@inproceedings{bb163500,
        AUTHOR = "Haque, M. and Chauhan, A. and Liu, C. and Yang, W.",
        TITLE = "ILFO: Adversarial Attack on Adaptive Neural Networks",
        BOOKTITLE = CVPR20,
        YEAR = "2020",
        PAGES = "14252-14261",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT159351"}

@inproceedings{bb163501,
        AUTHOR = "Zhou, M. and Wu, J. and Liu, Y. and Liu, S. and Zhu, C.",
        TITLE = "DaST: Data-Free Substitute Training for Adversarial Attacks",
        BOOKTITLE = CVPR20,
        YEAR = "2020",
        PAGES = "231-240",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT159352"}

@inproceedings{bb163502,
        AUTHOR = "Ganeshan, A. and Vivek, B.S. and Radhakrishnan, V.B.",
        TITLE = "FDA: Feature Disruptive Attack",
        BOOKTITLE = ICCV19,
        YEAR = "2019",
        PAGES = "8068-8078",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT159353"}

@inproceedings{bb163503,
        AUTHOR = "Han, J. and Dong, X. and Zhang, R. and Chen, D. and Zhang, W. and Yu, N. and Luo, P. and Wang, X.",
        TITLE = "Once a MAN: Towards Multi-Target Attack via Learning Multi-Target
Adversarial Network Once",
        BOOKTITLE = ICCV19,
        YEAR = "2019",
        PAGES = "5157-5166",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT159354"}

@inproceedings{bb163504,
        AUTHOR = "Deng, Y. and Karam, L.J.",
        TITLE = "Universal Adversarial Attack Via Enhanced Projected Gradient Descent",
        BOOKTITLE = ICIP20,
        YEAR = "2020",
        PAGES = "1241-1245",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT159355"}

@inproceedings{bb163505,
        AUTHOR = "Sun, C. and Chen, S. and Cai, J. and Huang, X.",
        TITLE = "Type I Attack For Generative Models",
        BOOKTITLE = ICIP20,
        YEAR = "2020",
        PAGES = "593-597",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT159356"}

@inproceedings{bb163506,
        AUTHOR = "Braunegg, A. and Chakraborty, A. and Krumdick, M. and Lape, N. and Leary, S. and Manville, K. and Merkhofer, E. and Strickhart, L. and Walmer, M.",
        TITLE = "Apricot: A Dataset of Physical Adversarial Attacks on Object Detection",
        BOOKTITLE = ECCV20,
        YEAR = "2020",
        PAGES = "XXI:35-50",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT159357"}

@inproceedings{bb163507,
        AUTHOR = "Zhang, H. and Zhu, L.C. and Zhu, Y. and Yang, Y.",
        TITLE = "Motion-Excited Sampler: Video Adversarial Attack with Sparked Prior",
        BOOKTITLE = ECCV20,
        YEAR = "2020",
        PAGES = "XX:240-256",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT159358"}

@inproceedings{bb163508,
        AUTHOR = "Gao, L.L. and Zhang, Q.L. and Song, J.K. and Liu, X.L. and Shen, H.T.",
        TITLE = "Patch-wise Attack for Fooling Deep Neural Network",
        BOOKTITLE = ECCV20,
        YEAR = "2020",
        PAGES = "XXVIII:307-322",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT159359"}

@inproceedings{bb163509,
        AUTHOR = "Bai, J.W. and Chen, B. and Li, Y.M. and Wu, D.X. and Guo, W.W. and Xia, S.T. and Yang, E.H.",
        TITLE = "Targeted Attack for Deep Hashing Based Retrieval",
        BOOKTITLE = ECCV20,
        YEAR = "2020",
        PAGES = "I:618-634",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT159360"}

@inproceedings{bb163510,
        AUTHOR = "Nakka, K.K. and Salzmann, M.",
        TITLE = "Indirect Local Attacks for Context-aware Semantic Segmentation Networks",
        BOOKTITLE = ECCV20,
        YEAR = "2020",
        PAGES = "V:611-628",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT159361"}

@inproceedings{bb163511,
        AUTHOR = "Wu, Z.X. and Lim, S.N. and Davis, L.S. and Goldstein, T.",
        TITLE = "Making an Invisibility Cloak: Real World Adversarial Attacks on Object
Detectors",
        BOOKTITLE = ECCV20,
        YEAR = "2020",
        PAGES = "IV:1-17",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT159362"}

@inproceedings{bb163512,
        AUTHOR = "Li, Q.Z. and Guo, Y.W. and Chen, H.",
        TITLE = "Yet Another Intermediate-level Attack",
        BOOKTITLE = ECCV20,
        YEAR = "2020",
        PAGES = "XVI: 241-257",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT159363"}

@inproceedings{bb163513,
        AUTHOR = "Li, M. and Deng, C. and Li, T. and Yan, J. and Gao, X. and Huang, H.",
        TITLE = "Towards Transferable Targeted Attack",
        BOOKTITLE = CVPR20,
        YEAR = "2020",
        PAGES = "638-646",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT159364"}

@inproceedings{bb163514,
        AUTHOR = "Gupta, S. and Dube, P. and Verma, A.",
        TITLE = "Improving the affordability of robustness training for DNNs",
        BOOKTITLE = AML-CV20,
        YEAR = "2020",
        PAGES = "3383-3392",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT159365"}

@inproceedings{bb163515,
        AUTHOR = "Zhang, Z. and Wu, T.",
        TITLE = "Learning Ordered Top-k Adversarial Attacks via Adversarial
Distillation",
        BOOKTITLE = AML-CV20,
        YEAR = "2020",
        PAGES = "3364-3373",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT159366"}

@inproceedings{bb163516,
        AUTHOR = "Chen, X. and Yan, X. and Zheng, F. and Jiang, Y. and Xia, S. and Zhao, Y. and Ji, R.",
        TITLE = "One-Shot Adversarial Attacks on Visual Tracking With Dual Attention",
        BOOKTITLE = CVPR20,
        YEAR = "2020",
        PAGES = "10173-10182",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT159367"}

@inproceedings{bb163517,
        AUTHOR = "Zhou, H. and Chen, D. and Liao, J. and Chen, K. and Dong, X. and Liu, K. and Zhang, W. and Hua, G. and Yu, N.",
        TITLE = "LG-GAN: Label Guided Adversarial Network for Flexible Targeted Attack
of Point Cloud Based Deep Networks",
        BOOKTITLE = CVPR20,
        YEAR = "2020",
        PAGES = "10353-10362",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT159368"}

@inproceedings{bb163518,
        AUTHOR = "Machiraju, H. and Balasubramanian, V.N.",
        TITLE = "A Little Fog for a Large Turn",
        BOOKTITLE = WACV20,
        YEAR = "2020",
        PAGES = "2891-2900",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT159369"}

@inproceedings{bb163519,
        AUTHOR = "Yang, C.H. and Liu, Y. and Chen, P. and Ma, X. and Tsai, Y.J.",
        TITLE = "When Causal Intervention Meets Adversarial Examples and Image Masking
for Deep Neural Networks",
        BOOKTITLE = ICIP19,
        YEAR = "2019",
        PAGES = "3811-3815",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT159370"}

@inproceedings{bb163520,
        AUTHOR = "Yao, H. and Regan, M. and Yang, Y. and Ren, Y.",
        TITLE = "Image Decomposition and Classification Through a Generative Model",
        BOOKTITLE = ICIP19,
        YEAR = "2019",
        PAGES = "400-404",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT159371"}

@inproceedings{bb163521,
        AUTHOR = "Li, J. and Ji, R. and Liu, H. and Hong, X. and Gao, Y. and Tian, Q.",
        TITLE = "Universal Perturbation Attack Against Image Retrieval",
        BOOKTITLE = ICCV19,
        YEAR = "2019",
        PAGES = "4898-4907",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT159372"}

@inproceedings{bb163522,
        AUTHOR = "Finlay, C. and Pooladian, A. and Oberman, A.",
        TITLE = "The LogBarrier Adversarial Attack:
Making Effective Use of Decision Boundary Information",
        BOOKTITLE = ICCV19,
        YEAR = "2019",
        PAGES = "4861-4869",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT159373"}

@inproceedings{bb163523,
        AUTHOR = "Jandial, S. and Mangla, P. and Varshney, S. and Balasubramanian, V.",
        TITLE = "AdvGAN++: Harnessing Latent Layers for Adversary Generation",
        BOOKTITLE = NeruArch19,
        YEAR = "2019",
        PAGES = "2045-2048",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT159374"}

@inproceedings{bb163524,
        AUTHOR = "Wang, C.L. and Bunel, R. and Dvijotham, K. and Huang, P.S. and Grefenstette, E. and Kohli, P.",
        TITLE = "Knowing When to Stop: Evaluation and Verification of Conformity to
Output-Size Specifications",
        BOOKTITLE = CVPR19,
        YEAR = "2019",
        PAGES = "12252-12261",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT159375"}

@inproceedings{bb163525,
        AUTHOR = "Modas, A. and Moosavi Dezfooli, S.M. and Frossard, P.",
        TITLE = "SparseFool: A Few Pixels Make a Big Difference",
        BOOKTITLE = CVPR19,
        YEAR = "2019",
        PAGES = "9079-9088",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT159376"}

@inproceedings{bb163526,
        AUTHOR = "Yao, Z.W. and Gholami, A. and Xu, P. and Keutzer, K. and Mahoney, M.W.",
        TITLE = "Trust Region Based Adversarial Attack on Neural Networks",
        BOOKTITLE = CVPR19,
        YEAR = "2019",
        PAGES = "11342-11351",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT159377"}

@inproceedings{bb163527,
        AUTHOR = "Zeng, X.H. and Liu, C.X. and Wang, Y.S. and Qiu, W.C. and Xie, L.X. and Tai, Y.W. and Tang, C.K. and Yuille, A.L.",
        TITLE = "Adversarial Attacks Beyond the Image Space",
        BOOKTITLE = CVPR19,
        YEAR = "2019",
        PAGES = "4297-4306",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT159378"}

@inproceedings{bb163528,
        AUTHOR = "Corneanu, C.A. and Madadi, M. and Escalera, S. and Martinez, A.M.",
        TITLE = "What Does It Mean to Learn in Deep Networks? And, How Does One Detect
Adversarial Attacks?",
        BOOKTITLE = CVPR19,
        YEAR = "2019",
        PAGES = "4752-4761",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT159379"}

@inproceedings{bb163529,
        AUTHOR = "Liu, X.Q. and Hsieh, C.J.",
        TITLE = "Rob-GAN: Generator, Discriminator, and Adversarial Attacker",
        BOOKTITLE = CVPR19,
        YEAR = "2019",
        PAGES = "11226-11235",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT159380"}

@inproceedings{bb163530,
        AUTHOR = "Gupta, P. and Rahtu, E.",
        TITLE = "MLAttack: Fooling Semantic Segmentation Networks by Multi-layer Attacks",
        BOOKTITLE = GCPR19,
        YEAR = "2019",
        PAGES = "401-413",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT159381"}

@inproceedings{bb163531,
        AUTHOR = "Zhao, W. and Yang, P.P. and Ni, R.R. and Zhao, Y. and Li, W.J.",
        TITLE = "Cycle GAN-Based Attack on Recaptured Images to Fool both Human and
Machine",
        BOOKTITLE = IWDW18,
        YEAR = "2018",
        PAGES = "83-92",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT159382"}

@inproceedings{bb163532,
        AUTHOR = "Xu, X.J. and Chen, X.Y. and Liu, C. and Rohrbach, A. and Darrell, T.J. and Song, D.",
        TITLE = "Fooling Vision and Language Models Despite Localization and Attention
Mechanism",
        BOOKTITLE = CVPR18,
        YEAR = "2018",
        PAGES = "4951-4961",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT159383"}

@inproceedings{bb163533,
        AUTHOR = "Dong, Y. and Liao, F. and Pang, T. and Su, H. and Zhu, J. and Hu, X. and Li, J.",
        TITLE = "Boosting Adversarial Attacks with Momentum",
        BOOKTITLE = CVPR18,
        YEAR = "2018",
        PAGES = "9185-9193",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT159384"}

@inproceedings{bb163534,
        AUTHOR = "Eykholt, K. and Evtimov, I. and Fernandes, E. and Li, B. and Rahmati, A. and Xiao, C. and Prakash, A. and Kohno, T. and Song, D.",
        TITLE = "Robust Physical-World Attacks on Deep Learning Visual Classification",
        BOOKTITLE = CVPR18,
        YEAR = "2018",
        PAGES = "1625-1634",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT159385"}

@article{bb163535,
        AUTHOR = "Chen, X. and Ma, Y.N. and Lu, S.W. and Yao, Y.",
        TITLE = "Boundary augment: A data augment method to defend poison attack",
        JOURNAL = IET-IPR,
        VOLUME = "15",
        YEAR = "2021",
        NUMBER = "13",
        PAGES = "3292-3303",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159386"}

@article{bb163536,
        AUTHOR = "Ma, K. and Xu, Q.Q. and Zeng, J.S. and Cao, X.C. and Huang, Q.M.",
        TITLE = "Poisoning Attack Against Estimating From Pairwise Comparisons",
        JOURNAL = PAMI,
        VOLUME = "44",
        YEAR = "2022",
        NUMBER = "10",
        MONTH = "October",
        PAGES = "6393-6408",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159387"}

@article{bb163537,
        AUTHOR = "Zhang, J. and Chen, D.D. and Huang, Q.D. and Liao, J. and Zhang, W.M. and Feng, H.M. and Hua, G. and Yu, N.H.",
        TITLE = "Poison Ink: Robust and Invisible Backdoor Attack",
        JOURNAL = IP,
        VOLUME = "31",
        YEAR = "2022",
        PAGES = "5691-5705",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159388"}

@article{bb163538,
        AUTHOR = "Gao, Y.H. and Li, Y.M. and Zhu, L.H. and Wu, D.X. and Jiang, Y. and Xia, S.T.",
        TITLE = "Not All Samples Are Born Equal:
Towards Effective Clean-Label Backdoor Attacks",
        JOURNAL = PR,
        VOLUME = "139",
        YEAR = "2023",
        PAGES = "109512",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159389"}

@article{bb163539,
        AUTHOR = "Ma, Q.L. and Qin, J.P. and Yan, K. and Wang, L. and Sun, H.",
        TITLE = "Stealthy Frequency-Domain Backdoor Attacks:
Fourier Decomposition and Fundamental Frequency Injection",
        JOURNAL = SPLetters,
        VOLUME = "30",
        YEAR = "2023",
        PAGES = "1677-1681",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159390"}

@article{bb163540,
        AUTHOR = "Zhang, Z. and Yuan, X. and Zhu, L. and Song, J.K. and Nie, L.Q.",
        TITLE = "BadCM: Invisible Backdoor Attack Against Cross-Modal Learning",
        JOURNAL = IP,
        VOLUME = "33",
        YEAR = "2024",
        PAGES = "2558-2571",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159391"}

@article{bb163541,
        AUTHOR = "Wang, K.Y. and Deng, H.X. and Xu, Y.J. and Liu, Z.L. and Fang, Y.",
        TITLE = "Multi-target label backdoor attacks on graph neural networks",
        JOURNAL = PR,
        VOLUME = "152",
        YEAR = "2024",
        PAGES = "110449",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159392"}

@article{bb163542,
        AUTHOR = "Niu, Z.X. and Sun, Y.Y. and Miao, Q.G. and Jin, R. and Hua, G.",
        TITLE = "Towards Unified Robustness Against Both Backdoor and Adversarial
Attacks",
        JOURNAL = PAMI,
        VOLUME = "46",
        YEAR = "2024",
        NUMBER = "12",
        MONTH = "December",
        PAGES = "7589-7605",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159393"}

@article{bb163543,
        AUTHOR = "Wang, B. and Yu, F. and Wei, F. and Li, Y. and Wang, W.",
        TITLE = "Invisible Intruders: Label-Consistent Backdoor Attack Using
Re-Parameterized Noise Trigger",
        JOURNAL = MultMed,
        VOLUME = "26",
        YEAR = "2024",
        PAGES = "10766-10778",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159394"}

@article{bb163544,
        AUTHOR = "Chen, W.M. and Xu, X.W. and Wang, X.D. and Zhou, H.S. and Li, Z. and Chen, Y.M.",
        TITLE = "Invisible backdoor attack with attention and steganography",
        JOURNAL = CVIU,
        VOLUME = "249",
        YEAR = "2024",
        PAGES = "104208",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159395"}

@article{bb163545,
        AUTHOR = "Hou, L.S. and Hua, Z.Y. and Li, Y.H. and Zheng, Y.F. and Zhang, L.Y.",
        TITLE = "M-to-N Backdoor Paradigm: A Multi-Trigger and Multi-Target Attack to
Deep Learning Models",
        JOURNAL = CirSysVideo,
        VOLUME = "34",
        YEAR = "2024",
        NUMBER = "11",
        MONTH = "November",
        PAGES = "11299-11312",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159396"}

@article{bb163546,
        AUTHOR = "Tang, W.X. and Li, J.H. and Rao, Y. and Zhou, Z. and Peng, F.",
        TITLE = "A trigger-perceivable backdoor attack framework driven by image
steganography",
        JOURNAL = PR,
        VOLUME = "161",
        YEAR = "2025",
        PAGES = "111262",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159397"}

@article{bb163547,
        AUTHOR = "Feng, Y. and Ma, B.T. and Liu, D.N. and Zhang, Y.N. and Cai, W.D. and Xia, Y.",
        TITLE = "Contrastive Neuron Pruning for Backdoor Defense",
        JOURNAL = IP,
        VOLUME = "34",
        YEAR = "2025",
        PAGES = "1234-1245",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159398"}

@article{bb163548,
        AUTHOR = "Sundar, A.P. and Li, F. and Zou, X. and Gao, T. and Hosler, R.",
        TITLE = "Vaccination Against Backdoor Attacks on Federated Learning Systems",
        JOURNAL = SMCS,
        VOLUME = "55",
        YEAR = "2025",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "4434-4443",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159399"}

@article{bb163549,
        AUTHOR = "Hou, L.S. and Hua, Z.Y. and Luo, W. and Zhang, L.Y.",
        TITLE = "FixGuard: Repairing Backdoored Models via Class-Wise Trigger Recovery
and Unlearning",
        JOURNAL = SPLetters,
        VOLUME = "32",
        YEAR = "2025",
        PAGES = "2544-2548",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159400"}

@article{bb163550,
        AUTHOR = "Zhang, X.Y. and Jin, Y.L. and Tong, H.Y. and Lou, J. and Wu, K. and Chen, X.F.",
        TITLE = "Purifier+: Plug-and-Play Backdoor Mitigation for Pre-Trained Models
via Activation Alignment",
        JOURNAL = MultMed,
        VOLUME = "27",
        YEAR = "2025",
        PAGES = "3910-3924",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159401"}

@article{bb163551,
        AUTHOR = "Wu, B.Y. and Chen, H.R. and Zhang, M.D. and Zhu, Z.H. and Wei, S.K. and Yuan, D.N. and Zhu, M.L. and Wang, R.T. and Liu, L. and Shen, C.",
        TITLE = "BackdoorBench: A Comprehensive Benchmark and Analysis of Backdoor
Learning",
        JOURNAL = IJCV,
        VOLUME = "133",
        YEAR = "2025",
        NUMBER = "8",
        MONTH = "August",
        PAGES = "5700-5787",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159402"}

@article{bb163552,
        AUTHOR = "Wu, S.X. and He, Q. and Yu, J. and Sang, J.",
        TITLE = "Backdoor for Debias: Mitigating Model Bias With Backdoor Attack-Based
Artificial Bias",
        JOURNAL = CirSysVideo,
        VOLUME = "35",
        YEAR = "2025",
        NUMBER = "8",
        MONTH = "August",
        PAGES = "8421-8432",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159403"}

@article{bb163553,
        AUTHOR = "Wu, Z.X. and Wen, J. and Peng, W.L. and Zhou, Y. and Zhang, Z.W.",
        TITLE = "IBSD: Iterable Black-Box Self-Defense Against Backdoor Attacks",
        JOURNAL = SPLetters,
        VOLUME = "32",
        YEAR = "2025",
        PAGES = "3979-3983",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159404"}

@article{bb163554,
        AUTHOR = "Zhang, Y.L. and Pu, Y.J. and Li, J.Z. and Zhao, S.X. and Lang, B.",
        TITLE = "TSBA: A two-stage poison-only backdoor attack on visual object
tracking",
        JOURNAL = PR,
        VOLUME = "171",
        YEAR = "2026",
        PAGES = "112222",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159405"}

@article{bb163555,
        AUTHOR = "Li, S. and Zhang, J. and Qi, Y. and Chen, K.J. and Zhang, T.W. and Zhang, W.M. and Yu, N.H.",
        TITLE = "Clean Image May Be Dangerous:
Data Poisoning Attacks Against Deep Hashing",
        JOURNAL = MultMed,
        VOLUME = "27",
        YEAR = "2025",
        PAGES = "8541-8554",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159406"}

@article{bb163556,
        AUTHOR = "Hao, L.G. and Hao, K.R. and Wei, B. and Tang, X.S.",
        TITLE = "Multi-target federated backdoor attack based on feature aggregation",
        JOURNAL = PR,
        VOLUME = "172",
        YEAR = "2026",
        PAGES = "112333",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159407"}

@article{bb163557,
        AUTHOR = "Huang, L. and Zhang, L.Y. and Chang, C.C. and Wang, W. and Qin, C.",
        TITLE = "Backdoor defense based on adversarial prediction proximity and
contrastive knowledge distillation",
        JOURNAL = PR,
        VOLUME = "172",
        YEAR = "2026",
        PAGES = "112336",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159408"}

@article{bb163558,
        AUTHOR = "Zeng, D.Y. and Liu, Y.P. and Zhang, S.Z. and Zhang, S. and Fang, B.X. and Yang, Z.",
        TITLE = "Perturbation distillation and backdoor feature induction for
universal defense in deep vision models",
        JOURNAL = PR,
        VOLUME = "172",
        YEAR = "2026",
        PAGES = "112485",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159409"}

@article{bb163559,
        AUTHOR = "Li, B.L. and Hu, T. and Liu, X.L. and Xie, J.C. and Yi, P.",
        TITLE = "Generalizable poisoning-resistant backdoor detection and removal
framework: From dataset perspective",
        JOURNAL = PR,
        VOLUME = "172",
        YEAR = "2026",
        PAGES = "112766",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159410"}

@article{bb163560,
        AUTHOR = "Lu, R. and Yu, P. and Huang, Z.T. and Xia, Z.H. and Jiang, X.Y.",
        TITLE = "BAM: Backdoor defense based on adversarial mitigation",
        JOURNAL = PR,
        VOLUME = "172",
        YEAR = "2026",
        PAGES = "112662",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159411"}

@article{bb163561,
        AUTHOR = "Wang, R.T. and Chen, H.R. and Zhu, Z.H. and Liu, L. and Wu, B.Y.",
        TITLE = "Versatile Backdoor Attack With Visible, Semantic, Sample-Specific and
Compatible Triggers",
        JOURNAL = PAMI,
        VOLUME = "48",
        YEAR = "2026",
        NUMBER = "3",
        MONTH = "March",
        PAGES = "3680-3697",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159412"}

@inproceedings{bb163562,
        AUTHOR = "Li, Y.Z. and Li, Y.M. and Wu, B.Y. and Li, L.K. and He, R. and Lyu, S.W.",
        TITLE = "Invisible Backdoor Attack with Sample-Specific Triggers",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "16443-16452",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159413"}

@article{bb163563,
        AUTHOR = "Wang, Z.Q. and Zhang, J. and Shan, S.G. and Chen, X.L.",
        TITLE = "Dynamic Attention Analysis for Backdoor Detection in Text-to-Image
Diffusion Models",
        JOURNAL = PAMI,
        VOLUME = "48",
        YEAR = "2026",
        NUMBER = "3",
        MONTH = "March",
        PAGES = "3652-3665",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159414"}

@article{bb163564,
        AUTHOR = "Li, Z.Q. and Zeng, Y. and Xia, P.F. and Liu, L. and Fu, Z.J. and Li, B.",
        TITLE = "Large language models are good attackers: Efficient and stealthy
textual backdoor attacks",
        JOURNAL = PR,
        VOLUME = "174",
        YEAR = "2026",
        PAGES = "112967",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159415"}

@article{bb163565,
        AUTHOR = "Li, Y. and Wu, X. and Guo, Z.L. and Xiao, L. and Jia, Y.H. and Zhao, S.",
        TITLE = "Backdoor defense for large language models with weak-to-strong
knowledge distillation",
        JOURNAL = PR,
        VOLUME = "175",
        YEAR = "2026",
        PAGES = "113030",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159416"}

@article{bb163566,
        AUTHOR = "Xue, D.Z. and Qian, S.S. and Xu, C.S.",
        TITLE = "A Unified Framework for Backdoor Trigger Segmentation",
        JOURNAL = IP,
        VOLUME = "35",
        YEAR = "2026",
        PAGES = "2364-2379",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159417"}

@article{bb163567,
        AUTHOR = "Zhang, Y.L. and Lang, B.",
        TITLE = "Towards invisible backdoor attacks on multi-object tracking via
suppressed feature learning",
        JOURNAL = PR,
        VOLUME = "176",
        YEAR = "2026",
        PAGES = "113248",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159418"}

@article{bb163568,
        AUTHOR = "Li, J. and Yuan, X.J. and Tian, J. and Lu, S.W. and Yu, D.X.",
        TITLE = "UPGP: Backdoor defense via unlearning perturbation and
orthogonality-constraint gradient projection",
        JOURNAL = PR,
        VOLUME = "176",
        YEAR = "2026",
        PAGES = "113211",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159419"}

@inproceedings{bb163569,
        AUTHOR = "Le Roux, Q. and Teglia, Y. and Bourbao, E. and Moundi, P.L. and Furon, T.",
        TITLE = "BAIT: A New DNN Backdoor Attack Using Inpainted Triggers",
        BOOKTITLE = ICIP25,
        YEAR = "2025",
        PAGES = "510-515",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159420"}

@inproceedings{bb163570,
        AUTHOR = "Yuan, Z.H. and Shi, J. and Zhou, P. and Gong, N.Z.Q. and Sun, L.C.",
        TITLE = "BadToken: Token-level Backdoor Attacks to Multi-modal Large Language
Models",
        BOOKTITLE = CVPR25,
        YEAR = "2025",
        PAGES = "29927-29936",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159421"}

@inproceedings{bb163571,
        AUTHOR = "Zhang, H. and Wang, Z. and Li, B. and Lin, F. and Han, T.X. and Jin, M.Y. and Zhan, C. and Du, M. and Wang, H.W. and Ma, S.Q.",
        TITLE = "Invisible Backdoor Attack against Self-supervised Learning",
        BOOKTITLE = CVPR25,
        YEAR = "2025",
        PAGES = "25790-25801",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159422"}

@inproceedings{bb163572,
        AUTHOR = "Li, Y. and Zhao, Y.C. and Zhu, C.C. and Zhang, J.",
        TITLE = "Infighting in the Dark: Multi-Label Backdoor Attack in Federated
Learning",
        BOOKTITLE = CVPR25,
        YEAR = "2025",
        PAGES = "25770-25779",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159423"}

@inproceedings{bb163573,
        AUTHOR = "Liu, Z. and Zhang, H.",
        TITLE = "Stealthy Backdoor Attack in Self-Supervised Learning Vision Encoders
for Large Vision Language Models",
        BOOKTITLE = CVPR25,
        YEAR = "2025",
        PAGES = "25060-25070",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159424"}

@inproceedings{bb163574,
        AUTHOR = "Zhang, H. and Wang, Y.C. and Yan, S.H. and Zhu, C.Y. and Zhou, Z.Q. and Hou, L.S. and Hu, S. and Li, M.H. and Zhang, Y.J. and Zhang, L.Y.",
        TITLE = "Test-Time Backdoor Detection for Object Detection Models",
        BOOKTITLE = CVPR25,
        YEAR = "2025",
        PAGES = "24377-24386",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159425"}

@inproceedings{bb163575,
        AUTHOR = "Hou, S.Z. and Li, S.Z. and Yao, D.",
        TITLE = "DeDe: Detecting Backdoor Samples for SSL Encoders via Decoders",
        BOOKTITLE = CVPR25,
        YEAR = "2025",
        PAGES = "20675-20684",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159426"}

@inproceedings{bb163576,
        AUTHOR = "Xu, J.H. and Zhang, Z.K. and Hu, R.",
        TITLE = "Detecting Backdoor Attacks in Federated Learning via Direction
Alignment Inspection",
        BOOKTITLE = CVPR25,
        YEAR = "2025",
        PAGES = "20654-20664",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159427"}

@inproceedings{bb163577,
        AUTHOR = "Han, Y.N. and Zhao, B.Y. and Chu, R. and Luo, F. and Sikdar, B. and Lao, Y.J.",
        TITLE = "UIBDiffusion: Universal Imperceptible Backdoor Attack for Diffusion
Models",
        BOOKTITLE = CVPR25,
        YEAR = "2025",
        PAGES = "19186-19196",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159428"}

@inproceedings{bb163578,
        AUTHOR = "Li, W. and Chen, P.Y. and Liu, S. and Wang, R.",
        TITLE = "PSBD: Prediction Shift Uncertainty Unlocks Backdoor Detection",
        BOOKTITLE = CVPR25,
        YEAR = "2025",
        PAGES = "10255-10264",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159429"}

@inproceedings{bb163579,
        AUTHOR = "Lee, C.Y. and Kao, C.C. and Yeh, C.H. and Lu, C.S. and Yu, C.M. and Chen, C.S.",
        TITLE = "Defending Against Repetitive Backdoor Attacks on Semi-Supervised
Learning Through Lens of Rate-Distortion-Perception Trade-Off",
        BOOKTITLE = WACV25,
        YEAR = "2025",
        PAGES = "6465-6474",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159430"}

@inproceedings{bb163580,
        AUTHOR = "Nagaonkar, S. and Tripathi, A.M. and Mishra, A.",
        TITLE = "When Visual State Space Model Meets Backdoor Attacks",
        BOOKTITLE = WACV25,
        YEAR = "2025",
        PAGES = "7419-7428",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159431"}

@inproceedings{bb163581,
        AUTHOR = "Styborski, J. and Lyu, M.Z. and Huang, Y. and Kong, A.",
        TITLE = "Exploiting Supervised Poison Vulnerability to Strengthen
Self-supervised Defense",
        BOOKTITLE = ECCV24,
        YEAR = "2024",
        PAGES = "LXXXII: 265-283",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159432"}

@inproceedings{bb163582,
        AUTHOR = "Fares, S. and Nandakumar, K.",
        TITLE = "Attack To Defend: Exploiting Adversarial Attacks for Detecting
Poisoned Models",
        BOOKTITLE = CVPR24,
        YEAR = "2024",
        PAGES = "24726-24735",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159433"}

@inproceedings{bb163583,
        AUTHOR = "Karim, N. and Arafat, A.A. and Khalid, U. and Guo, Z. and Rahnavard, N.",
        TITLE = "Augmented Neural Fine-tuning for Efficient Backdoor Purification",
        BOOKTITLE = ECCV24,
        YEAR = "2024",
        PAGES = "LXXX: 401-418",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159434"}

@inproceedings{bb163584,
        AUTHOR = "Pham, H. and Ta, T.A. and Tran, A. and Doan, K.D.",
        TITLE = "Flatness-aware Sequential Learning Generates Resilient Backdoors",
        BOOKTITLE = ECCV24,
        YEAR = "2024",
        PAGES = "LXXXVII: 89-107",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159435"}

@inproceedings{bb163585,
        AUTHOR = "Huynh, T. and Tran, A. and Doan, K.D. and Pham, T.",
        TITLE = "Data Poisoning Quantization Backdoor Attack",
        BOOKTITLE = ECCV24,
        YEAR = "2024",
        PAGES = "LXXXIV: 38-54",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159436"}

@inproceedings{bb163586,
        AUTHOR = "Phan, H. and Xiao, J.Q. and Sui, Y. and Zhang, T. and Tang, Z.J. and Shi, C. and Wang, Y. and Chen, Y.Y. and Yuan, B.",
        TITLE = "Clean and Compact: Efficient Data-free Backdoor Defense with Model
Compactness",
        BOOKTITLE = ECCV24,
        YEAR = "2024",
        PAGES = "LX: 273-290",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159437"}

@inproceedings{bb163587,
        AUTHOR = "Jin, H.B. and Chen, R.X. and Chen, J. and Zheng, H.B. and Zhang, Y. and Wang, H.H.",
        TITLE = "Catchbackdoor: Backdoor Detection via Critical Trojan Neural Path
Fuzzing",
        BOOKTITLE = ECCV24,
        YEAR = "2024",
        PAGES = "XLVII: 90-106",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159438"}

@inproceedings{bb163588,
        AUTHOR = "Huang, W.K. and Ye, M. and Shi, Z.K. and Du, B. and Tao, D.C.",
        TITLE = "Fisher Calibration for Backdoor-robust Heterogeneous Federated Learning",
        BOOKTITLE = ECCV24,
        YEAR = "2024",
        PAGES = "XV: 247-265",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159439"}

@inproceedings{bb163589,
        AUTHOR = "Wang, R.F. and Guo, Q. and Li, H.L. and Wan, R.J.",
        TITLE = "Event Trojan: Asynchronous Event-based Backdoor Attacks",
        BOOKTITLE = ECCV24,
        YEAR = "2024",
        PAGES = "VII: 315-332",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159440"}

@inproceedings{bb163590,
        AUTHOR = "Cheng, S.Y. and Shen, G.Y. and Zhang, K.Y. and Tao, G.H. and An, S.W. and Guo, H.X. and Ma, S.Q. and Zhang, X.Y.",
        TITLE = "Unit: Backdoor Mitigation via Automated Neural Distribution Tightening",
        BOOKTITLE = ECCV24,
        YEAR = "2024",
        PAGES = "LXII: 262-281",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159441"}

@inproceedings{bb163591,
        AUTHOR = "Cai, K. and Zhang, Z.K. and Lou, Q. and Yao, F.",
        TITLE = "WBP: Training-time Backdoor Attacks Through Hardware-based Weight Bit
Poisoning",
        BOOKTITLE = ECCV24,
        YEAR = "2024",
        PAGES = "LXV: 179-197",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159442"}

@inproceedings{bb163592,
        AUTHOR = "Lyu, W.M. and Pang, L. and Ma, T.F. and Ling, H.B. and Chen, C.",
        TITLE = "TROJVLM: Backdoor Attack Against Vision Language Models",
        BOOKTITLE = ECCV24,
        YEAR = "2024",
        PAGES = "LXV: 467-483",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159443"}

@inproceedings{bb163593,
        AUTHOR = "Shin, J.J.",
        TITLE = "Mask-Based Invisible Backdoor Attacks on Object Detection",
        BOOKTITLE = ICIP24,
        YEAR = "2024",
        PAGES = "1050-1056",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159444"}

@inproceedings{bb163594,
        AUTHOR = "Li, B. and Cai, Y. and Li, H. and Xue, F. and Li, Z.F. and Li, Y.M.",
        TITLE = "Nearest is Not Dearest: Towards Practical Defense Against
Quantization-Conditioned Backdoor Attacks",
        BOOKTITLE = CVPR24,
        YEAR = "2024",
        PAGES = "24523-24533",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159445"}

@inproceedings{bb163595,
        AUTHOR = "Guan, J. and Liang, J. and He, R.",
        TITLE = "Backdoor Defense via Test-Time Detecting and Repairing",
        BOOKTITLE = CVPR24,
        YEAR = "2024",
        PAGES = "24564-24573",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159446"}

@inproceedings{bb163596,
        AUTHOR = "Cheng, S.Y. and Tao, G.H. and Liu, Y.Q. and Shen, G.Y. and An, S.W. and Feng, S.W. and Xu, X.Z. and Zhang, K.Y. and Ma, S.Q. and Zhang, X.Y.",
        TITLE = "Lotus: Evasive and Resilient Backdoor Attacks through
Sub-Partitioning",
        BOOKTITLE = CVPR24,
        YEAR = "2024",
        PAGES = "24798-24809",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159447"}

@inproceedings{bb163597,
        AUTHOR = "Hammoud, H.A.A.K. and Liu, S.M. and Alkhrashi, M. and AlBalawi, F. and Ghanem, B.",
        TITLE = "Look, Listen, and Attack:
Backdoor Attacks Against Video Action Recognition",
        BOOKTITLE = SAIAD24,
        YEAR = "2024",
        PAGES = "3439-3450",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159448"}

@inproceedings{bb163598,
        AUTHOR = "Zhang, J.H. and Liu, H.B. and Jia, J.Y. and Gong, N.Z.Q.",
        TITLE = "Data Poisoning Based Backdoor Attacks to Contrastive Learning",
        BOOKTITLE = CVPR24,
        YEAR = "2024",
        PAGES = "24357-24366",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159449"}

@inproceedings{bb163599,
        AUTHOR = "Yin, W. and Lou, J. and Zhou, P. and Xie, Y. and Feng, D. and Sun, Y.H. and Zhang, T. and Sun, L.C.",
        TITLE = "Physical Backdoor: Towards Temperature-Based Backdoor Attacks in the
Physical World",
        BOOKTITLE = CVPR24,
        YEAR = "2024",
        PAGES = "12733-12743",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159450"}

Last update:Apr 23, 2026 at 15:05:02