@article{bb163200,
AUTHOR = "Zhang, Y.L. and Lang, B.",
TITLE = "Towards invisible backdoor attacks on multi-object tracking via
suppressed feature learning",
JOURNAL = PR,
VOLUME = "176",
YEAR = "2026",
PAGES = "113248",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159053"}
@article{bb163201,
AUTHOR = "Li, J. and Yuan, X.J. and Tian, J. and Lu, S.W. and Yu, D.X.",
TITLE = "UPGP: Backdoor defense via unlearning perturbation and
orthogonality-constraint gradient projection",
JOURNAL = PR,
VOLUME = "176",
YEAR = "2026",
PAGES = "113211",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159054"}
@inproceedings{bb163202,
AUTHOR = "Le Roux, Q. and Teglia, Y. and Bourbao, E. and Moundi, P.L. and Furon, T.",
TITLE = "BAIT: A New DNN Backdoor Attack Using Inpainted Triggers",
BOOKTITLE = ICIP25,
YEAR = "2025",
PAGES = "510-515",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159055"}
@inproceedings{bb163203,
AUTHOR = "Yuan, Z.H. and Shi, J. and Zhou, P. and Gong, N.Z.Q. and Sun, L.C.",
TITLE = "BadToken: Token-level Backdoor Attacks to Multi-modal Large Language
Models",
BOOKTITLE = CVPR25,
YEAR = "2025",
PAGES = "29927-29936",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159056"}
@inproceedings{bb163204,
AUTHOR = "Zhang, H. and Wang, Z. and Li, B. and Lin, F. and Han, T.X. and Jin, M.Y. and Zhan, C. and Du, M. and Wang, H.W. and Ma, S.Q.",
TITLE = "Invisible Backdoor Attack against Self-supervised Learning",
BOOKTITLE = CVPR25,
YEAR = "2025",
PAGES = "25790-25801",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159057"}
@inproceedings{bb163205,
AUTHOR = "Li, Y. and Zhao, Y.C. and Zhu, C.C. and Zhang, J.",
TITLE = "Infighting in the Dark: Multi-Label Backdoor Attack in Federated
Learning",
BOOKTITLE = CVPR25,
YEAR = "2025",
PAGES = "25770-25779",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159058"}
@inproceedings{bb163206,
AUTHOR = "Liu, Z. and Zhang, H.",
TITLE = "Stealthy Backdoor Attack in Self-Supervised Learning Vision Encoders
for Large Vision Language Models",
BOOKTITLE = CVPR25,
YEAR = "2025",
PAGES = "25060-25070",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159059"}
@inproceedings{bb163207,
AUTHOR = "Zhang, H. and Wang, Y.C. and Yan, S.H. and Zhu, C.Y. and Zhou, Z.Q. and Hou, L.S. and Hu, S. and Li, M.H. and Zhang, Y.J. and Zhang, L.Y.",
TITLE = "Test-Time Backdoor Detection for Object Detection Models",
BOOKTITLE = CVPR25,
YEAR = "2025",
PAGES = "24377-24386",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159060"}
@inproceedings{bb163208,
AUTHOR = "Hou, S.Z. and Li, S.Z. and Yao, D.",
TITLE = "DeDe: Detecting Backdoor Samples for SSL Encoders via Decoders",
BOOKTITLE = CVPR25,
YEAR = "2025",
PAGES = "20675-20684",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159061"}
@inproceedings{bb163209,
AUTHOR = "Xu, J.H. and Zhang, Z.K. and Hu, R.",
TITLE = "Detecting Backdoor Attacks in Federated Learning via Direction
Alignment Inspection",
BOOKTITLE = CVPR25,
YEAR = "2025",
PAGES = "20654-20664",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159062"}
@inproceedings{bb163210,
AUTHOR = "Han, Y.N. and Zhao, B.Y. and Chu, R. and Luo, F. and Sikdar, B. and Lao, Y.J.",
TITLE = "UIBDiffusion: Universal Imperceptible Backdoor Attack for Diffusion
Models",
BOOKTITLE = CVPR25,
YEAR = "2025",
PAGES = "19186-19196",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159063"}
@inproceedings{bb163211,
AUTHOR = "Li, W. and Chen, P.Y. and Liu, S. and Wang, R.",
TITLE = "PSBD: Prediction Shift Uncertainty Unlocks Backdoor Detection",
BOOKTITLE = CVPR25,
YEAR = "2025",
PAGES = "10255-10264",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159064"}
@inproceedings{bb163212,
AUTHOR = "Lee, C.Y. and Kao, C.C. and Yeh, C.H. and Lu, C.S. and Yu, C.M. and Chen, C.S.",
TITLE = "Defending Against Repetitive Backdoor Attacks on Semi-Supervised
Learning Through Lens of Rate-Distortion-Perception Trade-Off",
BOOKTITLE = WACV25,
YEAR = "2025",
PAGES = "6465-6474",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159065"}
@inproceedings{bb163213,
AUTHOR = "Nagaonkar, S. and Tripathi, A.M. and Mishra, A.",
TITLE = "When Visual State Space Model Meets Backdoor Attacks",
BOOKTITLE = WACV25,
YEAR = "2025",
PAGES = "7419-7428",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159066"}
@inproceedings{bb163214,
AUTHOR = "Styborski, J. and Lyu, M.Z. and Huang, Y. and Kong, A.",
TITLE = "Exploiting Supervised Poison Vulnerability to Strengthen
Self-supervised Defense",
BOOKTITLE = ECCV24,
YEAR = "2024",
PAGES = "LXXXII: 265-283",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159067"}
@inproceedings{bb163215,
AUTHOR = "Fares, S. and Nandakumar, K.",
TITLE = "Attack To Defend: Exploiting Adversarial Attacks for Detecting
Poisoned Models",
BOOKTITLE = CVPR24,
YEAR = "2024",
PAGES = "24726-24735",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159068"}
@inproceedings{bb163216,
AUTHOR = "Karim, N. and Arafat, A.A. and Khalid, U. and Guo, Z. and Rahnavard, N.",
TITLE = "Augmented Neural Fine-tuning for Efficient Backdoor Purification",
BOOKTITLE = ECCV24,
YEAR = "2024",
PAGES = "LXXX: 401-418",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159069"}
@inproceedings{bb163217,
AUTHOR = "Pham, H. and Ta, T.A. and Tran, A. and Doan, K.D.",
TITLE = "Flatness-aware Sequential Learning Generates Resilient Backdoors",
BOOKTITLE = ECCV24,
YEAR = "2024",
PAGES = "LXXXVII: 89-107",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159070"}
@inproceedings{bb163218,
AUTHOR = "Huynh, T. and Tran, A. and Doan, K.D. and Pham, T.",
TITLE = "Data Poisoning Quantization Backdoor Attack",
BOOKTITLE = ECCV24,
YEAR = "2024",
PAGES = "LXXXIV: 38-54",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159071"}
@inproceedings{bb163219,
AUTHOR = "Phan, H. and Xiao, J.Q. and Sui, Y. and Zhang, T. and Tang, Z.J. and Shi, C. and Wang, Y. and Chen, Y.Y. and Yuan, B.",
TITLE = "Clean and Compact: Efficient Data-free Backdoor Defense with Model
Compactness",
BOOKTITLE = ECCV24,
YEAR = "2024",
PAGES = "LX: 273-290",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159072"}
@inproceedings{bb163220,
AUTHOR = "Jin, H.B. and Chen, R.X. and Chen, J. and Zheng, H.B. and Zhang, Y. and Wang, H.H.",
TITLE = "Catchbackdoor: Backdoor Detection via Critical Trojan Neural Path
Fuzzing",
BOOKTITLE = ECCV24,
YEAR = "2024",
PAGES = "XLVII: 90-106",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159073"}
@inproceedings{bb163221,
AUTHOR = "Huang, W.K. and Ye, M. and Shi, Z.K. and Du, B. and Tao, D.C.",
TITLE = "Fisher Calibration for Backdoor-robust Heterogeneous Federated Learning",
BOOKTITLE = ECCV24,
YEAR = "2024",
PAGES = "XV: 247-265",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159074"}
@inproceedings{bb163222,
AUTHOR = "Wang, R.F. and Guo, Q. and Li, H.L. and Wan, R.J.",
TITLE = "Event Trojan: Asynchronous Event-based Backdoor Attacks",
BOOKTITLE = ECCV24,
YEAR = "2024",
PAGES = "VII: 315-332",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159075"}
@inproceedings{bb163223,
AUTHOR = "Cheng, S.Y. and Shen, G.Y. and Zhang, K.Y. and Tao, G.H. and An, S.W. and Guo, H.X. and Ma, S.Q. and Zhang, X.Y.",
TITLE = "Unit: Backdoor Mitigation via Automated Neural Distribution Tightening",
BOOKTITLE = ECCV24,
YEAR = "2024",
PAGES = "LXII: 262-281",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159076"}
@inproceedings{bb163224,
AUTHOR = "Cai, K. and Zhang, Z.K. and Lou, Q. and Yao, F.",
TITLE = "WBP: Training-time Backdoor Attacks Through Hardware-based Weight Bit
Poisoning",
BOOKTITLE = ECCV24,
YEAR = "2024",
PAGES = "LXV: 179-197",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159077"}
@inproceedings{bb163225,
AUTHOR = "Lyu, W.M. and Pang, L. and Ma, T.F. and Ling, H.B. and Chen, C.",
TITLE = "TROJVLM: Backdoor Attack Against Vision Language Models",
BOOKTITLE = ECCV24,
YEAR = "2024",
PAGES = "LXV: 467-483",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159078"}
@inproceedings{bb163226,
AUTHOR = "Shin, J.J.",
TITLE = "Mask-Based Invisible Backdoor Attacks on Object Detection",
BOOKTITLE = ICIP24,
YEAR = "2024",
PAGES = "1050-1056",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159079"}
@inproceedings{bb163227,
AUTHOR = "Li, B. and Cai, Y. and Li, H. and Xue, F. and Li, Z.F. and Li, Y.M.",
TITLE = "Nearest is Not Dearest: Towards Practical Defense Against
Quantization-Conditioned Backdoor Attacks",
BOOKTITLE = CVPR24,
YEAR = "2024",
PAGES = "24523-24533",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159080"}
@inproceedings{bb163228,
AUTHOR = "Guan, J. and Liang, J. and He, R.",
TITLE = "Backdoor Defense via Test-Time Detecting and Repairing",
BOOKTITLE = CVPR24,
YEAR = "2024",
PAGES = "24564-24573",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159081"}
@inproceedings{bb163229,
AUTHOR = "Cheng, S.Y. and Tao, G.H. and Liu, Y.Q. and Shen, G.Y. and An, S.W. and Feng, S.W. and Xu, X.Z. and Zhang, K.Y. and Ma, S.Q. and Zhang, X.Y.",
TITLE = "Lotus: Evasive and Resilient Backdoor Attacks through
Sub-Partitioning",
BOOKTITLE = CVPR24,
YEAR = "2024",
PAGES = "24798-24809",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159082"}
@inproceedings{bb163230,
AUTHOR = "Hammoud, H.A.A.K. and Liu, S.M. and Alkhrashi, M. and AlBalawi, F. and Ghanem, B.",
TITLE = "Look, Listen, and Attack:
Backdoor Attacks Against Video Action Recognition",
BOOKTITLE = SAIAD24,
YEAR = "2024",
PAGES = "3439-3450",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159083"}
@inproceedings{bb163231,
AUTHOR = "Zhang, J.H. and Liu, H.B. and Jia, J.Y. and Gong, N.Z.Q.",
TITLE = "Data Poisoning Based Backdoor Attacks to Contrastive Learning",
BOOKTITLE = CVPR24,
YEAR = "2024",
PAGES = "24357-24366",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159084"}
@inproceedings{bb163232,
AUTHOR = "Yin, W. and Lou, J. and Zhou, P. and Xie, Y. and Feng, D. and Sun, Y.H. and Zhang, T. and Sun, L.C.",
TITLE = "Physical Backdoor: Towards Temperature-Based Backdoor Attacks in the
Physical World",
BOOKTITLE = CVPR24,
YEAR = "2024",
PAGES = "12733-12743",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159085"}
@inproceedings{bb163233,
AUTHOR = "Subramanya, A. and Koohpayegani, S.A. and Saha, A. and Tejankar, A. and Pirsiavash, H.",
TITLE = "A Closer Look at Robustness of Vision Transformers to Backdoor
Attacks",
BOOKTITLE = WACV24,
YEAR = "2024",
PAGES = "3862-3871",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159086"}
@inproceedings{bb163234,
AUTHOR = "Zhu, Z.X. and Wang, R. and Zou, C. and Jing, L.H.",
TITLE = "The Victim and The Beneficiary: Exploiting a Poisoned Model to Train
a Clean Model on Poisoned Data",
BOOKTITLE = ICCV23,
YEAR = "2023",
PAGES = "155-164",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159087"}
@inproceedings{bb163235,
AUTHOR = "Ding, R. and Duan, S.J. and Xu, X.L. and Fei, Y.",
TITLE = "VertexSerum: Poisoning Graph Neural Networks for Link Inference",
BOOKTITLE = ICCV23,
YEAR = "2023",
PAGES = "4509-4518",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159088"}
@inproceedings{bb163236,
AUTHOR = "Bansal, H. and Yin, F. and Singhi, N. and Grover, A. and Yang, Y. and Chang, K.W.",
TITLE = "CleanCLIP: Mitigating Data Poisoning Attacks in Multimodal
Contrastive Learning",
BOOKTITLE = ICCV23,
YEAR = "2023",
PAGES = "112-123",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159089"}
@inproceedings{bb163237,
AUTHOR = "Sur, I. and Sikka, K. and Walmer, M. and Koneripalli, K. and Roy, A. and Lin, X. and Divakaran, A. and Jha, S.",
TITLE = "TIJO: Trigger Inversion with Joint Optimization for Defending
Multimodal Backdoored Models",
BOOKTITLE = ICCV23,
YEAR = "2023",
PAGES = "165-175",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159090"}
@inproceedings{bb163238,
AUTHOR = "Li, C.J. and Pang, R. and Xi, Z. and Du, T.Y. and Ji, S. and Yao, Y. and Wang, T.",
TITLE = "An Embarrassingly Simple Backdoor Attack on Self-supervised Learning",
BOOKTITLE = ICCV23,
YEAR = "2023",
PAGES = "4344-4355",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159091"}
@inproceedings{bb163239,
AUTHOR = "Zhu, M.L. and Wei, S. and Shen, L. and Fan, Y.B. and Wu, B.Y.",
TITLE = "Enhancing Fine-Tuning based Backdoor Defense with Sharpness-Aware
Minimization",
BOOKTITLE = ICCV23,
YEAR = "2023",
PAGES = "4443-4454",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159092"}
@inproceedings{bb163240,
AUTHOR = "Liu, M. and Sangiovanni Vincentelli, A. and Yue, X.Y.",
TITLE = "Beating Backdoor Attack at Its Own Game",
BOOKTITLE = ICCV23,
YEAR = "2023",
PAGES = "4597-4606",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159093"}
@inproceedings{bb163241,
AUTHOR = "Huang, S.Q. and Li, Y.J. and Chen, C. and Shi, L. and Gao, Y.",
TITLE = "Multi-metrics adaptively identifies backdoors in Federated learning",
BOOKTITLE = ICCV23,
YEAR = "2023",
PAGES = "4629-4639",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159094"}
@inproceedings{bb163242,
AUTHOR = "Guo, J.F. and Li, A. and Wang, L. and Liu, C.",
TITLE = "PolicyCleanse: Backdoor Detection and Mitigation for Competitive
Reinforcement Learning",
BOOKTITLE = ICCV23,
YEAR = "2023",
PAGES = "4676-4685",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159095"}
@inproceedings{bb163243,
AUTHOR = "Shejwalkar, V. and Lyu, L.J. and Houmansadr, A.",
TITLE = "The Perils of Learning From Unlabeled Data:
Backdoor Attacks on Semi-supervised Learning",
BOOKTITLE = ICCV23,
YEAR = "2023",
PAGES = "4707-4717",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159096"}
@inproceedings{bb163244,
AUTHOR = "Wu, Y.T. and Han, X. and Qiu, H. and Zhang, T.W.",
TITLE = "Computation and Data Efficient Backdoor Attacks",
BOOKTITLE = ICCV23,
YEAR = "2023",
PAGES = "4782-4791",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159097"}
@inproceedings{bb163245,
AUTHOR = "Han, G. and Choi, J. and Hong, H.G. and Kim, J.",
TITLE = "Data Poisoning Attack Aiming the Vulnerability of Continual Learning",
BOOKTITLE = ICIP23,
YEAR = "2023",
PAGES = "1905-1909",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159098"}
@inproceedings{bb163246,
AUTHOR = "Huang, B. and Wang, Z.",
TITLE = "Efficient any-Target Backdoor Attack with Pseudo Poisoned Samples",
BOOKTITLE = ICIP23,
YEAR = "2023",
PAGES = "3319-3323",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159099"}
@inproceedings{bb163247,
AUTHOR = "Shen, Z.H. and Hou, W. and Li, Y.",
TITLE = "CSSBA: A Clean Label Sample-Specific Backdoor Attack",
BOOKTITLE = ICIP23,
YEAR = "2023",
PAGES = "965-969",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159100"}
@inproceedings{bb163248,
AUTHOR = "Sun, M.J. and Kolter, Z.",
TITLE = "Single Image Backdoor Inversion via Robust Smoothed Classifiers",
BOOKTITLE = CVPR23,
YEAR = "2023",
PAGES = "8113-8122",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159101"}
@inproceedings{bb163249,
AUTHOR = "Hammoud, H.A.A.K. and Bibi, A. and Torr, P.H.S. and Ghanem, B.",
TITLE = "Don't FREAK Out: A Frequency-Inspired Approach to Detecting Backdoor
Poisoned Samples in DNNs",
BOOKTITLE = AML23,
YEAR = "2023",
PAGES = "2338-2345",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159102"}
@inproceedings{bb163250,
AUTHOR = "Gao, K.F. and Bai, Y. and Gu, J.D. and Yang, Y. and Xia, S.T.",
TITLE = "Backdoor Defense via Adaptively Splitting Poisoned Dataset",
BOOKTITLE = CVPR23,
YEAR = "2023",
PAGES = "4005-4014",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159103"}
@inproceedings{bb163251,
AUTHOR = "Chou, S.Y. and Chen, P.Y. and Ho, T.Y.",
TITLE = "How to Backdoor Diffusion Models?",
BOOKTITLE = CVPR23,
YEAR = "2023",
PAGES = "4015-4024",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159104"}
@inproceedings{bb163252,
AUTHOR = "Zheng, R.K. and Tang, R.J. and Li, J.Z. and Liu, L.",
TITLE = "Data-Free Backdoor Removal Based on Channel Lipschitzness",
BOOKTITLE = ECCV22,
YEAR = "2022",
PAGES = "V:175-191",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159105"}
@inproceedings{bb163253,
AUTHOR = "Dolatabadi, H.M. and Erfani, S. and Leckie, C.",
TITLE = "Collider: A Robust Training Framework for Backdoor Data",
BOOKTITLE = ACCV22,
YEAR = "2022",
PAGES = "VI:681-698",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159106"}
@inproceedings{bb163254,
AUTHOR = "Ji, H.X. and Li, J. and Wu, C.",
TITLE = "CRAB: Certified Patch Robustness Against Poisoning-Based Backdoor
Attacks",
BOOKTITLE = ICIP22,
YEAR = "2022",
PAGES = "2486-2490",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159107"}
@inproceedings{bb163255,
AUTHOR = "Liu, Y.Q. and Shen, G.Y. and Tao, G.H. and Wang, Z.T. and Ma, S.Q. and Zhang, X.Y.",
TITLE = "Complex Backdoor Detection by Symmetric Feature Differencing",
BOOKTITLE = CVPR22,
YEAR = "2022",
PAGES = "14983-14993",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159108"}
@inproceedings{bb163256,
AUTHOR = "Guan, J. and Tu, Z. and He, R. and Tao, D.C.",
TITLE = "Few-shot Backdoor Defense Using Shapley Estimation",
BOOKTITLE = CVPR22,
YEAR = "2022",
PAGES = "13348-13357",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159109"}
@inproceedings{bb163257,
AUTHOR = "Tao, G.H. and Shen, G.Y. and Liu, Y.Q. and An, S.W. and Xu, Q.L. and Ma, S.Q. and Li, P. and Zhang, X.Y.",
TITLE = "Better Trigger Inversion Optimization in Backdoor Scanning",
BOOKTITLE = CVPR22,
YEAR = "2022",
PAGES = "13358-13368",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159110"}
@inproceedings{bb163258,
AUTHOR = "Chan, S.H. and Dong, Y.P. and Zhu, J. and Zhang, X.L. and Zhou, J.",
TITLE = "Baddet: Backdoor Attacks on Object Detection",
BOOKTITLE = AdvRob22,
YEAR = "2022",
PAGES = "396-412",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159111"}
@inproceedings{bb163259,
AUTHOR = "Ramakrishnan, G. and Albarghouthi, A.",
TITLE = "Backdoors in Neural Models of Source Code",
BOOKTITLE = "ICPR22",
YEAR = "2022",
PAGES = "2892-2899",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159112"}
@inproceedings{bb163260,
AUTHOR = "Phan, H. and Shi, C. and Xie, Y. and Zhang, T.F. and Li, Z.H. and Zhao, T.M. and Liu, J. and Wang, Y. and Chen, Y.Y. and Yuan, B.",
TITLE = "RIBAC: Towards Robust and Imperceptible Backdoor Attack against Compact
DNN",
BOOKTITLE = ECCV22,
YEAR = "2022",
PAGES = "IV:708-724",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159113"}
@inproceedings{bb163261,
AUTHOR = "Feng, Y. and Ma, B. and Zhang, J. and Zhao, S.S. and Xia, Y. and Tao, D.C.",
TITLE = "FIBA: Frequency-Injection based Backdoor Attack in Medical Image
Analysis",
BOOKTITLE = CVPR22,
YEAR = "2022",
PAGES = "20844-20853",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159114"}
@inproceedings{bb163262,
AUTHOR = "Zhao, Z.D. and Chen, X.J. and Xuan, Y.X. and Dong, Y. and Wang, D. and Liang, K.",
TITLE = "DEFEAT: Deep Hidden Feature Backdoor Attacks by Imperceptible
Perturbation and Latent Representation Constraints",
BOOKTITLE = CVPR22,
YEAR = "2022",
PAGES = "15192-15201",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159115"}
@inproceedings{bb163263,
AUTHOR = "Doan, K. and Lao, Y.J. and Zhao, W.J. and Li, P.",
TITLE = "LIRA: Learnable, Imperceptible and Robust Backdoor Attacks",
BOOKTITLE = ICCV21,
YEAR = "2021",
PAGES = "11946-11956",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159116"}
@inproceedings{bb163264,
AUTHOR = "Mehra, A. and Kailkhura, B. and Chen, P.Y. and Hamm, J.",
TITLE = "How Robust are Randomized Smoothing based Defenses to Data Poisoning?",
BOOKTITLE = CVPR21,
YEAR = "2021",
PAGES = "13239-13248",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159117"}
@inproceedings{bb163265,
AUTHOR = "Xiang, Z. and Miller, D.J. and Chen, S. and Li, X. and Kesidis, G.",
TITLE = "A Backdoor Attack against 3D Point Cloud Classifiers",
BOOKTITLE = ICCV21,
YEAR = "2021",
PAGES = "7577-7587",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159118"}
@inproceedings{bb163266,
AUTHOR = "Ren, Y.K. and Li, L.F. and Zhou, J.",
TITLE = "Simtrojan: Stealthy Backdoor Attack",
BOOKTITLE = ICIP21,
YEAR = "2021",
PAGES = "819-823",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159119"}
@inproceedings{bb163267,
AUTHOR = "Zhu, L. and Ning, R. and Xin, C.S. and Wang, C.G. and Wu, H.Y.",
TITLE = "CLEAR: Clean-up Sample-Targeted Backdoor in Neural Networks",
BOOKTITLE = ICCV21,
YEAR = "2021",
PAGES = "16433-16442",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159120"}
@inproceedings{bb163268,
AUTHOR = "Zeng, Y. and Park, W. and Mao, Z.M. and Jia, R.X.",
TITLE = "Rethinking the Backdoor Attacks' Triggers: A Frequency Perspective",
BOOKTITLE = ICCV21,
YEAR = "2021",
PAGES = "16453-16461",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159121"}
@inproceedings{bb163269,
AUTHOR = "Raj, A. and Pal, A. and Arora, C.",
TITLE = "Identifying Physically Realizable Triggers for Backdoored Face
Recognition Networks",
BOOKTITLE = ICIP21,
YEAR = "2021",
PAGES = "3023-3027",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159122"}
@inproceedings{bb163270,
AUTHOR = "Wang, R. and Zhang, G.Y. and Liu, S.J. and Chen, P.Y. and Xiong, J.J. and Wang, M.",
TITLE = "Practical Detection of Trojan Neural Networks:
Data-limited and Data-free Cases",
BOOKTITLE = ECCV20,
YEAR = "2020",
PAGES = "XXIII:222-238",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159123"}
@inproceedings{bb163271,
AUTHOR = "Liu, Y.F. and Ma, X.J. and Bailey, J. and Lu, F.",
TITLE = "Reflection Backdoor: A Natural Backdoor Attack on Deep Neural Networks",
BOOKTITLE = ECCV20,
YEAR = "2020",
PAGES = "X:182-199",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159124"}
@inproceedings{bb163272,
AUTHOR = "Zhao, S. and Ma, X. and Zheng, X. and Bailey, J. and Chen, J. and Jiang, Y.",
TITLE = "Clean-Label Backdoor Attacks on Video Recognition Models",
BOOKTITLE = CVPR20,
YEAR = "2020",
PAGES = "14431-14440",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159125"}
@inproceedings{bb163273,
AUTHOR = "Kolouri, S. and Saha, A. and Pirsiavash, H. and Hoffmann, H.",
TITLE = "Universal Litmus Patterns: Revealing Backdoor Attacks in CNNs",
BOOKTITLE = CVPR20,
YEAR = "2020",
PAGES = "298-307",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159126"}
@inproceedings{bb163274,
AUTHOR = "Truong, L. and Jones, C. and Hutchinson, B. and August, A. and Praggastis, B. and Jasper, R. and Nichols, N. and Tuor, A.",
TITLE = "Systematic Evaluation of Backdoor Data Poisoning Attacks on Image
Classifiers",
BOOKTITLE = AML-CV20,
YEAR = "2020",
PAGES = "3422-3431",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159127"}
@inproceedings{bb163275,
AUTHOR = "Barni, M. and Kallas, K. and Tondi, B.",
TITLE = "A New Backdoor Attack in CNNS by Training Set Corruption Without
Label Poisoning",
BOOKTITLE = ICIP19,
YEAR = "2019",
PAGES = "101-105",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT159128"}
@article{bb163276,
AUTHOR = "Goldblum, M. and Tsipras, D. and Xie, C. and Chen, X.Y. and Schwarzschild, A. and Song, D. and Madry, A. and Li, B. and Goldstein, T.",
TITLE = "Dataset Security for Machine Learning:
Data Poisoning, Backdoor Attacks, and Defenses",
JOURNAL = PAMI,
VOLUME = "45",
YEAR = "2023",
NUMBER = "2",
MONTH = "February",
PAGES = "1563-1580",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT159129"}
@inproceedings{bb163277,
AUTHOR = "Mu, B.X. and Niu, Z.X. and Wang, L. and Wang, X. and Mia, Q.G. and Jin, R. and Hua, G.",
TITLE = "Progressive Backdoor Erasing via connecting Backdoor and Adversarial
Attacks",
BOOKTITLE = CVPR23,
YEAR = "2023",
PAGES = "20495-20503",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT159130"}
@inproceedings{bb163278,
AUTHOR = "Pang, L. and Sun, T. and Ling, H.B. and Chen, C.",
TITLE = "Backdoor Cleansing with Unlabeled Data",
BOOKTITLE = CVPR23,
YEAR = "2023",
PAGES = "12218-12227",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT159131"}
@inproceedings{bb163279,
AUTHOR = "Zhang, Z. and Liu, Q. and Wang, Z.C. and Lu, Z. and Hu, Q.Y.",
TITLE = "Backdoor Defense via Deconfounded Representation Learning",
BOOKTITLE = CVPR23,
YEAR = "2023",
PAGES = "12228-12238",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT159132"}
@article{bb163280,
AUTHOR = "Yu, Y. and Wang, Y.F. and Yang, W.H. and Guo, L.Q. and Lu, S.J. and Duan, L.Y. and Tan, Y.P. and Kot, A.C.",
TITLE = "Robust and Transferable Backdoor Attacks Against Deep Image
Compression With Selective Frequency Prior",
JOURNAL = PAMI,
VOLUME = "47",
YEAR = "2025",
NUMBER = "3",
MONTH = "March",
PAGES = "1674-1693",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT159133"}
@inproceedings{bb163281,
AUTHOR = "Yu, Y. and Wang, Y.F. and Yang, W.H. and Lu, S.J. and Tan, Y.P. and Kot, A.C.",
TITLE = "Backdoor Attacks Against Deep Image Compression via Adaptive
Frequency Trigger",
BOOKTITLE = CVPR23,
YEAR = "2023",
PAGES = "12250-12259",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT159134"}
@article{bb163282,
AUTHOR = "Yang, W.H. and Huang, H.F. and Liu, J.Y. and Kot, A.C.",
TITLE = "Facial Image Compression via Neural Image Manifold Compression",
JOURNAL = CirSysVideo,
VOLUME = "35",
YEAR = "2025",
NUMBER = "4",
MONTH = "April",
PAGES = "3812-3824",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT159135"}
@inproceedings{bb163283,
AUTHOR = "Feng, S.W. and Tao, G.H. and Cheng, S.Y. and Shen, G.Y. and Xu, X.Z. and Liu, Y.Q. and Zhang, K.Y. and Ma, S.Q. and Zhang, X.Y.",
TITLE = "Detecting Backdoors in Pre-trained Encoders",
BOOKTITLE = CVPR23,
YEAR = "2023",
PAGES = "16352-16362",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT159136"}
@inproceedings{bb163284,
AUTHOR = "Liu, X. and Li, M.H. and Wang, H.Y. and Hu, S. and Ye, D. and Jin, H. and Wu, L. and Xiao, C.W.",
TITLE = "Detecting Backdoors During the Inference Stage Based on Corruption
Robustness Consistency",
BOOKTITLE = CVPR23,
YEAR = "2023",
PAGES = "16363-16372",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT159137"}
@inproceedings{bb163285,
AUTHOR = "Xu, Q. and Tao, G.N. and Honorio, J. and Liu, Y.Q. and An, S.W. and Shen, G.Y. and Cheng, S.Y. and Zhang, X.Y.",
TITLE = "MEDIC: Remove Model Backdoors via Importance Driven Cloning",
BOOKTITLE = CVPR23,
YEAR = "2023",
PAGES = "20485-20494",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT159138"}
@inproceedings{bb163286,
AUTHOR = "Chen, S. and Chen, H.L. and Haque, M. and Liu, C. and Yang, W.",
TITLE = "The Dark Side of Dynamic Routing Neural Networks: Towards Efficiency
Backdoor Injection",
BOOKTITLE = CVPR23,
YEAR = "2023",
PAGES = "24585-24594",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT159139"}
@inproceedings{bb163287,
AUTHOR = "Bober Irizar, M. and Shumailov, I. and Zhao, Y.R. and Mullins, R. and Papernot, N.",
TITLE = "Architectural Backdoors in Neural Networks",
BOOKTITLE = CVPR23,
YEAR = "2023",
PAGES = "24595-24604",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT159140"}
@inproceedings{bb163288,
AUTHOR = "Yuan, Z.H. and Zhou, P. and Zou, K. and Cheng, Y.",
TITLE = "You Are Catching My Attention: Are Vision Transformers Bad Learners
under Backdoor Attacks?",
BOOKTITLE = CVPR23,
YEAR = "2023",
PAGES = "24605-24615",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT159141"}
@inproceedings{bb163289,
AUTHOR = "Tejankar, A. and Sanjabi, M. and Wang, Q.F. and Wang, S.N. and Firooz, H. and Pirsiavash, H. and Tan, L.",
TITLE = "Defending Against Patch-based Backdoor Attacks on Self-Supervised
Learning",
BOOKTITLE = CVPR23,
YEAR = "2023",
PAGES = "12239-12249",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT159142"}
@inproceedings{bb163290,
AUTHOR = "Saha, A. and Tejankar, A. and Koohpayegani, S.A. and Pirsiavash, H.",
TITLE = "Backdoor Attacks on Self-Supervised Learning",
BOOKTITLE = CVPR22,
YEAR = "2022",
PAGES = "13327-13336",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT159143"}
@inproceedings{bb163291,
AUTHOR = "Qi, X.Y. and Xie, T.H. and Pan, R.Z. and Zhu, J.F. and Yang, Y. and Bu, K.",
TITLE = "Towards Practical Deployment-Stage Backdoor Attack on Deep Neural
Networks",
BOOKTITLE = CVPR22,
YEAR = "2022",
PAGES = "13337-13347",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT159144"}
@inproceedings{bb163292,
AUTHOR = "Huang, S.J. and Peng, W.Q. and Jia, Z.W. and Tu, Z.W.",
TITLE = "One-pixel Signature: Characterizing CNN Models for Backdoor Detection",
BOOKTITLE = ECCV20,
YEAR = "2020",
PAGES = "XXVII:326-341",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT159145"}
@article{bb163293,
AUTHOR = "Hang, J. and Han, K. and Chen, H. and Li, Y.",
TITLE = "Ensemble adversarial black-box attacks against deep learning systems",
JOURNAL = PR,
VOLUME = "101",
YEAR = "2020",
PAGES = "107184",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT159146"}
@article{bb163294,
AUTHOR = "Correia Silva, J.R. and Berriel, R.F. and Badue, C. and de Souza, A.F. and Oliveira Santos, T.",
TITLE = "Copycat CNN: Are random non-Labeled data enough to steal knowledge
from black-box models?",
JOURNAL = PR,
VOLUME = "113",
YEAR = "2021",
PAGES = "107830",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT159147"}
@article{bb163295,
AUTHOR = "Gragnaniello, D. and Marra, F. and Verdoliva, L. and Poggi, G.",
TITLE = "Perceptual quality-preserving black-box attack against deep learning
image classifiers",
JOURNAL = PRL,
VOLUME = "147",
YEAR = "2021",
PAGES = "142-149",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT159148"}
@article{bb163296,
AUTHOR = "Li, N.N. and Chen, Z.Z.",
TITLE = "Toward Visual Distortion in Black-Box Attacks",
JOURNAL = IP,
VOLUME = "30",
YEAR = "2021",
PAGES = "6156-6167",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT159149"}
@article{bb163297,
AUTHOR = "Lin, D. and Wang, Y.G. and Tang, W.X. and Kang, X.G.",
TITLE = "Boosting Query Efficiency of Meta Attack With Dynamic Fine-Tuning",
JOURNAL = SPLetters,
VOLUME = "29",
YEAR = "2022",
PAGES = "2557-2561",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT159150"}
@article{bb163298,
AUTHOR = "Cina, A.E. and Torcinovich, A. and Pelillo, M.",
TITLE = "A black-box adversarial attack for poisoning clustering",
JOURNAL = PR,
VOLUME = "122",
YEAR = "2022",
PAGES = "108306",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT159151"}
@article{bb163299,
AUTHOR = "Ghosh, A. and Mullick, S.S. and Datta, S. and Das, S. and Das, A.K. and Mallipeddi, R.",
TITLE = "A black-box adversarial attack strategy with adjustable sparsity and
generalizability for deep image classifiers",
JOURNAL = PR,
VOLUME = "122",
YEAR = "2022",
PAGES = "108279",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT159152"}
Last update:Mar 28, 2026 at 17:09:41