Articles with "backdoor" as a keyword



Backdoor Attacks Prediction in IIoT Network using Optimal Double Mask Region Convolution Model

Sign Up to like & get
recommendations!
Published in 2024 at "IETE Journal of Research"

DOI: 10.1080/03772063.2023.2230174

Abstract: The evolution of Industrial Internet of Things (IIoT) applications provides intelligent microservices to process the generated massive data. However, the open and interconnected structure of IIoT makes the network model more vulnerable to malware attacks.… read more here.

Keywords: backdoor; mask region; double mask; model ... See more keywords

Backdoor Attack Based on Lossy Image Compression Using Discrete Cosine Transform

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Access"

DOI: 10.1109/access.2024.3521330

Abstract: Deep neural networks (DNNs) have been widely used in the field of image recognition. The advent of image backdoor attacks poses significant security threats to the use of DNNs. Researching advanced backdoor attacks is a… read more here.

Keywords: backdoor; image; attack based; backdoor attack ... See more keywords

Collusive Backdoor Attacks in Federated Learning Frameworks for IoT Systems

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2024.3368754

Abstract: Internet of Things (IoT) devices generate massive amounts of data from local devices, making federated learning (FL) a viable distributed machine learning paradigm to learn a global model while keeping private data locally in various… read more here.

Keywords: backdoor; backdoor attacks; iot systems; collusive backdoor ... See more keywords

One-Shot Backdoor Removal for Federated Learning

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2024.3438150

Abstract: Federated learning is a distributed machine learning approach that enables multiple participants to collaboratively train a model without sharing their data, thus preserving privacy. However, the decentralized nature of federated learning also makes it susceptible… read more here.

Keywords: backdoor; shot backdoor; one shot; federated learning ... See more keywords

Invisible Backdoor Attacks on Deep Neural Networks Via Steganography and Regularization

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2020.3021407

Abstract: Deep neural networks (DNNs) have been proven vulnerable to backdoor attacks, where hidden features (patterns) trained to a normal model, which is only activated by some specific input (called triggers), trick the model into producing… read more here.

Keywords: deep neural; neural networks; backdoor attacks; invisible backdoor ... See more keywords

Efficient and Secure Federated Learning Against Backdoor Attacks

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2024.3354736

Abstract: Due to the powerful representation ability and superior performance of Deep Neural Networks (DNN), Federated Learning (FL) based on DNN has attracted much attention from both academic and industrial fields. However, its transmitted plaintext data… read more here.

Keywords: backdoor; backdoor attacks; underline underline; secure ... See more keywords

Towards Practical Backdoor Attacks on Federated Learning Systems

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2024.3376790

Abstract: Federated Learning (FL) is nowadays one of the most promising paradigms for privacy-preserving distributed learning. Without revealing its local private data to outsiders, a client in FL systems collaborates to build a global Deep Neural… read more here.

Keywords: backdoor; backdoor attacks; attack; practical backdoor ... See more keywords

CuckooAttack: Towards Practical Backdoor Attack against Automatic Speech Recognition Systems

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2025.3548611

Abstract: Deep learning-based automatic speech recognition (ASR) systems are capable of transcribing input audio of arbitrary duration into character sequences, which are widely used in daily life. However, recent research has found that deep learning models… read more here.

Keywords: backdoor; backdoor attack; speech recognition; practical backdoor ... See more keywords

I2I Backdoor: Backdoor Attacks Against Image-to-Image Tasks

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2025.3603639

Abstract: With the rapid development of deep learning technology, deep learning-based Image-to-Image (I2I) networks have become the predominant choice for I2I tasks like image super-resolution and denoising. Despite their remarkable performance, the security of I2I networks… read more here.

Keywords: backdoor; i2i backdoor; image; image image ... See more keywords

SAFELearning: Secure Aggregation in Federated Learning with Backdoor Detectability

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2023.3280032

Abstract: For model privacy, local model parameters in federated learning shall be obfuscated before sent to the remote aggregator. This technique is referred to as secure aggregation. However, secure aggregation makes model poisoning attacks such as… read more here.

Keywords: aggregation; federated learning; secure aggregation; model ... See more keywords

Anti-Backdoor Model: A Novel Algorithm to Remove Backdoors in a Non-Invasive Way

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2024.3436508

Abstract: Recent research findings suggest that machine learning models are highly susceptible to backdoor poisoning attacks. Backdoor poisoning attacks can be easily executed and achieve high success rates, as the model exhibits anomalous behavior even if… read more here.

Keywords: task; backdoor; attacked model; model ... See more keywords