Sign Up to like & get
recommendations!
0
Published in 2024 at "IETE Journal of Research"
DOI: 10.1080/03772063.2023.2230174
Abstract: The evolution of Industrial Internet of Things (IIoT) applications provides intelligent microservices to process the generated massive data. However, the open and interconnected structure of IIoT makes the network model more vulnerable to malware attacks.…
read more here.
Keywords:
backdoor;
mask region;
double mask;
model ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Access"
DOI: 10.1109/access.2024.3521330
Abstract: Deep neural networks (DNNs) have been widely used in the field of image recognition. The advent of image backdoor attacks poses significant security threats to the use of DNNs. Researching advanced backdoor attacks is a…
read more here.
Keywords:
backdoor;
image;
attack based;
backdoor attack ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2024.3368754
Abstract: Internet of Things (IoT) devices generate massive amounts of data from local devices, making federated learning (FL) a viable distributed machine learning paradigm to learn a global model while keeping private data locally in various…
read more here.
Keywords:
backdoor;
backdoor attacks;
iot systems;
collusive backdoor ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2024.3438150
Abstract: Federated learning is a distributed machine learning approach that enables multiple participants to collaboratively train a model without sharing their data, thus preserving privacy. However, the decentralized nature of federated learning also makes it susceptible…
read more here.
Keywords:
backdoor;
shot backdoor;
one shot;
federated learning ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Transactions on Dependable and Secure Computing"
DOI: 10.1109/tdsc.2020.3021407
Abstract: Deep neural networks (DNNs) have been proven vulnerable to backdoor attacks, where hidden features (patterns) trained to a normal model, which is only activated by some specific input (called triggers), trick the model into producing…
read more here.
Keywords:
deep neural;
neural networks;
backdoor attacks;
invisible backdoor ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Transactions on Dependable and Secure Computing"
DOI: 10.1109/tdsc.2024.3354736
Abstract: Due to the powerful representation ability and superior performance of Deep Neural Networks (DNN), Federated Learning (FL) based on DNN has attracted much attention from both academic and industrial fields. However, its transmitted plaintext data…
read more here.
Keywords:
backdoor;
backdoor attacks;
underline underline;
secure ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Transactions on Dependable and Secure Computing"
DOI: 10.1109/tdsc.2024.3376790
Abstract: Federated Learning (FL) is nowadays one of the most promising paradigms for privacy-preserving distributed learning. Without revealing its local private data to outsiders, a client in FL systems collaborates to build a global Deep Neural…
read more here.
Keywords:
backdoor;
backdoor attacks;
attack;
practical backdoor ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "IEEE Transactions on Dependable and Secure Computing"
DOI: 10.1109/tdsc.2025.3548611
Abstract: Deep learning-based automatic speech recognition (ASR) systems are capable of transcribing input audio of arbitrary duration into character sequences, which are widely used in daily life. However, recent research has found that deep learning models…
read more here.
Keywords:
backdoor;
backdoor attack;
speech recognition;
practical backdoor ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "IEEE Transactions on Dependable and Secure Computing"
DOI: 10.1109/tdsc.2025.3603639
Abstract: With the rapid development of deep learning technology, deep learning-based Image-to-Image (I2I) networks have become the predominant choice for I2I tasks like image super-resolution and denoising. Despite their remarkable performance, the security of I2I networks…
read more here.
Keywords:
backdoor;
i2i backdoor;
image;
image image ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2023.3280032
Abstract: For model privacy, local model parameters in federated learning shall be obfuscated before sent to the remote aggregator. This technique is referred to as secure aggregation. However, secure aggregation makes model poisoning attacks such as…
read more here.
Keywords:
aggregation;
federated learning;
secure aggregation;
model ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2024.3436508
Abstract: Recent research findings suggest that machine learning models are highly susceptible to backdoor poisoning attacks. Backdoor poisoning attacks can be easily executed and achieve high success rates, as the model exhibits anomalous behavior even if…
read more here.
Keywords:
task;
backdoor;
attacked model;
model ... See more keywords