Backdoor Learning: A Survey Y Li, Y Jiang, Z Li, ST Xia IEEE Transactions on Neural Networks and Learning Systems, 2022 | 532 | 2022 |
Invisible Backdoor Attack with Sample-Specific Triggers Y Li, Y Li, B Wu, L Li, R He, S Lyu International Conference on Computer Vision (ICCV), 2021 | 398 | 2021 |
Backdoor Attack in the Physical World Y Li, T Zhai, Y Jiang, Z Li, ST Xia ICLR Workshop on Robust and Reliable Machine Learning in the Real World, 2021 | 225* | 2021 |
Backdoor Defense via Decoupling the Training Process K Huang*, Y Li*, B Wu, Z Qin, K Ren International Conference on Learning Representations (ICLR), 2022 | 155 | 2022 |
Backdoor Attack against Speaker Verification T Zhai*, Y Li*, Z Zhang, B Wu, Y Jiang, ST Xia IEEE International Conference on Acoustics, Speech and Signal Processing …, 2021 | 103 | 2021 |
Targeted Attack for Deep Hashing based Retrieval J Bai*, B Chen*, Y Li*, D Wu, W Guo, ST Xia, E Yang European Conference on Computer Vision (ECCV), 2020 | 86 | 2020 |
Revisiting the Assumption of Latent Separability for Backdoor Defenses X Qi, T Xie, Y Li, S Mahloujifar, P Mittal International Conference on Learning Representations (ICLR), 2023 | 79* | 2023 |
Black-box Dataset Ownership Verification via Backdoor Watermarking Y Li, M Zhu, X Yang, Y Jiang, T Wei, ST Xia IEEE Transactions on Information Forensics and Security, 2023 | 75* | 2023 |
Targeted Attack against Deep Neural Networks via Flipping Limited Weight Bits J Bai, B Wu, Y Zhang, Y Li, Z Li, ST Xia International Conference on Learning Representations (ICLR), 2021 | 69 | 2021 |
Multinomial Random Forest J Bai*, Y Li*, J Li, X Yang, Y Jiang, ST Xia Pattern Recognition, 108331, 2022 | 64 | 2022 |
Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protection Y Li, Y Bai, Y Jiang, Y Yang, ST Xia, B Li Annual Conference on Neural Information Processing Systems (NeurIPS), 2022 | 62 | 2022 |
Few-Shot Backdoor Attacks on Visual Object Tracking Y Li, H Zhong, X Ma, Y Jiang, ST Xia International Conference on Learning Representations (ICLR), 2022 | 60 | 2022 |
Defending against Model Stealing via Verifying Embedded External Features Y Li, L Zhu, X Jia, Y Jiang, ST Xia, X Cao AAAI Conference on Artificial Intelligence (AAAI), 2022 | 57* | 2022 |
SCALE-UP: An Efficient Black-box Input-level Backdoor Detection via Analyzing Scaled Prediction Consistency J Guo*, Y Li*, X Chen, H Guo, L Sun, C Liu International Conference on Learning Representations (ICLR), 2023 | 51 | 2023 |
Semi-supervised Robust Training with Generalized Perturbed Neighborhood Y Li, B Wu, Y Feng, Y Fan, Y Jiang, Z Li, ST Xia Pattern Recognition 124, 108472, 2022 | 41* | 2022 |
Not All Samples Are Born Equal: Towards Effective Clean-Label Backdoor Attacks Y Gao*, Y Li*, L Zhu*, D Wu, Y Jiang, ST Xia Pattern Recognition, 109512, 2023 | 31 | 2023 |
BackdoorBox: A Python Toolbox for Backdoor Learning Y Li, M Ya, Y Bai, Y Jiang, ST Xia ICLR Workshop on Backdoor Attacks and Defenses in Machine Learning, 2023 | 29 | 2023 |
Hidden Backdoor Attack against Semantic Segmentation Models Y Li, Y Li, Y Lv, Y Jiang, ST Xia ICLR Workshop on Security and Safety in Machine Learning Systems, 2021 | 28 | 2021 |
A Fine-grained Differentially Private Federated Learning against Leakage from Gradients L Zhu, X Liu, Y Li, X Yang, ST Xia, R Lu IEEE Internet of Things Journal 9 (13), 11500-11512, 2021 | 22 | 2021 |
Domain Watermark: Effective and Harmless Dataset Copyright Protection is Closed at Hand J Guo*, Y Li*, L Wang, ST Xia, H Huang, C Liu, B Li Annual Conference on Neural Information Processing Systems (NeurIPS), 2023 | 21 | 2023 |