Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Access"
DOI: 10.1109/access.2024.3521330
Abstract: Deep neural networks (DNNs) have been widely used in the field of image recognition. The advent of image backdoor attacks poses significant security threats to the use of DNNs. Researching advanced backdoor attacks is a…
read more here.
Keywords:
backdoor;
image;
attack based;
backdoor attack ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "IEEE Access"
DOI: 10.1109/access.2025.3558276
Abstract: Deep learning (DL)-based wireless signal classification is increasingly becoming important and deployed on edge devices (e.g., IoT, smartphones, etc.) to enhance communication reliability and efficiency. However, these DL models are vulnerable to security threats due…
read more here.
Keywords:
deep learning;
attack;
based wireless;
backdoor attack ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Journal on Selected Areas in Communications"
DOI: 10.1109/jsac.2023.3345379
Abstract: Behavior-oriented decision-makers are critical components in generating intelligent decisions for user virtual interactions in metaverse. In this work, we study the efficiency and security of behavior-oriented decision-makers in metaverse from perspective of autonomous driving (AD),…
read more here.
Keywords:
decision makers;
backdoor attack;
decision;
behavior oriented ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "IEEE Transactions on Dependable and Secure Computing"
DOI: 10.1109/tdsc.2025.3548611
Abstract: Deep learning-based automatic speech recognition (ASR) systems are capable of transcribing input audio of arbitrary duration into character sequences, which are widely used in daily life. However, recent research has found that deep learning models…
read more here.
Keywords:
backdoor;
backdoor attack;
speech recognition;
practical backdoor ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Transactions on Dependable and Secure Computing"
DOI: 10.1109/tdsc.2025.3593640
Abstract: Federated learning is a promising approach for training machine learning models while preserving data privacy. However, its distributed nature makes it vulnerable to backdoor attacks, particularly in NLP tasks, where related research remains limited. This…
read more here.
Keywords:
stealthy long;
long lasting;
backdoor attack;
sdba stealthy ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2025.3556346
Abstract: Federated learning under heterogeneous models, as an innovative approach, aims to break through the constraints of vanilla federated learning on the consistency of model architectures to better accommodate the heterogeneity of data distributions and hardware…
read more here.
Keywords:
backdoor attack;
learning heterogeneous;
model;
federated learning ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2025.3575274
Abstract: As three-dimensional (3D) point cloud technology has advanced, the security concerns that surround point cloud classification models have garnered increasing attention. Attackers poison the training dataset of a model to mislead model classification, which is…
read more here.
Keywords:
backdoor;
backdoor attack;
point cloud;
affinity ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2025.3581095
Abstract: Vertical Federated Learning (VFL), as one of the key paradigms in federated learning, is commonly employed in scenarios where multiple parties share the same sample set but possess different features for these samples. Previous studies…
read more here.
Keywords:
attack;
backdoor attack;
vertical federated;
federated learning ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Industrial Informatics"
DOI: 10.1109/tii.2021.3112100
Abstract: The federated learning provides an effective solution to train collaborative models over a large scale of participated Industrial Internet of Things (IIoT) applications with the help of a global server, building an intelligent life. However,…
read more here.
Keywords:
mitigating backdoor;
attack federated;
backdoor attack;
attack ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Transactions on Vehicular Technology"
DOI: 10.1109/tvt.2024.3427713
Abstract: Semantic communication (SemCom) can reduce data traffic for intelligent connected vehicles (ICVs), given the limited wireless spectrum available. However, it is important to recognize that deep learning-based SemCom is vulnerable to backdoor attacks, which pose…
read more here.
Keywords:
connected vehicles;
attack;
backdoor attack;
covert semantic ... See more keywords