Lotus: Evasive and resilient backdoor attacks through sub-partitioning

S Cheng, G Tao, Y Liu, G Shen, S An… - Proceedings of the …, 2024 - openaccess.thecvf.com
Backdoor attack poses a significant security threat to Deep Learning applications. Existing
attacks are often not evasive to established backdoor detection techniques. This …

[PDF][PDF] BAIT: Large Language Model Backdoor Scanning by Inverting Attack Target

G Shen, S Cheng, Z Zhang, G Tao, K Zhang… - 2025 IEEE Symposium …, 2024 - cs.purdue.edu
Recent literature has shown that LLMs are vulnerable to backdoor attacks, where malicious
attackers inject a secret token sequence (ie, trigger) into training prompts and enforce their …

UNIT: Backdoor Mitigation via Automated Neural Distribution Tightening

S Cheng, G Shen, K Zhang, G Tao, S An, H Guo… - … on Computer Vision, 2024 - Springer
Deep neural networks (DNNs) have demonstrated effectiveness in various fields. However,
DNNs are vulnerable to backdoor attacks, which inject a unique pattern, called trigger, into …

Towards robust object detection: Identifying and removing backdoors via module inconsistency analysis

X Zhang, S Liang, C Li - International Conference on Pattern Recognition, 2024 - Springer
Object detection models, widely used in security-critical applications, are vulnerable to
backdoor attacks that cause targeted misclassifications when triggered by specific patterns …

TrojanDec: Data-free Detection of Trojan Inputs in Self-supervised Learning

Y Liu, Y Wang, J Jia - arxiv preprint arxiv:2501.04108, 2025 - arxiv.org
An image encoder pre-trained by self-supervised learning can be used as a general-
purpose feature extractor to build downstream classifiers for various downstream tasks …

Preference Poisoning Attacks on Reward Model Learning

J Wu, J Wang, C **ao, C Wang, N Zhang… - arxiv preprint arxiv …, 2024 - arxiv.org
Learning utility, or reward, models from pairwise comparisons is a fundamental component
in a number of application domains. These approaches inherently entail collecting …

Comprehensive Evaluation of Cloaking Backdoor Attacks on Object Detector in Real-World

H Ma, A Abuadbba, Y Gao, H Kim, S Nepal - arxiv preprint arxiv …, 2025 - arxiv.org
The exploration of backdoor vulnerabilities in object detectors, particularly in real-world
scenarios, remains limited. A significant challenge lies in the absence of a natural physical …