@inproceedings{bb144800,
        AUTHOR = "Yang, C.H. and Liu, Y. and Chen, P. and Ma, X. and Tsai, Y.J.",
        TITLE = "When Causal Intervention Meets Adversarial Examples and Image Masking
for Deep Neural Networks",
        BOOKTITLE = ICIP19,
        YEAR = "2019",
        PAGES = "3811-3815",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140787"}

@inproceedings{bb144801,
        AUTHOR = "Yao, H. and Regan, M. and Yang, Y. and Ren, Y.",
        TITLE = "Image Decomposition and Classification Through a Generative Model",
        BOOKTITLE = ICIP19,
        YEAR = "2019",
        PAGES = "400-404",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140788"}

@inproceedings{bb144802,
        AUTHOR = "Li, J. and Ji, R. and Liu, H. and Hong, X. and Gao, Y. and Tian, Q.",
        TITLE = "Universal Perturbation Attack Against Image Retrieval",
        BOOKTITLE = ICCV19,
        YEAR = "2019",
        PAGES = "4898-4907",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140789"}

@inproceedings{bb144803,
        AUTHOR = "Finlay, C. and Pooladian, A. and Oberman, A.",
        TITLE = "The LogBarrier Adversarial Attack:
Making Effective Use of Decision Boundary Information",
        BOOKTITLE = ICCV19,
        YEAR = "2019",
        PAGES = "4861-4869",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140790"}

@inproceedings{bb144804,
        AUTHOR = "Jandial, S. and Mangla, P. and Varshney, S. and Balasubramanian, V.",
        TITLE = "AdvGAN++: Harnessing Latent Layers for Adversary Generation",
        BOOKTITLE = NeruArch19,
        YEAR = "2019",
        PAGES = "2045-2048",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140791"}

@inproceedings{bb144805,
        AUTHOR = "Wang, C.L. and Bunel, R. and Dvijotham, K. and Huang, P.S. and Grefenstette, E. and Kohli, P.",
        TITLE = "Knowing When to Stop: Evaluation and Verification of Conformity to
Output-Size Specifications",
        BOOKTITLE = CVPR19,
        YEAR = "2019",
        PAGES = "12252-12261",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140792"}

@inproceedings{bb144806,
        AUTHOR = "Modas, A. and Moosavi Dezfooli, S.M. and Frossard, P.",
        TITLE = "SparseFool: A Few Pixels Make a Big Difference",
        BOOKTITLE = CVPR19,
        YEAR = "2019",
        PAGES = "9079-9088",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140793"}

@inproceedings{bb144807,
        AUTHOR = "Yao, Z.W. and Gholami, A. and Xu, P. and Keutzer, K. and Mahoney, M.W.",
        TITLE = "Trust Region Based Adversarial Attack on Neural Networks",
        BOOKTITLE = CVPR19,
        YEAR = "2019",
        PAGES = "11342-11351",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140794"}

@inproceedings{bb144808,
        AUTHOR = "Zeng, X.H. and Liu, C.X. and Wang, Y.S. and Qiu, W.C. and Xie, L.X. and Tai, Y.W. and Tang, C.K. and Yuille, A.L.",
        TITLE = "Adversarial Attacks Beyond the Image Space",
        BOOKTITLE = CVPR19,
        YEAR = "2019",
        PAGES = "4297-4306",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140795"}

@inproceedings{bb144809,
        AUTHOR = "Corneanu, C.A. and Madadi, M. and Escalera, S. and Martinez, A.M.",
        TITLE = "What Does It Mean to Learn in Deep Networks? And, How Does One Detect
Adversarial Attacks?",
        BOOKTITLE = CVPR19,
        YEAR = "2019",
        PAGES = "4752-4761",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140796"}

@inproceedings{bb144810,
        AUTHOR = "Liu, X.Q. and Hsieh, C.J.",
        TITLE = "Rob-GAN: Generator, Discriminator, and Adversarial Attacker",
        BOOKTITLE = CVPR19,
        YEAR = "2019",
        PAGES = "11226-11235",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140797"}

@inproceedings{bb144811,
        AUTHOR = "Gupta, P. and Rahtu, E.",
        TITLE = "MLAttack: Fooling Semantic Segmentation Networks by Multi-layer Attacks",
        BOOKTITLE = GCPR19,
        YEAR = "2019",
        PAGES = "401-413",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140798"}

@inproceedings{bb144812,
        AUTHOR = "Zhao, W. and Yang, P.P. and Ni, R.R. and Zhao, Y. and Li, W.J.",
        TITLE = "Cycle GAN-Based Attack on Recaptured Images to Fool both Human and
Machine",
        BOOKTITLE = IWDW18,
        YEAR = "2018",
        PAGES = "83-92",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140799"}

@inproceedings{bb144813,
        AUTHOR = "Xu, X.J. and Chen, X.Y. and Liu, C. and Rohrbach, A. and Darrell, T.J. and Song, D.",
        TITLE = "Fooling Vision and Language Models Despite Localization and Attention
Mechanism",
        BOOKTITLE = CVPR18,
        YEAR = "2018",
        PAGES = "4951-4961",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140800"}

@inproceedings{bb144814,
        AUTHOR = "Dong, Y. and Liao, F. and Pang, T. and Su, H. and Zhu, J. and Hu, X. and Li, J.",
        TITLE = "Boosting Adversarial Attacks with Momentum",
        BOOKTITLE = CVPR18,
        YEAR = "2018",
        PAGES = "9185-9193",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140801"}

@inproceedings{bb144815,
        AUTHOR = "Eykholt, K. and Evtimov, I. and Fernandes, E. and Li, B. and Rahmati, A. and Xiao, C. and Prakash, A. and Kohno, T. and Song, D.",
        TITLE = "Robust Physical-World Attacks on Deep Learning Visual Classification",
        BOOKTITLE = CVPR18,
        YEAR = "2018",
        PAGES = "1625-1634",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140802"}

@article{bb144816,
        AUTHOR = "Zhang, J. and Chen, D.D. and Huang, Q.D. and Liao, J. and Zhang, W.M. and Feng, H.M. and Hua, G. and Yu, N.H.",
        TITLE = "Poison Ink: Robust and Invisible Backdoor Attack",
        JOURNAL = IP,
        VOLUME = "31",
        YEAR = "2022",
        PAGES = "5691-5705",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140803"}

@article{bb144817,
        AUTHOR = "Gao, Y.H. and Li, Y.M. and Zhu, L. and Wu, D.X. and Jiang, Y. and Xia, S.T.",
        TITLE = "Not All Samples Are Born Equal:
Towards Effective Clean-Label Backdoor Attacks",
        JOURNAL = PR,
        VOLUME = "139",
        YEAR = "2023",
        PAGES = "109512",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140804"}

@article{bb144818,
        AUTHOR = "Wang, Z. and Wang, B.H. and Zhang, C.L. and Liu, Y. and Guo, J.X.",
        TITLE = "Robust Feature-Guided Generative Adversarial Network for Aerial Image
Semantic Segmentation against Backdoor Attacks",
        JOURNAL = RS,
        VOLUME = "15",
        YEAR = "2023",
        NUMBER = "10",
        PAGES = "xx-yy",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140805"}

@article{bb144819,
        AUTHOR = "Wang, Z. and Wang, B.H. and Zhang, C.L. and Liu, Y.",
        TITLE = "Defense against Adversarial Patch Attacks for Aerial Image Semantic
Segmentation by Robust Feature Extraction",
        JOURNAL = RS,
        VOLUME = "15",
        YEAR = "2023",
        NUMBER = "6",
        PAGES = "1690",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140806"}

@article{bb144820,
        AUTHOR = "Wang, Z. and Wang, B.H. and Zhang, C.L. and Liu, Y. and Guo, J.X.",
        TITLE = "Defending against Poisoning Attacks in Aerial Image Semantic
Segmentation with Robust Invariant Feature Enhancement",
        JOURNAL = RS,
        VOLUME = "15",
        YEAR = "2023",
        NUMBER = "12",
        PAGES = "xx-yy",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140807"}

@article{bb144821,
        AUTHOR = "Ma, Q.L. and Qin, J.P. and Yan, K. and Wang, L. and Sun, H.",
        TITLE = "Stealthy Frequency-Domain Backdoor Attacks:
Fourier Decomposition and Fundamental Frequency Injection",
        JOURNAL = SPLetters,
        VOLUME = "30",
        YEAR = "2023",
        PAGES = "1677-1681",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140808"}

@article{bb144822,
        AUTHOR = "Zhang, Z. and Yuan, X. and Zhu, L. and Song, J.K. and Nie, L.Q.",
        TITLE = "BadCM: Invisible Backdoor Attack Against Cross-Modal Learning",
        JOURNAL = IP,
        VOLUME = "33",
        YEAR = "2024",
        PAGES = "2558-2571",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140809"}

@inproceedings{bb144823,
        AUTHOR = "Zhu, Z.X. and Wang, R. and Zou, C. and Jing, L.H.",
        TITLE = "The Victim and The Beneficiary: Exploiting a Poisoned Model to Train
a Clean Model on Poisoned Data",
        BOOKTITLE = ICCV23,
        YEAR = "2023",
        PAGES = "155-164",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140810"}

@inproceedings{bb144824,
        AUTHOR = "Ding, R. and Duan, S.J. and Xu, X.L. and Fei, Y.",
        TITLE = "VertexSerum: Poisoning Graph Neural Networks for Link Inference",
        BOOKTITLE = ICCV23,
        YEAR = "2023",
        PAGES = "4509-4518",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140811"}

@inproceedings{bb144825,
        AUTHOR = "Bansal, H. and Yin, F. and Singhi, N. and Grover, A. and Yang, Y. and Chang, K.W.",
        TITLE = "CleanCLIP: Mitigating Data Poisoning Attacks in Multimodal
Contrastive Learning",
        BOOKTITLE = ICCV23,
        YEAR = "2023",
        PAGES = "112-123",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140812"}

@inproceedings{bb144826,
        AUTHOR = "Sur, I. and Sikka, K. and Walmer, M. and Koneripalli, K. and Roy, A. and Lin, X. and Divakaran, A. and Jha, S.",
        TITLE = "TIJO: Trigger Inversion with Joint Optimization for Defending
Multimodal Backdoored Models",
        BOOKTITLE = ICCV23,
        YEAR = "2023",
        PAGES = "165-175",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140813"}

@inproceedings{bb144827,
        AUTHOR = "Li, C.J. and Pang, R. and Xi, Z. and Du, T.Y. and Ji, S. and Yao, Y. and Wang, T.",
        TITLE = "An Embarrassingly Simple Backdoor Attack on Self-supervised Learning",
        BOOKTITLE = ICCV23,
        YEAR = "2023",
        PAGES = "4344-4355",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140814"}

@inproceedings{bb144828,
        AUTHOR = "Zhu, M.L. and Wei, S. and Shen, L. and Fan, Y.B. and Wu, B.Y.",
        TITLE = "Enhancing Fine-Tuning based Backdoor Defense with Sharpness-Aware
Minimization",
        BOOKTITLE = ICCV23,
        YEAR = "2023",
        PAGES = "4443-4454",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140815"}

@inproceedings{bb144829,
        AUTHOR = "Liu, M. and Sangiovanni Vincentelli, A. and Yue, X.Y.",
        TITLE = "Beating Backdoor Attack at Its Own Game",
        BOOKTITLE = ICCV23,
        YEAR = "2023",
        PAGES = "4597-4606",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140816"}

@inproceedings{bb144830,
        AUTHOR = "Huang, S.Q. and Li, Y.J. and Chen, C. and Shi, L. and Gao, Y.",
        TITLE = "Multi-metrics adaptively identifies backdoors in Federated learning",
        BOOKTITLE = ICCV23,
        YEAR = "2023",
        PAGES = "4629-4639",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140817"}

@inproceedings{bb144831,
        AUTHOR = "Guo, J.F. and Li, A. and Wang, L. and Liu, C.",
        TITLE = "PolicyCleanse: Backdoor Detection and Mitigation for Competitive
Reinforcement Learning",
        BOOKTITLE = ICCV23,
        YEAR = "2023",
        PAGES = "4676-4685",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140818"}

@inproceedings{bb144832,
        AUTHOR = "Shejwalkar, V. and Lyu, L.J. and Houmansadr, A.",
        TITLE = "The Perils of Learning From Unlabeled Data:
Backdoor Attacks on Semi-supervised Learning",
        BOOKTITLE = ICCV23,
        YEAR = "2023",
        PAGES = "4707-4717",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140819"}

@inproceedings{bb144833,
        AUTHOR = "Wu, Y.T. and Han, X. and Qiu, H. and Zhang, T.W.",
        TITLE = "Computation and Data Efficient Backdoor Attacks",
        BOOKTITLE = ICCV23,
        YEAR = "2023",
        PAGES = "4782-4791",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140820"}

@inproceedings{bb144834,
        AUTHOR = "Han, G. and Choi, J. and Hong, H.G. and Kim, J.",
        TITLE = "Data Poisoning Attack Aiming the Vulnerability of Continual Learning",
        BOOKTITLE = ICIP23,
        YEAR = "2023",
        PAGES = "1905-1909",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140821"}

@inproceedings{bb144835,
        AUTHOR = "Huang, B. and Wang, Z.",
        TITLE = "Efficient any-Target Backdoor Attack with Pseudo Poisoned Samples",
        BOOKTITLE = ICIP23,
        YEAR = "2023",
        PAGES = "3319-3323",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140822"}

@inproceedings{bb144836,
        AUTHOR = "Shen, Z. and Hou, W. and Li, Y.",
        TITLE = "CSSBA: A Clean Label Sample-Specific Backdoor Attack",
        BOOKTITLE = ICIP23,
        YEAR = "2023",
        PAGES = "965-969",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140823"}

@inproceedings{bb144837,
        AUTHOR = "Sun, M.J. and Kolter, Z.",
        TITLE = "Single Image Backdoor Inversion via Robust Smoothed Classifiers",
        BOOKTITLE = CVPR23,
        YEAR = "2023",
        PAGES = "8113-8122",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140824"}

@inproceedings{bb144838,
        AUTHOR = "Hammoud, H.A.A.K. and Bibi, A. and Torr, P.H.S. and Ghanem, B.",
        TITLE = "Don't FREAK Out: A Frequency-Inspired Approach to Detecting Backdoor
Poisoned Samples in DNNs",
        BOOKTITLE = AML23,
        YEAR = "2023",
        PAGES = "2338-2345",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140825"}

@inproceedings{bb144839,
        AUTHOR = "Gao, K.F. and Bai, Y. and Gu, J.D. and Yang, Y. and Xia, S.T.",
        TITLE = "Backdoor Defense via Adaptively Splitting Poisoned Dataset",
        BOOKTITLE = CVPR23,
        YEAR = "2023",
        PAGES = "4005-4014",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140826"}

@inproceedings{bb144840,
        AUTHOR = "Chou, S.Y. and Chen, P.Y. and Ho, T.Y.",
        TITLE = "How to Backdoor Diffusion Models?",
        BOOKTITLE = CVPR23,
        YEAR = "2023",
        PAGES = "4015-4024",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140827"}

@inproceedings{bb144841,
        AUTHOR = "Zheng, R.K. and Tang, R.J. and Li, J.Z. and Liu, L.",
        TITLE = "Data-Free Backdoor Removal Based on Channel Lipschitzness",
        BOOKTITLE = ECCV22,
        YEAR = "2022",
        PAGES = "V:175-191",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140828"}

@inproceedings{bb144842,
        AUTHOR = "Dolatabadi, H.M. and Erfani, S. and Leckie, C.",
        TITLE = "Collider: A Robust Training Framework for Backdoor Data",
        BOOKTITLE = ACCV22,
        YEAR = "2022",
        PAGES = "VI:681-698",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140829"}

@inproceedings{bb144843,
        AUTHOR = "Ji, H.X. and Li, J. and Wu, C.",
        TITLE = "CRAB: Certified Patch Robustness Against Poisoning-Based Backdoor
Attacks",
        BOOKTITLE = ICIP22,
        YEAR = "2022",
        PAGES = "2486-2490",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140830"}

@inproceedings{bb144844,
        AUTHOR = "Liu, Y.Q. and Shen, G.Y. and Tao, G.H. and Wang, Z.T. and Ma, S.Q. and Zhang, X.Y.",
        TITLE = "Complex Backdoor Detection by Symmetric Feature Differencing",
        BOOKTITLE = CVPR22,
        YEAR = "2022",
        PAGES = "14983-14993",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140831"}

@inproceedings{bb144845,
        AUTHOR = "Guan, J. and Tu, Z. and He, R. and Tao, D.C.",
        TITLE = "Few-shot Backdoor Defense Using Shapley Estimation",
        BOOKTITLE = CVPR22,
        YEAR = "2022",
        PAGES = "13348-13357",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140832"}

@inproceedings{bb144846,
        AUTHOR = "Tao, G.H. and Shen, G.Y. and Liu, Y.Q. and An, S.W. and Xu, Q.L. and Ma, S.Q. and Li, P. and Zhang, X.Y.",
        TITLE = "Better Trigger Inversion Optimization in Backdoor Scanning",
        BOOKTITLE = CVPR22,
        YEAR = "2022",
        PAGES = "13358-13368",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140833"}

@inproceedings{bb144847,
        AUTHOR = "Chan, S.H. and Dong, Y.P. and Zhu, J. and Zhang, X.L. and Zhou, J.",
        TITLE = "Baddet: Backdoor Attacks on Object Detection",
        BOOKTITLE = AdvRob22,
        YEAR = "2022",
        PAGES = "396-412",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140834"}

@inproceedings{bb144848,
        AUTHOR = "Ramakrishnan, G. and Albarghouthi, A.",
        TITLE = "Backdoors in Neural Models of Source Code",
        BOOKTITLE = "ICPR22",
        YEAR = "2022",
        PAGES = "2892-2899",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140835"}

@inproceedings{bb144849,
        AUTHOR = "Phan, H. and Shi, C. and Xie, Y. and Zhang, T.F. and Li, Z.H. and Zhao, T.M. and Liu, J. and Wang, Y. and Chen, Y.Y. and Yuan, B.",
        TITLE = "RIBAC: Towards Robust and Imperceptible Backdoor Attack against Compact
DNN",
        BOOKTITLE = ECCV22,
        YEAR = "2022",
        PAGES = "IV:708-724",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140836"}

@inproceedings{bb144850,
        AUTHOR = "Feng, Y. and Ma, B. and Zhang, J. and Zhao, S.S. and Xia, Y. and Tao, D.C.",
        TITLE = "FIBA: Frequency-Injection based Backdoor Attack in Medical Image
Analysis",
        BOOKTITLE = CVPR22,
        YEAR = "2022",
        PAGES = "20844-20853",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140837"}

@inproceedings{bb144851,
        AUTHOR = "Zhao, Z.D. and Chen, X.J. and Xuan, Y.X. and Dong, Y. and Wang, D. and Liang, K.",
        TITLE = "DEFEAT: Deep Hidden Feature Backdoor Attacks by Imperceptible
Perturbation and Latent Representation Constraints",
        BOOKTITLE = CVPR22,
        YEAR = "2022",
        PAGES = "15192-15201",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140838"}

@inproceedings{bb144852,
        AUTHOR = "Li, Y.Z. and Li, Y.M. and Wu, B.Y. and Li, L.K. and He, R. and Lyu, S.W.",
        TITLE = "Invisible Backdoor Attack with Sample-Specific Triggers",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "16443-16452",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140839"}

@inproceedings{bb144853,
        AUTHOR = "Doan, K. and Lao, Y.J. and Zhao, W.J. and Li, P.",
        TITLE = "LIRA: Learnable, Imperceptible and Robust Backdoor Attacks",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "11946-11956",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140840"}

@inproceedings{bb144854,
        AUTHOR = "Xiang, Z. and Miller, D.J. and Chen, S. and Li, X. and Kesidis, G.",
        TITLE = "A Backdoor Attack against 3D Point Cloud Classifiers",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "7577-7587",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140841"}

@inproceedings{bb144855,
        AUTHOR = "Ren, Y.K. and Li, L.F. and Zhou, J.",
        TITLE = "Simtrojan: Stealthy Backdoor Attack",
        BOOKTITLE = ICIP21,
        YEAR = "2021",
        PAGES = "819-823",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140842"}

@inproceedings{bb144856,
        AUTHOR = "Zhu, L. and Ning, R. and Xin, C.S. and Wang, C.G. and Wu, H.Y.",
        TITLE = "CLEAR: Clean-up Sample-Targeted Backdoor in Neural Networks",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "16433-16442",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140843"}

@inproceedings{bb144857,
        AUTHOR = "Zeng, Y. and Park, W. and Mao, Z.M. and Jia, R.",
        TITLE = "Rethinking the Backdoor Attacks' Triggers: A Frequency Perspective",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "16453-16461",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140844"}

@inproceedings{bb144858,
        AUTHOR = "Raj, A. and Pal, A. and Arora, C.",
        TITLE = "Identifying Physically Realizable Triggers for Backdoored Face
Recognition Networks",
        BOOKTITLE = ICIP21,
        YEAR = "2021",
        PAGES = "3023-3027",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140845"}

@inproceedings{bb144859,
        AUTHOR = "Wang, R. and Zhang, G.Y. and Liu, S.J. and Chen, P.Y. and Xiong, J.J. and Wang, M.",
        TITLE = "Practical Detection of Trojan Neural Networks:
Data-limited and Data-free Cases",
        BOOKTITLE = ECCV20,
        YEAR = "2020",
        PAGES = "XXIII:222-238",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140846"}

@inproceedings{bb144860,
        AUTHOR = "Liu, Y.F. and Ma, X.J. and Bailey, J. and Lu, F.",
        TITLE = "Reflection Backdoor: A Natural Backdoor Attack on Deep Neural Networks",
        BOOKTITLE = ECCV20,
        YEAR = "2020",
        PAGES = "X:182-199",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140847"}

@inproceedings{bb144861,
        AUTHOR = "Zhao, S. and Ma, X. and Zheng, X. and Bailey, J. and Chen, J. and Jiang, Y.",
        TITLE = "Clean-Label Backdoor Attacks on Video Recognition Models",
        BOOKTITLE = CVPR20,
        YEAR = "2020",
        PAGES = "14431-14440",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140848"}

@inproceedings{bb144862,
        AUTHOR = "Kolouri, S. and Saha, A. and Pirsiavash, H. and Hoffmann, H.",
        TITLE = "Universal Litmus Patterns: Revealing Backdoor Attacks in CNNs",
        BOOKTITLE = CVPR20,
        YEAR = "2020",
        PAGES = "298-307",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140849"}

@inproceedings{bb144863,
        AUTHOR = "Truong, L. and Jones, C. and Hutchinson, B. and August, A. and Praggastis, B. and Jasper, R. and Nichols, N. and Tuor, A.",
        TITLE = "Systematic Evaluation of Backdoor Data Poisoning Attacks on Image
Classifiers",
        BOOKTITLE = AML-CV20,
        YEAR = "2020",
        PAGES = "3422-3431",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140850"}

@inproceedings{bb144864,
        AUTHOR = "Barni, M. and Kallas, K. and Tondi, B.",
        TITLE = "A New Backdoor Attack in CNNS by Training Set Corruption Without
Label Poisoning",
        BOOKTITLE = ICIP19,
        YEAR = "2019",
        PAGES = "101-105",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT140851"}

@article{bb144865,
        AUTHOR = "Goldblum, M. and Tsipras, D. and Xie, C. and Chen, X.Y. and Schwarzschild, A. and Song, D. and Madry, A. and Li, B. and Goldstein, T.",
        TITLE = "Dataset Security for Machine Learning:
Data Poisoning, Backdoor Attacks, and Defenses",
        JOURNAL = PAMI,
        VOLUME = "45",
        YEAR = "2023",
        NUMBER = "2",
        MONTH = "February",
        PAGES = "1563-1580",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT140852"}

@inproceedings{bb144866,
        AUTHOR = "Mu, B.X. and Niu, Z.X. and Wang, L. and Wang, X. and Mia, Q.G. and Jin, R. and Hua, G.",
        TITLE = "Progressive Backdoor Erasing via connecting Backdoor and Adversarial
Attacks",
        BOOKTITLE = CVPR23,
        YEAR = "2023",
        PAGES = "20495-20503",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT140853"}

@inproceedings{bb144867,
        AUTHOR = "Pang, L. and Sun, T. and Ling, H.B. and Chen, C.",
        TITLE = "Backdoor Cleansing with Unlabeled Data",
        BOOKTITLE = CVPR23,
        YEAR = "2023",
        PAGES = "12218-12227",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT140854"}

@inproceedings{bb144868,
        AUTHOR = "Zhang, Z. and Liu, Q. and Wang, Z.C. and Lu, Z. and Hu, Q.Y.",
        TITLE = "Backdoor Defense via Deconfounded Representation Learning",
        BOOKTITLE = CVPR23,
        YEAR = "2023",
        PAGES = "12228-12238",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT140855"}

@inproceedings{bb144869,
        AUTHOR = "Yu, Y. and Wang, Y.F. and Yang, W.H. and Lu, S.J. and Tan, Y.P. and Kot, A.C.",
        TITLE = "Backdoor Attacks Against Deep Image Compression via Adaptive
Frequency Trigger",
        BOOKTITLE = CVPR23,
        YEAR = "2023",
        PAGES = "12250-12259",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT140856"}

@inproceedings{bb144870,
        AUTHOR = "Feng, S.W. and Tao, G.H. and Cheng, S.Y. and Shen, G.Y. and Xu, X.Z. and Liu, Y.Q. and Zhang, K. and Ma, S.Q. and Zhang, X.Y.",
        TITLE = "Detecting Backdoors in Pre-trained Encoders",
        BOOKTITLE = CVPR23,
        YEAR = "2023",
        PAGES = "16352-16362",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT140857"}

@inproceedings{bb144871,
        AUTHOR = "Liu, X. and Li, M.H. and Wang, H.Y. and Hu, S. and Ye, D. and Jin, H. and Wu, L. and Xiao, C.W.",
        TITLE = "Detecting Backdoors During the Inference Stage Based on Corruption
Robustness Consistency",
        BOOKTITLE = CVPR23,
        YEAR = "2023",
        PAGES = "16363-16372",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT140858"}

@inproceedings{bb144872,
        AUTHOR = "Xu, Q. and Tao, G.N. and Honorio, J. and Liu, Y.Q. and An, S.W. and Shen, G.Y. and Cheng, S.Y. and Zhang, X.Y.",
        TITLE = "MEDIC: Remove Model Backdoors via Importance Driven Cloning",
        BOOKTITLE = CVPR23,
        YEAR = "2023",
        PAGES = "20485-20494",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT140859"}

@inproceedings{bb144873,
        AUTHOR = "Chen, S. and Chen, H.L. and Haque, M. and Liu, C. and Yang, W.",
        TITLE = "The Dark Side of Dynamic Routing Neural Networks: Towards Efficiency
Backdoor Injection",
        BOOKTITLE = CVPR23,
        YEAR = "2023",
        PAGES = "24585-24594",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT140860"}

@inproceedings{bb144874,
        AUTHOR = "Bober Irizar, M. and Shumailov, I. and Zhao, Y. and Mullins, R. and Papernot, N.",
        TITLE = "Architectural Backdoors in Neural Networks",
        BOOKTITLE = CVPR23,
        YEAR = "2023",
        PAGES = "24595-24604",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT140861"}

@inproceedings{bb144875,
        AUTHOR = "Yuan, Z. and Zhou, P. and Zou, K. and Cheng, Y.",
        TITLE = "You Are Catching My Attention: Are Vision Transformers Bad Learners
under Backdoor Attacks?",
        BOOKTITLE = CVPR23,
        YEAR = "2023",
        PAGES = "24605-24615",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT140862"}

@inproceedings{bb144876,
        AUTHOR = "Tejankar, A. and Sanjabi, M. and Wang, Q.F. and Wang, S. and Firooz, H. and Pirsiavash, H. and Tan, L.",
        TITLE = "Defending Against Patch-based Backdoor Attacks on Self-Supervised
Learning",
        BOOKTITLE = CVPR23,
        YEAR = "2023",
        PAGES = "12239-12249",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT140863"}

@inproceedings{bb144877,
        AUTHOR = "Saha, A. and Tejankar, A. and Koohpayegani, S.A. and Pirsiavash, H.",
        TITLE = "Backdoor Attacks on Self-Supervised Learning",
        BOOKTITLE = CVPR22,
        YEAR = "2022",
        PAGES = "13327-13336",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT140864"}

@inproceedings{bb144878,
        AUTHOR = "Qi, X.Y. and Xie, T.H. and Pan, R.Z. and Zhu, J.F. and Yang, Y. and Bu, K.",
        TITLE = "Towards Practical Deployment-Stage Backdoor Attack on Deep Neural
Networks",
        BOOKTITLE = CVPR22,
        YEAR = "2022",
        PAGES = "13337-13347",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT140865"}

@inproceedings{bb144879,
        AUTHOR = "Huang, S.J. and Peng, W.Q. and Jia, Z.W. and Tu, Z.W.",
        TITLE = "One-pixel Signature: Characterizing CNN Models for Backdoor Detection",
        BOOKTITLE = ECCV20,
        YEAR = "2020",
        PAGES = "XXVII:326-341",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT140866"}

@article{bb144880,
        AUTHOR = "Hang, J. and Han, K. and Chen, H. and Li, Y.",
        TITLE = "Ensemble adversarial black-box attacks against deep learning systems",
        JOURNAL = PR,
        VOLUME = "101",
        YEAR = "2020",
        PAGES = "107184",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT140867"}

@article{bb144881,
        AUTHOR = "Correia Silva, J.R. and Berriel, R.F. and Badue, C. and de Souza, A.F. and Oliveira Santos, T.",
        TITLE = "Copycat CNN: Are random non-Labeled data enough to steal knowledge
from black-box models?",
        JOURNAL = PR,
        VOLUME = "113",
        YEAR = "2021",
        PAGES = "107830",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT140868"}

@article{bb144882,
        AUTHOR = "Gragnaniello, D. and Marra, F. and Verdoliva, L. and Poggi, G.",
        TITLE = "Perceptual quality-preserving black-box attack against deep learning
image classifiers",
        JOURNAL = PRL,
        VOLUME = "147",
        YEAR = "2021",
        PAGES = "142-149",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT140869"}

@article{bb144883,
        AUTHOR = "Li, N.N. and Chen, Z.Z.",
        TITLE = "Toward Visual Distortion in Black-Box Attacks",
        JOURNAL = IP,
        VOLUME = "30",
        YEAR = "2021",
        PAGES = "6156-6167",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT140870"}

@article{bb144884,
        AUTHOR = "Cina, A.E. and Torcinovich, A. and Pelillo, M.",
        TITLE = "A black-box adversarial attack for poisoning clustering",
        JOURNAL = PR,
        VOLUME = "122",
        YEAR = "2022",
        PAGES = "108306",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT140871"}

@article{bb144885,
        AUTHOR = "Ghosh, A. and Mullick, S.S. and Datta, S. and Das, S. and Das, A.K. and Mallipeddi, R.",
        TITLE = "A black-box adversarial attack strategy with adjustable sparsity and
generalizability for deep image classifiers",
        JOURNAL = PR,
        VOLUME = "122",
        YEAR = "2022",
        PAGES = "108279",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT140872"}

@article{bb144886,
        AUTHOR = "Chen, S. and He, F. and Huang, X.L. and Zhang, K.",
        TITLE = "Relevance attack on detectors",
        JOURNAL = PR,
        VOLUME = "124",
        YEAR = "2022",
        PAGES = "108491",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT140873"}

@article{bb144887,
        AUTHOR = "Wei, X.X. and Yan, H.Q. and Li, B.",
        TITLE = "Sparse Black-Box Video Attack with Reinforcement Learning",
        JOURNAL = IJCV,
        VOLUME = "130",
        YEAR = "2022",
        NUMBER = "6",
        MONTH = "June",
        PAGES = "1459-1473",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT140874"}

@article{bb144888,
        AUTHOR = "Hu, Z.C. and Li, H. and Yuan, L.H. and Cheng, Z. and Yuan, W. and Zhu, M.",
        TITLE = "Model scheduling and sample selection for ensemble adversarial
example attacks",
        JOURNAL = PR,
        VOLUME = "130",
        YEAR = "2022",
        PAGES = "108824",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT140875"}

@article{bb144889,
        AUTHOR = "Huang, L.F. and Wei, S.X. and Gao, C.Y. and Liu, N.",
        TITLE = "Cyclical Adversarial Attack Pierces Black-box Deep Neural Networks",
        JOURNAL = PR,
        VOLUME = "131",
        YEAR = "2022",
        PAGES = "108831",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT140876"}

@article{bb144890,
        AUTHOR = "Peng, B. and Peng, B. and Yong, S.W. and Liu, L.",
        TITLE = "An Empirical Study of Fully Black-Box and Universal Adversarial
Attack for SAR Target Recognition",
        JOURNAL = RS,
        VOLUME = "14",
        YEAR = "2022",
        NUMBER = "16",
        PAGES = "xx-yy",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT140877"}

@article{bb144891,
        AUTHOR = "Li, C. and Yao, W. and Wang, H.D. and Jiang, T.S.",
        TITLE = "Adaptive momentum variance for attention-guided sparse adversarial
attacks",
        JOURNAL = PR,
        VOLUME = "133",
        YEAR = "2023",
        PAGES = "108979",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT140878"}

@article{bb144892,
        AUTHOR = "Li, T. and Li, M. and Yang, Y.H. and Deng, C.",
        TITLE = "Frequency domain regularization for iterative adversarial attacks",
        JOURNAL = PR,
        VOLUME = "134",
        YEAR = "2023",
        PAGES = "109075",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT140879"}

@article{bb144893,
        AUTHOR = "Dong, Y.P. and Cheng, S.Y. and Pang, T.Y. and Su, H. and Zhu, J.",
        TITLE = "Query-Efficient Black-Box Adversarial Attacks Guided by a
Transfer-Based Prior",
        JOURNAL = PAMI,
        VOLUME = "44",
        YEAR = "2022",
        NUMBER = "12",
        MONTH = "December",
        PAGES = "9536-9548",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT140880"}

@article{bb144894,
        AUTHOR = "Hu, C. and Xu, H.Q. and Wu, X.J.",
        TITLE = "Substitute Meta-Learning for Black-Box Adversarial Attack",
        JOURNAL = SPLetters,
        VOLUME = "29",
        YEAR = "2022",
        PAGES = "2472-2476",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT140881"}

@article{bb144895,
        AUTHOR = "Theagarajan, R. and Bhanu, B.",
        TITLE = "Privacy Preserving Defense For Black Box Classifiers Against On-Line
Adversarial Attacks",
        JOURNAL = PAMI,
        VOLUME = "44",
        YEAR = "2022",
        NUMBER = "12",
        MONTH = "December",
        PAGES = "9503-9520",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT140882"}

@article{bb144896,
        AUTHOR = "Hu, C.Y. and Shi, W.W. and Tian, L. and Li, W.",
        TITLE = "Adversarial Neon Beam: A light-based physical attack to DNNs",
        JOURNAL = CVIU,
        VOLUME = "238",
        YEAR = "2024",
        PAGES = "103877",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT140883"}

@article{bb144897,
        AUTHOR = "Hu, C.Y. and Shi, W.W. and Tian, L.",
        TITLE = "Adversarial color projection: A projector-based physical-world attack
to DNNs",
        JOURNAL = IVC,
        VOLUME = "140",
        YEAR = "2023",
        PAGES = "104861",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT140884"}

@article{bb144898,
        AUTHOR = "Shi, Y.C. and Han, Y.H. and Hu, Q.H. and Yang, Y. and Tian, Q.",
        TITLE = "Query-Efficient Black-Box Adversarial Attack With Customized
Iteration and Sampling",
        JOURNAL = PAMI,
        VOLUME = "45",
        YEAR = "2023",
        NUMBER = "2",
        MONTH = "February",
        PAGES = "2226-2245",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT140885"}

@article{bb144899,
        AUTHOR = "Wei, X.X. and Guo, Y. and Yu, J. and Zhang, B.",
        TITLE = "Simultaneously Optimizing Perturbations and Positions for Black-Box
Adversarial Patch Attacks",
        JOURNAL = PAMI,
        VOLUME = "45",
        YEAR = "2023",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "9041-9054",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT140886"}

Last update:Apr 18, 2024 at 11:38:49