Lotus: Evasive and resilient backdoor attacks through sub-partitioning
Backdoor attack poses a significant security threat to Deep Learning applications. Existing
attacks are often not evasive to established backdoor detection techniques. This …
attacks are often not evasive to established backdoor detection techniques. This …
[PDF][PDF] BAIT: Large Language Model Backdoor Scanning by Inverting Attack Target
Recent literature has shown that LLMs are vulnerable to backdoor attacks, where malicious
attackers inject a secret token sequence (ie, trigger) into training prompts and enforce their …
attackers inject a secret token sequence (ie, trigger) into training prompts and enforce their …
UNIT: Backdoor Mitigation via Automated Neural Distribution Tightening
Deep neural networks (DNNs) have demonstrated effectiveness in various fields. However,
DNNs are vulnerable to backdoor attacks, which inject a unique pattern, called trigger, into …
DNNs are vulnerable to backdoor attacks, which inject a unique pattern, called trigger, into …
Towards robust object detection: Identifying and removing backdoors via module inconsistency analysis
Object detection models, widely used in security-critical applications, are vulnerable to
backdoor attacks that cause targeted misclassifications when triggered by specific patterns …
backdoor attacks that cause targeted misclassifications when triggered by specific patterns …
TrojanDec: Data-free Detection of Trojan Inputs in Self-supervised Learning
An image encoder pre-trained by self-supervised learning can be used as a general-
purpose feature extractor to build downstream classifiers for various downstream tasks …
purpose feature extractor to build downstream classifiers for various downstream tasks …
Preference Poisoning Attacks on Reward Model Learning
Learning utility, or reward, models from pairwise comparisons is a fundamental component
in a number of application domains. These approaches inherently entail collecting …
in a number of application domains. These approaches inherently entail collecting …
Comprehensive Evaluation of Cloaking Backdoor Attacks on Object Detector in Real-World
The exploration of backdoor vulnerabilities in object detectors, particularly in real-world
scenarios, remains limited. A significant challenge lies in the absence of a natural physical …
scenarios, remains limited. A significant challenge lies in the absence of a natural physical …