2023
DOI: 10.2139/ssrn.4330225
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Backdoor Pony: Evaluating Backdoor Attacks and Defenses in Different Domains

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 58 publications
0
1
0
Order By: Relevance
“…Since then, an increasing number of studies [60], [61], [62], [63], [58], [64], [65], [66], [21], [67], [68], and [44], [69] have been dedicated to the subject, significantly increasing the class of available attacks and the application scenarios potentially targeted by backdooring attempts. The proposed attacks differ on the basis of the event triggering the backdoor at test time, malicious behavior induced by the activation of the backdoor, stealthiness of the procedure used to inject the backdoor, modality through which the attacker interferes with the training process, and knowledge that the attacker has about the attacked network.…”
Section: Introductionmentioning
confidence: 99%
“…Since then, an increasing number of studies [60], [61], [62], [63], [58], [64], [65], [66], [21], [67], [68], and [44], [69] have been dedicated to the subject, significantly increasing the class of available attacks and the application scenarios potentially targeted by backdooring attempts. The proposed attacks differ on the basis of the event triggering the backdoor at test time, malicious behavior induced by the activation of the backdoor, stealthiness of the procedure used to inject the backdoor, modality through which the attacker interferes with the training process, and knowledge that the attacker has about the attacked network.…”
Section: Introductionmentioning
confidence: 99%