOR = "Bober Irizar, M. and Shumailov, I. and Zhao, Y. and Mullins, R. and Papernot, N.", TITLE = "Architectural Backdoors in Neural Networks", BOOKTITLE = CVPR23, YEAR = "2023", PAGES = "24595-24604", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT140861"} @inproceedings{bb144875, AUTHOR = "Yuan, Z. and Zhou, P. and Zou, K. and Cheng, Y.", TITLE = "You Are Catching My Attention: Are Vision Transformers Bad Learners under Backdoor Attacks?", BOOKTITLE = CVPR23, YEAR = "2023", PAGES = "24605-24615", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT140862"} @inproceedings{bb144876, AUTHOR = "Tejankar, A. and Sanjabi, M. and Wang, Q.F. and Wang, S. and Firooz, H. and Pirsiavash, H. and Tan, L.", TITLE = "Defending Against Patch-based Backdoor Attacks on Self-Supervised Learning", BOOKTITLE = CVPR23, YEAR = "2023", PAGES = "12239-12249", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT140863"} @inproceedings{bb144877, AUTHOR = "Saha, A. and Tejankar, A. and Koohpayegani, S.A. and Pirsiavash, H.", TITLE = "Backdoor Attacks on Self-Supervised Learning", BOOKTITLE = CVPR22, YEAR = "2022", PAGES = "13327-13336", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT140864"} @inproceedings{bb144878, AUTHOR = "Qi, X.Y. and Xie, T.H. and Pan, R.Z. and Zhu, J.F. and Yang, Y. and Bu, K.", TITLE = "Towards Practical Deployment-Stage Backdoor Attack on Deep Neural Networks", BOOKTITLE = CVPR22, YEAR = "2022", PAGES = "13337-13347", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT140865"} @inproceedings{bb144879, AUTHOR = "Huang, S.J. and Peng, W.Q. and Jia, Z.W. and Tu, Z.W.", TITLE = "One-pixel Signature: Characterizing CNN Models for Backdoor Detection", BOOKTITLE = ECCV20, YEAR = "2020", PAGES = "XXVII:326-341", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT140866"} @article{bb144880, AUTHOR = "Hang, J. and Han, K. and Chen, H. and Li, Y.", TITLE = "Ensemble adversarial black-box attacks against deep learning systems", JOURNAL = PR, VOLUME = "101", YEAR = "2020", PAGES = "107184", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT140867"} @article{bb144881, AUTHOR = "Correia Silva, J.R. and Berriel, R.F. and Badue, C. and de Souza, A.F. and Oliveira Santos, T.", TITLE = "Copycat CNN: Are random non-Labeled data enough to steal knowledge from black-box models?", JOURNAL = PR, VOLUME = "113", YEAR = "2021", PAGES = "107830", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT140868"} @article{bb144882, AUTHOR = "Gragnaniello, D. and Marra, F. and Verdoliva, L. and Poggi, G.", TITLE = "Perceptual quality-preserving black-box attack against deep learning image classifiers", JOURNAL = PRL, VOLUME = "147", YEAR = "2021", PAGES = "142-149", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT140869"} @article{bb144883, AUTHOR = "Li, N.N. and Chen, Z.Z.", TITLE = "Toward Visual Distortion in Black-Box Attacks", JOURNAL = IP, VOLUME = "30", YEAR = "2021", PAGES = "6156-6167", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT140870"} @article{bb144884, AUTHOR = "Cina, A.E. and Torcinovich, A. and Pelillo, M.", TITLE = "A black-box adversarial attack for poisoning clustering", JOURNAL = PR, VOLUME = "122", YEAR = "2022", PAGES = "108306", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT140871"} @article{bb144885, AUTHOR = "Ghosh, A. and Mullick, S.S. and Datta, S. and Das, S. and Das, A.K. and Mallipeddi, R.", TITLE = "A black-box adversarial attack strategy with adjustable sparsity and generalizability for deep image classifiers", JOURNAL = PR, VOLUME = "122", YEAR = "2022", PAGES = "108279", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT140872"} @article{bb144886, AUTHOR = "Chen, S. and He, F. and Huang, X.L. and Zhang, K.", TITLE = "Relevance attack on detectors", JOURNAL = PR, VOLUME = "124", YEAR = "2022", PAGES = "108491", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT140873"} @article{bb144887, AUTHOR = "Wei, X.X. and Yan, H.Q. and Li, B.", TITLE = "Sparse Black-Box Video Attack with Reinforcement Learning", JOURNAL = IJCV, VOLUME = "130", YEAR = "2022", NUMBER = "6", MONTH = "June", PAGES = "1459-1473", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT140874"} @article{bb144888, AUTHOR = "Hu, Z.C. and Li, H. and Yuan, L.H. and Cheng, Z. and Yuan, W. and Zhu, M.", TITLE = "Model scheduling and sample selection for ensemble adversarial example attacks", JOURNAL = PR, VOLUME = "130", YEAR = "2022", PAGES = "108824", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT140875"} @article{bb144889, AUTHOR = "Huang, L.F. and Wei, S.X. and Gao, C.Y. and Liu, N.", TITLE = "Cyclical Adversarial Attack Pierces Black-box Deep Neural Networks", JOURNAL = PR, VOLUME = "131", YEAR = "2022", PAGES = "108831", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT140876"} @article{bb144890, AUTHOR = "Peng, B. and Peng, B. and Yong, S.W. and Liu, L.", TITLE = "An Empirical Study of Fully Black-Box and Universal Adversarial Attack for SAR Target Recognition", JOURNAL = RS, VOLUME = "14", YEAR = "2022", NUMBER = "16", PAGES = "xx-yy", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT140877"} @article{bb144891, AUTHOR = "Li, C. and Yao, W. and Wang, H.D. and Jiang, T.S.", TITLE = "Adaptive momentum variance for attention-guided sparse adversarial attacks", JOURNAL = PR, VOLUME = "133", YEAR = "2023", PAGES = "108979", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT140878"} @article{bb144892, AUTHOR = "Li, T. and Li, M. and Yang, Y.H. and Deng, C.", TITLE = "Frequency domain regularization for iterative adversarial attacks", JOURNAL = PR, VOLUME = "134", YEAR = "2023", PAGES = "109075", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT140879"} @article{bb144893, AUTHOR = "Dong, Y.P. and Cheng, S.Y. and Pang, T.Y. and Su, H. and Zhu, J.", TITLE = "Query-Efficient Black-Box Adversarial Attacks Guided by a Transfer-Based Prior", JOURNAL = PAMI, VOLUME = "44", YEAR = "2022", NUMBER = "12", MONTH = "December", PAGES = "9536-9548", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT140880"} @article{bb144894, AUTHOR = "Hu, C. and Xu, H.Q. and Wu, X.J.", TITLE = "Substitute Meta-Learning for Black-Box Adversarial Attack", JOURNAL = SPLetters, VOLUME = "29", YEAR = "2022", PAGES = "2472-2476", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT140881"} @article{bb144895, AUTHOR = "Theagarajan, R. and Bhanu, B.", TITLE = "Privacy Preserving Defense For Black Box Classifiers Against On-Line Adversarial Attacks", JOURNAL = PAMI, VOLUME = "44", YEAR = "2022", NUMBER = "12", MONTH = "December", PAGES = "9503-9520", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT140882"} @article{bb144896, AUTHOR = "Hu, C.Y. and Shi, W.W. and Tian, L. and Li, W.", TITLE = "Adversarial Neon Beam: A light-based physical attack to DNNs", JOURNAL = CVIU, VOLUME = "238", YEAR = "2024", PAGES = "103877", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT140883"} @article{bb144897, AUTHOR = "Hu, C.Y. and Shi, W.W. and Tian, L.", TITLE = "Adversarial color projection: A projector-based physical-world attack to DNNs", JOURNAL = IVC, VOLUME = "140", YEAR = "2023", PAGES = "104861", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT140884"} @article{bb144898, AUTHOR = "Shi, Y.C. and Han, Y.H. and Hu, Q.H. and Yang, Y. and Tian, Q.", TITLE = "Query-Efficient Black-Box Adversarial Attack With Customized Iteration and Sampling", JOURNAL = PAMI, VOLUME = "45", YEAR = "2023", NUMBER = "2", MONTH = "February", PAGES = "2226-2245", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT140885"} @article{bb144899, AUTHOR = "Wei, X.X. and Guo, Y. and Yu, J. and Zhang, B.", TITLE = "Simultaneously Optimizing Perturbations and Positions for Black-Box Adversarial Patch Attacks", JOURNAL = PAMI, VOLUME = "45", YEAR = "2023", NUMBER = "7", MONTH = "July", PAGES = "9041-9054", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT140886"}