| _ | trojan | _ |
| BppAttack: Stealthy and Efficient | trojan | Attacks against Deep Neural Networks via Image Quantization and Contrastive Adversarial Learning |
| Can Optical | trojan | s Assist Adversarial Perturbations? |
| Catchbackdoor: Backdoor Detection via Critical | trojan | Neural Path Fuzzing |
| Deep-TROJ: An Inference Stage | trojan | Insertion Algorithm Through Efficient Weight Replacement Attack |
| Event | trojan | : Asynchronous Event-based Backdoor Attacks |
| Hardly Perceptible | trojan | Attack Against Neural Networks with Bit Flips |
| Live | trojan | Attacks on Deep Neural Networks |
| Mind the | trojan | Horse: Image Prompt Adapter Enabling Scalable and Deceptive Jailbreaking |
| Practical Detection of | trojan | Neural Networks: Data-limited and Data-free Cases |
| Pre-trained | trojan | Attacks for Visual Recognition |
| ProFlip: Targeted | trojan | Attack with Progressive Bit Flips |
| Quarantine: Sparsity Can Uncover the | trojan | Attack Trigger for Free |
| SSL-Cleanse: | trojan | Detection and Mitigation in Self-supervised Learning |
| TBT: Targeted Neural Network Attack With Bit | trojan | |
| Towards Effective and Robust Neural | trojan | Defenses via Input Filtering |
| trojan | Signatures in DNN Weights |
| TrojDiff: | trojan | Attacks on Diffusion Models with Diverse Targets |
| TrojViT: | trojan | Insertion in Vision Transformers |
| VL- | trojan | : Multimodal Instruction Backdoor Attacks against Autoregressive Visual Language Models |
19 for trojan