Backdoor attacks against voice recognition systems: A survey

B Yan, J Lan, Z Yan - ACM Computing Surveys, 2024 - dl.acm.org
Voice Recognition Systems (VRSs) employ deep learning for speech recognition and
speaker recognition. They have been widely deployed in various real-world applications …

Scale-up: An efficient black-box input-level backdoor detection via analyzing scaled prediction consistency

J Guo, Y Li, X Chen, H Guo, L Sun, C Liu - arxiv preprint arxiv:2302.03251, 2023 - arxiv.org
Deep neural networks (DNNs) are vulnerable to backdoor attacks, where adversaries
embed a hidden backdoor trigger during the training process for malicious prediction …

A survey of graph neural networks and their industrial applications

H Lu, L Wang, X Ma, J Cheng, M Zhou - Neurocomputing, 2024 - Elsevier
Abstract Graph Neural Networks (GNNs) have emerged as a powerful tool for analyzing and
modeling graph-structured data. In recent years, GNNs have gained significant attention in …

Backdoor cleansing with unlabeled data

L Pang, T Sun, H Ling, C Chen - Proceedings of the IEEE …, 2023 - openaccess.thecvf.com
Due to the increasing computational demand of Deep Neural Networks (DNNs), companies
and organizations have begun to outsource the training process. However, the externally …

On the effectiveness of distillation in mitigating backdoors in pre-trained encoder

T Han, S Huang, Z Ding, W Sun, Y Feng… - arxiv preprint arxiv …, 2024 - arxiv.org
In this paper, we study a defense against poisoned encoders in SSL called distillation, which
is a defense used in supervised learning originally. Distillation aims to distill knowledge from …

Backdoor attacks to deep learning models and countermeasures: A survey

Y Li, S Zhang, W Wang, H Song - IEEE Open Journal of the …, 2023 - ieeexplore.ieee.org
Backdoor attacks have severely threatened deep neural network (DNN) models in the past
several years. In backdoor attacks, the attackers try to plant hidden backdoors into DNN …

Ntd: Non-transferability enabled deep learning backdoor detection

Y Li, H Ma, Z Zhang, Y Gao, A Abuadbba… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
To mitigate recent insidious backdoor attacks on deep learning models, advances have
been made by the research community. Nonetheless, state-of-the-art defenses are either …

Mutual information guided backdoor mitigation for pre-trained encoders

T Han, W Sun, Z Ding, C Fang, H Qian, J Li… - arxiv preprint arxiv …, 2024 - arxiv.org
Self-supervised learning (SSL) is increasingly attractive for pre-training encoders without
requiring labeled data. Downstream tasks built on top of those pre-trained encoders can …

BadCleaner: Defending Backdoor Attacks in Federated Learning via Attention-Based Multi-Teacher Distillation

J Zhang, C Zhu, C Ge, C Ma, Y Zhao… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
As a privacy-preserving distributed learning paradigm, federated learning (FL) has been
proven to be vulnerable to various attacks, among which backdoor attack is one of the …

Energy-based backdoor defense without task-specific samples and model retraining

Y Gao, H Chen, P Sun, Z Li, J Li… - Forty-first International …, 2024 - openreview.net
Backdoor defense is crucial to ensure the safety and robustness of machine learning models
when under attack. However, most existing methods specialize in either the detection or …