Data and model poisoning backdoor attacks on wireless federated learning, and the defense mechanisms: A comprehensive survey
Due to the greatly improved capabilities of devices, massive data, and increasing concern
about data privacy, Federated Learning (FL) has been increasingly considered for …
about data privacy, Federated Learning (FL) has been increasingly considered for …
You Are Catching My Attention: Are Vision Transformers Bad Learners under Backdoor Attacks?
Abstract Vision Transformers (ViTs), which made a splash in the field of computer vision
(CV), have shaken the dominance of convolutional neural networks (CNNs). However, in the …
(CV), have shaken the dominance of convolutional neural networks (CNNs). However, in the …
Backdoor cleansing with unlabeled data
Due to the increasing computational demand of Deep Neural Networks (DNNs), companies
and organizations have begun to outsource the training process. However, the externally …
and organizations have begun to outsource the training process. However, the externally …
Fine-mixing: Mitigating backdoors in fine-tuned language models
Deep Neural Networks (DNNs) are known to be vulnerable to backdoor attacks. In Natural
Language Processing (NLP), DNNs are often backdoored during the fine-tuning process of …
Language Processing (NLP), DNNs are often backdoored during the fine-tuning process of …
[HTML][HTML] Security threats to agricultural artificial intelligence: Position and perspective
In light of their remarkable predictive capabilities, artificial intelligence (AI) models driven by
deep learning (DL) have witnessed widespread adoption in the agriculture sector …
deep learning (DL) have witnessed widespread adoption in the agriculture sector …
Distilling cognitive backdoor patterns within an image
This paper proposes a simple method to distill and detect backdoor patterns within an
image:\emph {Cognitive Distillation}(CD). The idea is to extract the" minimal essence" from …
image:\emph {Cognitive Distillation}(CD). The idea is to extract the" minimal essence" from …
Backdoor attacks on time series: A generative approach
Backdoor attacks have emerged as one of the major security threats to deep learning
models as they can easily control the model's test-time predictions by pre-injecting a …
models as they can easily control the model's test-time predictions by pre-injecting a …
Physical Backdoor: Towards Temperature-based Backdoor Attacks in the Physical World
Backdoor attacks have been well-studied in visible light object detection (VLOD) in recent
years. However VLOD can not effectively work in dark and temperature-sensitive scenarios …
years. However VLOD can not effectively work in dark and temperature-sensitive scenarios …
Object detection and crowd analysis using deep learning techniques: Comprehensive review and future directions
B Ganga, BT Lata, KR Venugopal - Neurocomputing, 2024 - Elsevier
Object detection using deep learning has attracted considerable interest from researchers
because of its competency in performing state-of-the-art tasks, including detection …
because of its competency in performing state-of-the-art tasks, including detection …
Class-agnostic counting with feature augmentation and similarity comparison
M Shao, G Wang - Multimedia Systems, 2023 - Springer
The paper addresses the challenging problem of counting objects or entities in an image
without relying on specific category information, known as class-agnostic counting (CAC) …
without relying on specific category information, known as class-agnostic counting (CAC) …