Articles with "backdoor attack" as a keyword



Backdoor Attack Based on Lossy Image Compression Using Discrete Cosine Transform

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Access"

DOI: 10.1109/access.2024.3521330

Abstract: Deep neural networks (DNNs) have been widely used in the field of image recognition. The advent of image backdoor attacks poses significant security threats to the use of DNNs. Researching advanced backdoor attacks is a… read more here.

Keywords: backdoor; image; attack based; backdoor attack ... See more keywords

A Novel and Efficient Multi-Target Backdoor Attack for Deep Learning-Based Wireless Signal Classifiers

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Access"

DOI: 10.1109/access.2025.3558276

Abstract: Deep learning (DL)-based wireless signal classification is increasingly becoming important and deployed on edge devices (e.g., IoT, smartphones, etc.) to enhance communication reliability and efficiency. However, these DL models are vulnerable to security threats due… read more here.

Keywords: deep learning; attack; based wireless; backdoor attack ... See more keywords

A Spatiotemporal Backdoor Attack Against Behavior-Oriented Decision Makers in Metaverse: From Perspective of Autonomous Driving

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Journal on Selected Areas in Communications"

DOI: 10.1109/jsac.2023.3345379

Abstract: Behavior-oriented decision-makers are critical components in generating intelligent decisions for user virtual interactions in metaverse. In this work, we study the efficiency and security of behavior-oriented decision-makers in metaverse from perspective of autonomous driving (AD),… read more here.

Keywords: decision makers; backdoor attack; decision; behavior oriented ... See more keywords

CuckooAttack: Towards Practical Backdoor Attack against Automatic Speech Recognition Systems

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2025.3548611

Abstract: Deep learning-based automatic speech recognition (ASR) systems are capable of transcribing input audio of arbitrary duration into character sequences, which are widely used in daily life. However, recent research has found that deep learning models… read more here.

Keywords: backdoor; backdoor attack; speech recognition; practical backdoor ... See more keywords

SDBA: A Stealthy and Long-Lasting Durable Backdoor Attack in Federated Learning

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2025.3593640

Abstract: Federated learning is a promising approach for training machine learning models while preserving data privacy. However, its distributed nature makes it vulnerable to backdoor attacks, particularly in NLP tasks, where related research remains limited. This… read more here.

Keywords: stealthy long; long lasting; backdoor attack; sdba stealthy ... See more keywords

CapsuleBD: A Backdoor Attack Method Against Federated Learning Under Heterogeneous Models

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2025.3556346

Abstract: Federated learning under heterogeneous models, as an innovative approach, aims to break through the constraints of vanilla federated learning on the consistency of model architectures to better accommodate the heterogeneity of data distributions and hardware… read more here.

Keywords: backdoor attack; learning heterogeneous; model; federated learning ... See more keywords

Affinity Backdoor Attacks in Point Clouds: A Novel Method Resilient to Corruption

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2025.3575274

Abstract: As three-dimensional (3D) point cloud technology has advanced, the security concerns that surround point cloud classification models have garnered increasing attention. Attackers poison the training dataset of a model to mislead model classification, which is… read more here.

Keywords: backdoor; backdoor attack; point cloud; affinity ... See more keywords

Backdoor Attack on Encryption-Protected Vertical Federated Learning

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2025.3581095

Abstract: Vertical Federated Learning (VFL), as one of the key paradigms in federated learning, is commonly employed in scenarios where multiple parties share the same sample set but possess different features for these samples. Previous studies… read more here.

Keywords: attack; backdoor attack; vertical federated; federated learning ... See more keywords

Mitigating the Backdoor Attack by Federated Filters for Industrial IoT Applications

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Industrial Informatics"

DOI: 10.1109/tii.2021.3112100

Abstract: The federated learning provides an effective solution to train collaborative models over a large scale of participated Industrial Internet of Things (IIoT) applications with the help of a global server, building an intelligent life. However,… read more here.

Keywords: mitigating backdoor; attack federated; backdoor attack; attack ... See more keywords

CSBA: Covert Semantic Backdoor Attack Against Intelligent Connected Vehicles

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Transactions on Vehicular Technology"

DOI: 10.1109/tvt.2024.3427713

Abstract: Semantic communication (SemCom) can reduce data traffic for intelligent connected vehicles (ICVs), given the limited wireless spectrum available. However, it is important to recognize that deep learning-based SemCom is vulnerable to backdoor attacks, which pose… read more here.

Keywords: connected vehicles; attack; backdoor attack; covert semantic ... See more keywords