@inproceedings{bb161900,
AUTHOR = "Yao, H. and Regan, M. and Yang, Y. and Ren, Y.",
TITLE = "Image Decomposition and Classification Through a Generative Model",
BOOKTITLE = ICIP19,
YEAR = "2019",
PAGES = "400-404",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT157754"}
@inproceedings{bb161901,
AUTHOR = "Li, J. and Ji, R. and Liu, H. and Hong, X. and Gao, Y. and Tian, Q.",
TITLE = "Universal Perturbation Attack Against Image Retrieval",
BOOKTITLE = ICCV19,
YEAR = "2019",
PAGES = "4898-4907",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT157755"}
@inproceedings{bb161902,
AUTHOR = "Finlay, C. and Pooladian, A. and Oberman, A.",
TITLE = "The LogBarrier Adversarial Attack:
Making Effective Use of Decision Boundary Information",
BOOKTITLE = ICCV19,
YEAR = "2019",
PAGES = "4861-4869",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT157756"}
@inproceedings{bb161903,
AUTHOR = "Jandial, S. and Mangla, P. and Varshney, S. and Balasubramanian, V.",
TITLE = "AdvGAN++: Harnessing Latent Layers for Adversary Generation",
BOOKTITLE = NeruArch19,
YEAR = "2019",
PAGES = "2045-2048",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT157757"}
@inproceedings{bb161904,
AUTHOR = "Wang, C.L. and Bunel, R. and Dvijotham, K. and Huang, P.S. and Grefenstette, E. and Kohli, P.",
TITLE = "Knowing When to Stop: Evaluation and Verification of Conformity to
Output-Size Specifications",
BOOKTITLE = CVPR19,
YEAR = "2019",
PAGES = "12252-12261",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT157758"}
@inproceedings{bb161905,
AUTHOR = "Modas, A. and Moosavi Dezfooli, S.M. and Frossard, P.",
TITLE = "SparseFool: A Few Pixels Make a Big Difference",
BOOKTITLE = CVPR19,
YEAR = "2019",
PAGES = "9079-9088",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT157759"}
@inproceedings{bb161906,
AUTHOR = "Yao, Z.W. and Gholami, A. and Xu, P. and Keutzer, K. and Mahoney, M.W.",
TITLE = "Trust Region Based Adversarial Attack on Neural Networks",
BOOKTITLE = CVPR19,
YEAR = "2019",
PAGES = "11342-11351",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT157760"}
@inproceedings{bb161907,
AUTHOR = "Zeng, X.H. and Liu, C.X. and Wang, Y.S. and Qiu, W.C. and Xie, L.X. and Tai, Y.W. and Tang, C.K. and Yuille, A.L.",
TITLE = "Adversarial Attacks Beyond the Image Space",
BOOKTITLE = CVPR19,
YEAR = "2019",
PAGES = "4297-4306",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT157761"}
@inproceedings{bb161908,
AUTHOR = "Corneanu, C.A. and Madadi, M. and Escalera, S. and Martinez, A.M.",
TITLE = "What Does It Mean to Learn in Deep Networks? And, How Does One Detect
Adversarial Attacks?",
BOOKTITLE = CVPR19,
YEAR = "2019",
PAGES = "4752-4761",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT157762"}
@inproceedings{bb161909,
AUTHOR = "Liu, X.Q. and Hsieh, C.J.",
TITLE = "Rob-GAN: Generator, Discriminator, and Adversarial Attacker",
BOOKTITLE = CVPR19,
YEAR = "2019",
PAGES = "11226-11235",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT157763"}
@inproceedings{bb161910,
AUTHOR = "Gupta, P. and Rahtu, E.",
TITLE = "MLAttack: Fooling Semantic Segmentation Networks by Multi-layer Attacks",
BOOKTITLE = GCPR19,
YEAR = "2019",
PAGES = "401-413",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT157764"}
@inproceedings{bb161911,
AUTHOR = "Zhao, W. and Yang, P.P. and Ni, R.R. and Zhao, Y. and Li, W.J.",
TITLE = "Cycle GAN-Based Attack on Recaptured Images to Fool both Human and
Machine",
BOOKTITLE = IWDW18,
YEAR = "2018",
PAGES = "83-92",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT157765"}
@inproceedings{bb161912,
AUTHOR = "Xu, X.J. and Chen, X.Y. and Liu, C. and Rohrbach, A. and Darrell, T.J. and Song, D.",
TITLE = "Fooling Vision and Language Models Despite Localization and Attention
Mechanism",
BOOKTITLE = CVPR18,
YEAR = "2018",
PAGES = "4951-4961",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT157766"}
@inproceedings{bb161913,
AUTHOR = "Dong, Y. and Liao, F. and Pang, T. and Su, H. and Zhu, J. and Hu, X. and Li, J.",
TITLE = "Boosting Adversarial Attacks with Momentum",
BOOKTITLE = CVPR18,
YEAR = "2018",
PAGES = "9185-9193",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT157767"}
@inproceedings{bb161914,
AUTHOR = "Eykholt, K. and Evtimov, I. and Fernandes, E. and Li, B. and Rahmati, A. and Xiao, C. and Prakash, A. and Kohno, T. and Song, D.",
TITLE = "Robust Physical-World Attacks on Deep Learning Visual Classification",
BOOKTITLE = CVPR18,
YEAR = "2018",
PAGES = "1625-1634",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT157768"}
@article{bb161915,
AUTHOR = "Chen, X. and Ma, Y.N. and Lu, S.W. and Yao, Y.",
TITLE = "Boundary augment: A data augment method to defend poison attack",
JOURNAL = IET-IPR,
VOLUME = "15",
YEAR = "2021",
NUMBER = "13",
PAGES = "3292-3303",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157769"}
@article{bb161916,
AUTHOR = "Ma, K. and Xu, Q.Q. and Zeng, J.S. and Cao, X.C. and Huang, Q.M.",
TITLE = "Poisoning Attack Against Estimating From Pairwise Comparisons",
JOURNAL = PAMI,
VOLUME = "44",
YEAR = "2022",
NUMBER = "10",
MONTH = "October",
PAGES = "6393-6408",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157770"}
@article{bb161917,
AUTHOR = "Zhang, J. and Chen, D.D. and Huang, Q.D. and Liao, J. and Zhang, W.M. and Feng, H.M. and Hua, G. and Yu, N.H.",
TITLE = "Poison Ink: Robust and Invisible Backdoor Attack",
JOURNAL = IP,
VOLUME = "31",
YEAR = "2022",
PAGES = "5691-5705",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157771"}
@article{bb161918,
AUTHOR = "Gao, Y.H. and Li, Y.M. and Zhu, L.H. and Wu, D.X. and Jiang, Y. and Xia, S.T.",
TITLE = "Not All Samples Are Born Equal:
Towards Effective Clean-Label Backdoor Attacks",
JOURNAL = PR,
VOLUME = "139",
YEAR = "2023",
PAGES = "109512",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157772"}
@article{bb161919,
AUTHOR = "Ma, Q.L. and Qin, J.P. and Yan, K. and Wang, L. and Sun, H.",
TITLE = "Stealthy Frequency-Domain Backdoor Attacks:
Fourier Decomposition and Fundamental Frequency Injection",
JOURNAL = SPLetters,
VOLUME = "30",
YEAR = "2023",
PAGES = "1677-1681",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157773"}
@article{bb161920,
AUTHOR = "Zhang, Z. and Yuan, X. and Zhu, L. and Song, J.K. and Nie, L.Q.",
TITLE = "BadCM: Invisible Backdoor Attack Against Cross-Modal Learning",
JOURNAL = IP,
VOLUME = "33",
YEAR = "2024",
PAGES = "2558-2571",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157774"}
@article{bb161921,
AUTHOR = "Wang, K.Y. and Deng, H.X. and Xu, Y.J. and Liu, Z.L. and Fang, Y.",
TITLE = "Multi-target label backdoor attacks on graph neural networks",
JOURNAL = PR,
VOLUME = "152",
YEAR = "2024",
PAGES = "110449",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157775"}
@article{bb161922,
AUTHOR = "Niu, Z.X. and Sun, Y.Y. and Miao, Q.G. and Jin, R. and Hua, G.",
TITLE = "Towards Unified Robustness Against Both Backdoor and Adversarial
Attacks",
JOURNAL = PAMI,
VOLUME = "46",
YEAR = "2024",
NUMBER = "12",
MONTH = "December",
PAGES = "7589-7605",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157776"}
@article{bb161923,
AUTHOR = "Wang, B. and Yu, F. and Wei, F. and Li, Y. and Wang, W.",
TITLE = "Invisible Intruders: Label-Consistent Backdoor Attack Using
Re-Parameterized Noise Trigger",
JOURNAL = MultMed,
VOLUME = "26",
YEAR = "2024",
PAGES = "10766-10778",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157777"}
@article{bb161924,
AUTHOR = "Chen, W.M. and Xu, X.W. and Wang, X.D. and Zhou, H.S. and Li, Z. and Chen, Y.M.",
TITLE = "Invisible backdoor attack with attention and steganography",
JOURNAL = CVIU,
VOLUME = "249",
YEAR = "2024",
PAGES = "104208",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157778"}
@article{bb161925,
AUTHOR = "Hou, L.S. and Hua, Z.Y. and Li, Y.H. and Zheng, Y.F. and Zhang, L.Y.",
TITLE = "M-to-N Backdoor Paradigm: A Multi-Trigger and Multi-Target Attack to
Deep Learning Models",
JOURNAL = CirSysVideo,
VOLUME = "34",
YEAR = "2024",
NUMBER = "11",
MONTH = "November",
PAGES = "11299-11312",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157779"}
@article{bb161926,
AUTHOR = "Tang, W.X. and Li, J.H. and Rao, Y. and Zhou, Z. and Peng, F.",
TITLE = "A trigger-perceivable backdoor attack framework driven by image
steganography",
JOURNAL = PR,
VOLUME = "161",
YEAR = "2025",
PAGES = "111262",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157780"}
@article{bb161927,
AUTHOR = "Feng, Y. and Ma, B.T. and Liu, D.N. and Zhang, Y.N. and Cai, W.D. and Xia, Y.",
TITLE = "Contrastive Neuron Pruning for Backdoor Defense",
JOURNAL = IP,
VOLUME = "34",
YEAR = "2025",
PAGES = "1234-1245",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157781"}
@article{bb161928,
AUTHOR = "Sundar, A.P. and Li, F. and Zou, X. and Gao, T. and Hosler, R.",
TITLE = "Vaccination Against Backdoor Attacks on Federated Learning Systems",
JOURNAL = SMCS,
VOLUME = "55",
YEAR = "2025",
NUMBER = "7",
MONTH = "July",
PAGES = "4434-4443",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157782"}
@article{bb161929,
AUTHOR = "Hou, L.S. and Hua, Z.Y. and Luo, W. and Zhang, L.Y.",
TITLE = "FixGuard: Repairing Backdoored Models via Class-Wise Trigger Recovery
and Unlearning",
JOURNAL = SPLetters,
VOLUME = "32",
YEAR = "2025",
PAGES = "2544-2548",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157783"}
@article{bb161930,
AUTHOR = "Zhang, X.Y. and Jin, Y.L. and Tong, H.Y. and Lou, J. and Wu, K. and Chen, X.F.",
TITLE = "Purifier+: Plug-and-Play Backdoor Mitigation for Pre-Trained Models
via Activation Alignment",
JOURNAL = MultMed,
VOLUME = "27",
YEAR = "2025",
PAGES = "3910-3924",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157784"}
@article{bb161931,
AUTHOR = "Wu, B.Y. and Chen, H.R. and Zhang, M.D. and Zhu, Z.H. and Wei, S.K. and Yuan, D.N. and Zhu, M.L. and Wang, R.T. and Liu, L. and Shen, C.",
TITLE = "BackdoorBench: A Comprehensive Benchmark and Analysis of Backdoor
Learning",
JOURNAL = IJCV,
VOLUME = "133",
YEAR = "2025",
NUMBER = "8",
MONTH = "August",
PAGES = "5700-5787",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157785"}
@article{bb161932,
AUTHOR = "Wu, S.X. and He, Q. and Yu, J. and Sang, J.",
TITLE = "Backdoor for Debias: Mitigating Model Bias With Backdoor Attack-Based
Artificial Bias",
JOURNAL = CirSysVideo,
VOLUME = "35",
YEAR = "2025",
NUMBER = "8",
MONTH = "August",
PAGES = "8421-8432",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157786"}
@article{bb161933,
AUTHOR = "Wu, Z.X. and Wen, J. and Peng, W.L. and Zhou, Y. and Zhang, Z.W.",
TITLE = "IBSD: Iterable Black-Box Self-Defense Against Backdoor Attacks",
JOURNAL = SPLetters,
VOLUME = "32",
YEAR = "2025",
PAGES = "3979-3983",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157787"}
@article{bb161934,
AUTHOR = "Zhang, Y.L. and Pu, Y.J. and Li, J.Z. and Zhao, S.X. and Lang, B.",
TITLE = "TSBA: A two-stage poison-only backdoor attack on visual object
tracking",
JOURNAL = PR,
VOLUME = "171",
YEAR = "2026",
PAGES = "112222",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157788"}
@article{bb161935,
AUTHOR = "Li, S. and Zhang, J. and Qi, Y. and Chen, K.J. and Zhang, T.W. and Zhang, W.M. and Yu, N.H.",
TITLE = "Clean Image May Be Dangerous:
Data Poisoning Attacks Against Deep Hashing",
JOURNAL = MultMed,
VOLUME = "27",
YEAR = "2025",
PAGES = "8541-8554",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157789"}
@article{bb161936,
AUTHOR = "Hao, L.G. and Hao, K.R. and Wei, B. and Tang, X.S.",
TITLE = "Multi-target federated backdoor attack based on feature aggregation",
JOURNAL = PR,
VOLUME = "172",
YEAR = "2026",
PAGES = "112333",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157790"}
@article{bb161937,
AUTHOR = "Huang, L. and Zhang, L.Y. and Chang, C.C. and Wang, W. and Qin, C.",
TITLE = "Backdoor defense based on adversarial prediction proximity and
contrastive knowledge distillation",
JOURNAL = PR,
VOLUME = "172",
YEAR = "2026",
PAGES = "112336",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157791"}
@article{bb161938,
AUTHOR = "Zeng, D.Y. and Liu, Y.P. and Zhang, S.Z. and Zhang, S. and Fang, B.X. and Yang, Z.",
TITLE = "Perturbation distillation and backdoor feature induction for
universal defense in deep vision models",
JOURNAL = PR,
VOLUME = "172",
YEAR = "2026",
PAGES = "112485",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157792"}
@article{bb161939,
AUTHOR = "Li, B.L. and Hu, T. and Liu, X.L. and Xie, J.C. and Yi, P.",
TITLE = "Generalizable poisoning-resistant backdoor detection and removal
framework: From dataset perspective",
JOURNAL = PR,
VOLUME = "172",
YEAR = "2026",
PAGES = "112766",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157793"}
@article{bb161940,
AUTHOR = "Lu, R. and Yu, P. and Huang, Z.T. and Xia, Z.H. and Jiang, X.Y.",
TITLE = "BAM: Backdoor defense based on adversarial mitigation",
JOURNAL = PR,
VOLUME = "172",
YEAR = "2026",
PAGES = "112662",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157794"}
@inproceedings{bb161941,
AUTHOR = "Le Roux, Q. and Teglia, Y. and Bourbao, E. and Moundi, P.L. and Furon, T.",
TITLE = "BAIT: A New DNN Backdoor Attack Using Inpainted Triggers",
BOOKTITLE = ICIP25,
YEAR = "2025",
PAGES = "510-515",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157795"}
@inproceedings{bb161942,
AUTHOR = "Yuan, Z.H. and Shi, J. and Zhou, P. and Gong, N.Z.Q. and Sun, L.C.",
TITLE = "BadToken: Token-level Backdoor Attacks to Multi-modal Large Language
Models",
BOOKTITLE = CVPR25,
YEAR = "2025",
PAGES = "29927-29936",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157796"}
@inproceedings{bb161943,
AUTHOR = "Zhang, H. and Wang, Z. and Li, B. and Lin, F. and Han, T.X. and Jin, M.Y. and Zhan, C. and Du, M. and Wang, H.W. and Ma, S.Q.",
TITLE = "Invisible Backdoor Attack against Self-supervised Learning",
BOOKTITLE = CVPR25,
YEAR = "2025",
PAGES = "25790-25801",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157797"}
@inproceedings{bb161944,
AUTHOR = "Li, Y. and Zhao, Y.C. and Zhu, C.C. and Zhang, J.",
TITLE = "Infighting in the Dark: Multi-Label Backdoor Attack in Federated
Learning",
BOOKTITLE = CVPR25,
YEAR = "2025",
PAGES = "25770-25779",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157798"}
@inproceedings{bb161945,
AUTHOR = "Liu, Z. and Zhang, H.",
TITLE = "Stealthy Backdoor Attack in Self-Supervised Learning Vision Encoders
for Large Vision Language Models",
BOOKTITLE = CVPR25,
YEAR = "2025",
PAGES = "25060-25070",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157799"}
@inproceedings{bb161946,
AUTHOR = "Zhang, H. and Wang, Y.C. and Yan, S.H. and Zhu, C.Y. and Zhou, Z.Q. and Hou, L.S. and Hu, S. and Li, M.H. and Zhang, Y.J. and Zhang, L.Y.",
TITLE = "Test-Time Backdoor Detection for Object Detection Models",
BOOKTITLE = CVPR25,
YEAR = "2025",
PAGES = "24377-24386",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157800"}
@inproceedings{bb161947,
AUTHOR = "Hou, S.Z. and Li, S.Z. and Yao, D.",
TITLE = "DeDe: Detecting Backdoor Samples for SSL Encoders via Decoders",
BOOKTITLE = CVPR25,
YEAR = "2025",
PAGES = "20675-20684",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157801"}
@inproceedings{bb161948,
AUTHOR = "Xu, J.H. and Zhang, Z.K. and Hu, R.",
TITLE = "Detecting Backdoor Attacks in Federated Learning via Direction
Alignment Inspection",
BOOKTITLE = CVPR25,
YEAR = "2025",
PAGES = "20654-20664",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157802"}
@inproceedings{bb161949,
AUTHOR = "Han, Y.N. and Zhao, B.Y. and Chu, R. and Luo, F. and Sikdar, B. and Lao, Y.J.",
TITLE = "UIBDiffusion: Universal Imperceptible Backdoor Attack for Diffusion
Models",
BOOKTITLE = CVPR25,
YEAR = "2025",
PAGES = "19186-19196",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157803"}
@inproceedings{bb161950,
AUTHOR = "Li, W. and Chen, P.Y. and Liu, S. and Wang, R.",
TITLE = "PSBD: Prediction Shift Uncertainty Unlocks Backdoor Detection",
BOOKTITLE = CVPR25,
YEAR = "2025",
PAGES = "10255-10264",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157804"}
@inproceedings{bb161951,
AUTHOR = "Liang, S.Y. and Liang, J.W. and Pang, T.Y. and Du, C. and Liu, A. and Zhu, M.L. and Cao, X.C. and Tao, D.C.",
TITLE = "Revisiting Backdoor Attacks against Large Vision-Language Models from
Domain Shift",
BOOKTITLE = CVPR25,
YEAR = "2025",
PAGES = "9477-9486",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157805"}
@inproceedings{bb161952,
AUTHOR = "Lee, C.Y. and Kao, C.C. and Yeh, C.H. and Lu, C.S. and Yu, C.M. and Chen, C.S.",
TITLE = "Defending Against Repetitive Backdoor Attacks on Semi-Supervised
Learning Through Lens of Rate-Distortion-Perception Trade-Off",
BOOKTITLE = WACV25,
YEAR = "2025",
PAGES = "6465-6474",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157806"}
@inproceedings{bb161953,
AUTHOR = "Nagaonkar, S. and Tripathi, A.M. and Mishra, A.",
TITLE = "When Visual State Space Model Meets Backdoor Attacks",
BOOKTITLE = WACV25,
YEAR = "2025",
PAGES = "7419-7428",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157807"}
@inproceedings{bb161954,
AUTHOR = "Styborski, J. and Lyu, M.Z. and Huang, Y. and Kong, A.",
TITLE = "Exploiting Supervised Poison Vulnerability to Strengthen
Self-supervised Defense",
BOOKTITLE = ECCV24,
YEAR = "2024",
PAGES = "LXXXII: 265-283",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157808"}
@inproceedings{bb161955,
AUTHOR = "Fares, S. and Nandakumar, K.",
TITLE = "Attack To Defend: Exploiting Adversarial Attacks for Detecting
Poisoned Models",
BOOKTITLE = CVPR24,
YEAR = "2024",
PAGES = "24726-24735",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157809"}
@inproceedings{bb161956,
AUTHOR = "Karim, N. and Arafat, A.A. and Khalid, U. and Guo, Z. and Rahnavard, N.",
TITLE = "Augmented Neural Fine-tuning for Efficient Backdoor Purification",
BOOKTITLE = ECCV24,
YEAR = "2024",
PAGES = "LXXX: 401-418",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157810"}
@inproceedings{bb161957,
AUTHOR = "Pham, H. and Ta, T.A. and Tran, A. and Doan, K.D.",
TITLE = "Flatness-aware Sequential Learning Generates Resilient Backdoors",
BOOKTITLE = ECCV24,
YEAR = "2024",
PAGES = "LXXXVII: 89-107",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157811"}
@inproceedings{bb161958,
AUTHOR = "Huynh, T. and Tran, A. and Doan, K.D. and Pham, T.",
TITLE = "Data Poisoning Quantization Backdoor Attack",
BOOKTITLE = ECCV24,
YEAR = "2024",
PAGES = "LXXXIV: 38-54",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157812"}
@inproceedings{bb161959,
AUTHOR = "Phan, H. and Xiao, J.Q. and Sui, Y. and Zhang, T. and Tang, Z.J. and Shi, C. and Wang, Y. and Chen, Y.Y. and Yuan, B.",
TITLE = "Clean and Compact: Efficient Data-free Backdoor Defense with Model
Compactness",
BOOKTITLE = ECCV24,
YEAR = "2024",
PAGES = "LX: 273-290",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157813"}
@inproceedings{bb161960,
AUTHOR = "Jin, H.B. and Chen, R.X. and Chen, J. and Zheng, H.B. and Zhang, Y. and Wang, H.H.",
TITLE = "Catchbackdoor: Backdoor Detection via Critical Trojan Neural Path
Fuzzing",
BOOKTITLE = ECCV24,
YEAR = "2024",
PAGES = "XLVII: 90-106",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157814"}
@inproceedings{bb161961,
AUTHOR = "Huang, W.K. and Ye, M. and Shi, Z.K. and Du, B. and Tao, D.C.",
TITLE = "Fisher Calibration for Backdoor-robust Heterogeneous Federated Learning",
BOOKTITLE = ECCV24,
YEAR = "2024",
PAGES = "XV: 247-265",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157815"}
@inproceedings{bb161962,
AUTHOR = "Wang, R.F. and Guo, Q. and Li, H.L. and Wan, R.J.",
TITLE = "Event Trojan: Asynchronous Event-based Backdoor Attacks",
BOOKTITLE = ECCV24,
YEAR = "2024",
PAGES = "VII: 315-332",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157816"}
@inproceedings{bb161963,
AUTHOR = "Cheng, S.Y. and Shen, G.Y. and Zhang, K.Y. and Tao, G.H. and An, S.W. and Guo, H.X. and Ma, S.Q. and Zhang, X.Y.",
TITLE = "Unit: Backdoor Mitigation via Automated Neural Distribution Tightening",
BOOKTITLE = ECCV24,
YEAR = "2024",
PAGES = "LXII: 262-281",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157817"}
@inproceedings{bb161964,
AUTHOR = "Cai, K. and Zhang, Z.K. and Lou, Q. and Yao, F.",
TITLE = "WBP: Training-time Backdoor Attacks Through Hardware-based Weight Bit
Poisoning",
BOOKTITLE = ECCV24,
YEAR = "2024",
PAGES = "LXV: 179-197",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157818"}
@inproceedings{bb161965,
AUTHOR = "Lyu, W.M. and Pang, L. and Ma, T.F. and Ling, H.B. and Chen, C.",
TITLE = "TROJVLM: Backdoor Attack Against Vision Language Models",
BOOKTITLE = ECCV24,
YEAR = "2024",
PAGES = "LXV: 467-483",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157819"}
@inproceedings{bb161966,
AUTHOR = "Shin, J.J.",
TITLE = "Mask-Based Invisible Backdoor Attacks on Object Detection",
BOOKTITLE = ICIP24,
YEAR = "2024",
PAGES = "1050-1056",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157820"}
@inproceedings{bb161967,
AUTHOR = "Li, B. and Cai, Y. and Li, H. and Xue, F. and Li, Z.F. and Li, Y.M.",
TITLE = "Nearest is Not Dearest: Towards Practical Defense Against
Quantization-Conditioned Backdoor Attacks",
BOOKTITLE = CVPR24,
YEAR = "2024",
PAGES = "24523-24533",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157821"}
@inproceedings{bb161968,
AUTHOR = "Guan, J. and Liang, J. and He, R.",
TITLE = "Backdoor Defense via Test-Time Detecting and Repairing",
BOOKTITLE = CVPR24,
YEAR = "2024",
PAGES = "24564-24573",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157822"}
@inproceedings{bb161969,
AUTHOR = "Cheng, S.Y. and Tao, G.H. and Liu, Y.Q. and Shen, G.Y. and An, S.W. and Feng, S.W. and Xu, X.Z. and Zhang, K.Y. and Ma, S.Q. and Zhang, X.Y.",
TITLE = "Lotus: Evasive and Resilient Backdoor Attacks through
Sub-Partitioning",
BOOKTITLE = CVPR24,
YEAR = "2024",
PAGES = "24798-24809",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157823"}
@inproceedings{bb161970,
AUTHOR = "Hammoud, H.A.A.K. and Liu, S.M. and Alkhrashi, M. and AlBalawi, F. and Ghanem, B.",
TITLE = "Look, Listen, and Attack:
Backdoor Attacks Against Video Action Recognition",
BOOKTITLE = SAIAD24,
YEAR = "2024",
PAGES = "3439-3450",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157824"}
@inproceedings{bb161971,
AUTHOR = "Zhang, J.H. and Liu, H.B. and Jia, J.Y. and Gong, N.Z.Q.",
TITLE = "Data Poisoning Based Backdoor Attacks to Contrastive Learning",
BOOKTITLE = CVPR24,
YEAR = "2024",
PAGES = "24357-24366",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157825"}
@inproceedings{bb161972,
AUTHOR = "Yin, W. and Lou, J. and Zhou, P. and Xie, Y. and Feng, D. and Sun, Y.H. and Zhang, T. and Sun, L.C.",
TITLE = "Physical Backdoor: Towards Temperature-Based Backdoor Attacks in the
Physical World",
BOOKTITLE = CVPR24,
YEAR = "2024",
PAGES = "12733-12743",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157826"}
@inproceedings{bb161973,
AUTHOR = "Subramanya, A. and Koohpayegani, S.A. and Saha, A. and Tejankar, A. and Pirsiavash, H.",
TITLE = "A Closer Look at Robustness of Vision Transformers to Backdoor
Attacks",
BOOKTITLE = WACV24,
YEAR = "2024",
PAGES = "3862-3871",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157827"}
@inproceedings{bb161974,
AUTHOR = "Zhu, Z.X. and Wang, R. and Zou, C. and Jing, L.H.",
TITLE = "The Victim and The Beneficiary: Exploiting a Poisoned Model to Train
a Clean Model on Poisoned Data",
BOOKTITLE = ICCV23,
YEAR = "2023",
PAGES = "155-164",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157828"}
@inproceedings{bb161975,
AUTHOR = "Ding, R. and Duan, S.J. and Xu, X.L. and Fei, Y.",
TITLE = "VertexSerum: Poisoning Graph Neural Networks for Link Inference",
BOOKTITLE = ICCV23,
YEAR = "2023",
PAGES = "4509-4518",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157829"}
@inproceedings{bb161976,
AUTHOR = "Bansal, H. and Yin, F. and Singhi, N. and Grover, A. and Yang, Y. and Chang, K.W.",
TITLE = "CleanCLIP: Mitigating Data Poisoning Attacks in Multimodal
Contrastive Learning",
BOOKTITLE = ICCV23,
YEAR = "2023",
PAGES = "112-123",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157830"}
@inproceedings{bb161977,
AUTHOR = "Sur, I. and Sikka, K. and Walmer, M. and Koneripalli, K. and Roy, A. and Lin, X. and Divakaran, A. and Jha, S.",
TITLE = "TIJO: Trigger Inversion with Joint Optimization for Defending
Multimodal Backdoored Models",
BOOKTITLE = ICCV23,
YEAR = "2023",
PAGES = "165-175",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157831"}
@inproceedings{bb161978,
AUTHOR = "Li, C.J. and Pang, R. and Xi, Z. and Du, T.Y. and Ji, S. and Yao, Y. and Wang, T.",
TITLE = "An Embarrassingly Simple Backdoor Attack on Self-supervised Learning",
BOOKTITLE = ICCV23,
YEAR = "2023",
PAGES = "4344-4355",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157832"}
@inproceedings{bb161979,
AUTHOR = "Zhu, M.L. and Wei, S. and Shen, L. and Fan, Y.B. and Wu, B.Y.",
TITLE = "Enhancing Fine-Tuning based Backdoor Defense with Sharpness-Aware
Minimization",
BOOKTITLE = ICCV23,
YEAR = "2023",
PAGES = "4443-4454",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157833"}
@inproceedings{bb161980,
AUTHOR = "Liu, M. and Sangiovanni Vincentelli, A. and Yue, X.Y.",
TITLE = "Beating Backdoor Attack at Its Own Game",
BOOKTITLE = ICCV23,
YEAR = "2023",
PAGES = "4597-4606",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157834"}
@inproceedings{bb161981,
AUTHOR = "Huang, S.Q. and Li, Y.J. and Chen, C. and Shi, L. and Gao, Y.",
TITLE = "Multi-metrics adaptively identifies backdoors in Federated learning",
BOOKTITLE = ICCV23,
YEAR = "2023",
PAGES = "4629-4639",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157835"}
@inproceedings{bb161982,
AUTHOR = "Guo, J.F. and Li, A. and Wang, L. and Liu, C.",
TITLE = "PolicyCleanse: Backdoor Detection and Mitigation for Competitive
Reinforcement Learning",
BOOKTITLE = ICCV23,
YEAR = "2023",
PAGES = "4676-4685",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157836"}
@inproceedings{bb161983,
AUTHOR = "Shejwalkar, V. and Lyu, L.J. and Houmansadr, A.",
TITLE = "The Perils of Learning From Unlabeled Data:
Backdoor Attacks on Semi-supervised Learning",
BOOKTITLE = ICCV23,
YEAR = "2023",
PAGES = "4707-4717",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157837"}
@inproceedings{bb161984,
AUTHOR = "Wu, Y.T. and Han, X. and Qiu, H. and Zhang, T.W.",
TITLE = "Computation and Data Efficient Backdoor Attacks",
BOOKTITLE = ICCV23,
YEAR = "2023",
PAGES = "4782-4791",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157838"}
@inproceedings{bb161985,
AUTHOR = "Han, G. and Choi, J. and Hong, H.G. and Kim, J.",
TITLE = "Data Poisoning Attack Aiming the Vulnerability of Continual Learning",
BOOKTITLE = ICIP23,
YEAR = "2023",
PAGES = "1905-1909",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157839"}
@inproceedings{bb161986,
AUTHOR = "Huang, B. and Wang, Z.",
TITLE = "Efficient any-Target Backdoor Attack with Pseudo Poisoned Samples",
BOOKTITLE = ICIP23,
YEAR = "2023",
PAGES = "3319-3323",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157840"}
@inproceedings{bb161987,
AUTHOR = "Shen, Z.H. and Hou, W. and Li, Y.",
TITLE = "CSSBA: A Clean Label Sample-Specific Backdoor Attack",
BOOKTITLE = ICIP23,
YEAR = "2023",
PAGES = "965-969",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157841"}
@inproceedings{bb161988,
AUTHOR = "Sun, M.J. and Kolter, Z.",
TITLE = "Single Image Backdoor Inversion via Robust Smoothed Classifiers",
BOOKTITLE = CVPR23,
YEAR = "2023",
PAGES = "8113-8122",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157842"}
@inproceedings{bb161989,
AUTHOR = "Hammoud, H.A.A.K. and Bibi, A. and Torr, P.H.S. and Ghanem, B.",
TITLE = "Don't FREAK Out: A Frequency-Inspired Approach to Detecting Backdoor
Poisoned Samples in DNNs",
BOOKTITLE = AML23,
YEAR = "2023",
PAGES = "2338-2345",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157843"}
@inproceedings{bb161990,
AUTHOR = "Gao, K.F. and Bai, Y. and Gu, J.D. and Yang, Y. and Xia, S.T.",
TITLE = "Backdoor Defense via Adaptively Splitting Poisoned Dataset",
BOOKTITLE = CVPR23,
YEAR = "2023",
PAGES = "4005-4014",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157844"}
@inproceedings{bb161991,
AUTHOR = "Chou, S.Y. and Chen, P.Y. and Ho, T.Y.",
TITLE = "How to Backdoor Diffusion Models?",
BOOKTITLE = CVPR23,
YEAR = "2023",
PAGES = "4015-4024",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157845"}
@inproceedings{bb161992,
AUTHOR = "Zheng, R.K. and Tang, R.J. and Li, J.Z. and Liu, L.",
TITLE = "Data-Free Backdoor Removal Based on Channel Lipschitzness",
BOOKTITLE = ECCV22,
YEAR = "2022",
PAGES = "V:175-191",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157846"}
@inproceedings{bb161993,
AUTHOR = "Dolatabadi, H.M. and Erfani, S. and Leckie, C.",
TITLE = "Collider: A Robust Training Framework for Backdoor Data",
BOOKTITLE = ACCV22,
YEAR = "2022",
PAGES = "VI:681-698",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157847"}
@inproceedings{bb161994,
AUTHOR = "Ji, H.X. and Li, J. and Wu, C.",
TITLE = "CRAB: Certified Patch Robustness Against Poisoning-Based Backdoor
Attacks",
BOOKTITLE = ICIP22,
YEAR = "2022",
PAGES = "2486-2490",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157848"}
@inproceedings{bb161995,
AUTHOR = "Liu, Y.Q. and Shen, G.Y. and Tao, G.H. and Wang, Z.T. and Ma, S.Q. and Zhang, X.Y.",
TITLE = "Complex Backdoor Detection by Symmetric Feature Differencing",
BOOKTITLE = CVPR22,
YEAR = "2022",
PAGES = "14983-14993",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157849"}
@inproceedings{bb161996,
AUTHOR = "Guan, J. and Tu, Z. and He, R. and Tao, D.C.",
TITLE = "Few-shot Backdoor Defense Using Shapley Estimation",
BOOKTITLE = CVPR22,
YEAR = "2022",
PAGES = "13348-13357",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157850"}
@inproceedings{bb161997,
AUTHOR = "Tao, G.H. and Shen, G.Y. and Liu, Y.Q. and An, S.W. and Xu, Q.L. and Ma, S.Q. and Li, P. and Zhang, X.Y.",
TITLE = "Better Trigger Inversion Optimization in Backdoor Scanning",
BOOKTITLE = CVPR22,
YEAR = "2022",
PAGES = "13358-13368",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157851"}
@inproceedings{bb161998,
AUTHOR = "Chan, S.H. and Dong, Y.P. and Zhu, J. and Zhang, X.L. and Zhou, J.",
TITLE = "Baddet: Backdoor Attacks on Object Detection",
BOOKTITLE = AdvRob22,
YEAR = "2022",
PAGES = "396-412",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157852"}
@inproceedings{bb161999,
AUTHOR = "Ramakrishnan, G. and Albarghouthi, A.",
TITLE = "Backdoors in Neural Models of Source Code",
BOOKTITLE = "ICPR22",
YEAR = "2022",
PAGES = "2892-2899",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157853"}
Last update:Jan 16, 2026 at 20:03:35