Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Backdoor attacks against voice recognition systems: A survey
Voice Recognition Systems (VRSs) employ deep learning for speech recognition and
speaker recognition. They have been widely deployed in various real-world applications …
speaker recognition. They have been widely deployed in various real-world applications …
Scale-up: An efficient black-box input-level backdoor detection via analyzing scaled prediction consistency
Deep neural networks (DNNs) are vulnerable to backdoor attacks, where adversaries
embed a hidden backdoor trigger during the training process for malicious prediction …
embed a hidden backdoor trigger during the training process for malicious prediction …
A survey of graph neural networks and their industrial applications
H Lu, L Wang, X Ma, J Cheng, M Zhou - Neurocomputing, 2024 - Elsevier
Abstract Graph Neural Networks (GNNs) have emerged as a powerful tool for analyzing and
modeling graph-structured data. In recent years, GNNs have gained significant attention in …
modeling graph-structured data. In recent years, GNNs have gained significant attention in …
Backdoor cleansing with unlabeled data
Due to the increasing computational demand of Deep Neural Networks (DNNs), companies
and organizations have begun to outsource the training process. However, the externally …
and organizations have begun to outsource the training process. However, the externally …
On the effectiveness of distillation in mitigating backdoors in pre-trained encoder
In this paper, we study a defense against poisoned encoders in SSL called distillation, which
is a defense used in supervised learning originally. Distillation aims to distill knowledge from …
is a defense used in supervised learning originally. Distillation aims to distill knowledge from …
Backdoor attacks to deep learning models and countermeasures: A survey
Backdoor attacks have severely threatened deep neural network (DNN) models in the past
several years. In backdoor attacks, the attackers try to plant hidden backdoors into DNN …
several years. In backdoor attacks, the attackers try to plant hidden backdoors into DNN …
Ntd: Non-transferability enabled deep learning backdoor detection
To mitigate recent insidious backdoor attacks on deep learning models, advances have
been made by the research community. Nonetheless, state-of-the-art defenses are either …
been made by the research community. Nonetheless, state-of-the-art defenses are either …
Mutual information guided backdoor mitigation for pre-trained encoders
Self-supervised learning (SSL) is increasingly attractive for pre-training encoders without
requiring labeled data. Downstream tasks built on top of those pre-trained encoders can …
requiring labeled data. Downstream tasks built on top of those pre-trained encoders can …
BadCleaner: Defending Backdoor Attacks in Federated Learning via Attention-Based Multi-Teacher Distillation
As a privacy-preserving distributed learning paradigm, federated learning (FL) has been
proven to be vulnerable to various attacks, among which backdoor attack is one of the …
proven to be vulnerable to various attacks, among which backdoor attack is one of the …
Energy-based backdoor defense without task-specific samples and model retraining
Backdoor defense is crucial to ensure the safety and robustness of machine learning models
when under attack. However, most existing methods specialize in either the detection or …
when under attack. However, most existing methods specialize in either the detection or …