找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Backdoor Attacks against Learning-Based Algorithms; Shaofeng Li,Haojin Zhu,Xuemin (Sherman) Shen Book 2024 The Editor(s) (if applicable) a

[复制链接]
查看: 16232|回复: 37
发表于 2025-3-21 16:11:46 | 显示全部楼层 |阅读模式
期刊全称Backdoor Attacks against Learning-Based Algorithms
影响因子2023Shaofeng Li,Haojin Zhu,Xuemin (Sherman) Shen
视频video
发行地址Thorough review of backdoor attacks and their potential mitigations in learning-based algorithms.Focus on challenges such as design of invisible backdoor triggers and natural language processing syste
学科分类Wireless Networks
图书封面Titlebook: Backdoor Attacks against Learning-Based Algorithms;  Shaofeng Li,Haojin Zhu,Xuemin (Sherman) Shen Book 2024 The Editor(s) (if applicable) a
影响因子This book introduces a new type of data poisoning attack, dubbed, backdoor attack. In backdoor attacks, an attacker can train the model with poisoned data to obtain a model that performs well on a normal input but behaves wrongly with crafted triggers. Backdoor attacks can occur in many scenarios where the training process is not entirely controlled, such as using third-party datasets, third-party platforms for training, or directly calling models provided by third parties. Due to the enormous threat that backdoor attacks pose to model supply chain security, they have received widespread attention from academia and industry. This book focuses on exploiting backdoor attacks in the three types of DNN applications, which are image classification, natural language processing, and federated learning..Based on the observation that DNN models are vulnerable to small perturbations, this book demonstrates that steganography and regularization can be adopted to enhance the invisibility of backdoor triggers. Based on image similarity measurement, this book presents two metrics to quantitatively measure the invisibility of backdoor triggers. The invisible trigger design scheme introduced in th
Pindex Book 2024
The information of publication is updating

书目名称Backdoor Attacks against Learning-Based Algorithms影响因子(影响力)




书目名称Backdoor Attacks against Learning-Based Algorithms影响因子(影响力)学科排名




书目名称Backdoor Attacks against Learning-Based Algorithms网络公开度




书目名称Backdoor Attacks against Learning-Based Algorithms网络公开度学科排名




书目名称Backdoor Attacks against Learning-Based Algorithms被引频次




书目名称Backdoor Attacks against Learning-Based Algorithms被引频次学科排名




书目名称Backdoor Attacks against Learning-Based Algorithms年度引用




书目名称Backdoor Attacks against Learning-Based Algorithms年度引用学科排名




书目名称Backdoor Attacks against Learning-Based Algorithms读者反馈




书目名称Backdoor Attacks against Learning-Based Algorithms读者反馈学科排名




单选投票, 共有 0 人参与投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-22 00:00:05 | 显示全部楼层
发表于 2025-3-22 03:34:14 | 显示全部楼层
发表于 2025-3-22 07:46:46 | 显示全部楼层
Hidden Backdoor Attacks in NLP Based Network Services,a language model and may only be activated by specific inputs (called triggers), to trick the model into producing unexpected behaviors. In this chapter, we create covert and natural triggers for textual backdoor attacks, ., where triggers can fool both modern language models and human inspection. W
发表于 2025-3-22 09:19:22 | 显示全部楼层
发表于 2025-3-22 13:15:19 | 显示全部楼层
Summary and Future Directions,ive of human vision as the research target. A new type of invisible backdoor attack was designed for DNN models in the field of image classification and natural language processing. Lastly, for backdoor attacks in the federated learning system, an analysis was introduced from the perspective of coop
发表于 2025-3-22 19:46:22 | 显示全部楼层
2366-1186 ible backdoor triggers and natural language processing systeThis book introduces a new type of data poisoning attack, dubbed, backdoor attack. In backdoor attacks, an attacker can train the model with poisoned data to obtain a model that performs well on a normal input but behaves wrongly with craft
发表于 2025-3-23 00:26:58 | 显示全部楼层
发表于 2025-3-23 02:29:07 | 显示全部楼层
发表于 2025-3-23 07:03:22 | 显示全部楼层
Health Promotion in Sports Settings, which mainly include the success rate of the attack and the availability of the model. At last, we survey related works on backdoor attacks to provide a comprehensive overview of the current literature on the three application areas of deep neural networks mentioned above.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-10 13:03
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表