ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2023
DOI: 10.1109/icassp49357.2023.10096034
|View full text |Cite
|
Sign up to set email alerts
|

BATT: Backdoor Attack with Transformation-Based Triggers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…Additionally, recent works demonstrated stronger attacks in the physical world (a key concern in face recognition) such as the BATT attack [171], which claims to defeat a variety of model-based and data-based defenses such as Neural Cleanse [128], SentiNet [134], Fine-Pruning [127], and NAD [124].…”
Section: ) Defending Against Novel Backdoor Attack Methodsmentioning
confidence: 99%
“…Additionally, recent works demonstrated stronger attacks in the physical world (a key concern in face recognition) such as the BATT attack [171], which claims to defeat a variety of model-based and data-based defenses such as Neural Cleanse [128], SentiNet [134], Fine-Pruning [127], and NAD [124].…”
Section: ) Defending Against Novel Backdoor Attack Methodsmentioning
confidence: 99%
“…Although more inconspicuous than prior methods, this backdoor attack still results in a distortion effect perceptible to the human eye. In recent studies, BATT [22] has employed a technique involving the rotation of a clean image by a certain angle to generate a poisoned image. Additionally, DFST [23] has leveraged CycleGAN [24] to create poisoned images, introducing a backdoor into the deep feature space and extending spatial transformations.…”
Section: Black-box Model Watermarking Related Methodsmentioning
confidence: 99%