Parameter-efficient fine-tuning methods for pretrained language models: A critical review and assessment
With the continuous growth in the number of parameters of transformer-based pretrained
language models (PLMs), particularly the emergence of large language models (LLMs) with …
language models (PLMs), particularly the emergence of large language models (LLMs) with …
Setting the trap: Capturing and defeating backdoors in pretrained language models through honeypots
In the field of natural language processing, the prevalent approach involves fine-tuning
pretrained language models (PLMs) using local samples. Recent research has exposed the …
pretrained language models (PLMs) using local samples. Recent research has exposed the …
Parafuzz: An interpretability-driven technique for detecting poisoned samples in nlp
Backdoor attacks have emerged as a prominent threat to natural language processing (NLP)
models, where the presence of specific triggers in the input can lead poisoned models to …
models, where the presence of specific triggers in the input can lead poisoned models to …
Chatgpt as an attack tool: Stealthy textual backdoor attack via blackbox generative model trigger
Textual backdoor attacks pose a practical threat to existing systems, as they can
compromise the model by inserting imperceptible triggers into inputs and manipulating …
compromise the model by inserting imperceptible triggers into inputs and manipulating …
Backdoor Attacks to Deep Neural Networks: A Survey of the Literature, Challenges, and Future Research Directions
O Mengara, A Avila, TH Falk - IEEE Access, 2024 - ieeexplore.ieee.org
Deep neural network (DNN) classifiers are potent instruments that can be used in various
security-sensitive applications. Nonetheless, they are vulnerable to certain attacks that …
security-sensitive applications. Nonetheless, they are vulnerable to certain attacks that …
Tijo: Trigger inversion with joint optimization for defending multimodal backdoored models
Abstract We present a Multimodal Backdoor defense technique TIJO (Trigger Inversion
using Joint Optimization). Recently Walmer et al. demonstrated successful backdoor attacks …
using Joint Optimization). Recently Walmer et al. demonstrated successful backdoor attacks …
Textguard: Provable defense against backdoor attacks on text classification
Backdoor attacks have become a major security threat for deploying machine learning
models in security-critical applications. Existing research endeavors have proposed many …
models in security-critical applications. Existing research endeavors have proposed many …
Black-box backdoor defense via zero-shot image purification
Backdoor attacks inject poisoned samples into the training data, resulting in the
misclassification of the poisoned input during a model's deployment. Defending against …
misclassification of the poisoned input during a model's deployment. Defending against …
Backdoor attacks and countermeasures in natural language processing models: A comprehensive security review
Deep Neural Networks (DNNs) have led to unprecedented progress in various natural
language processing (NLP) tasks. Owing to limited data and computation resources, using …
language processing (NLP) tasks. Owing to limited data and computation resources, using …
Bite: Textual backdoor attacks with iterative trigger injection
Backdoor attacks have become an emerging threat to NLP systems. By providing poisoned
training data, the adversary can embed a" backdoor" into the victim model, which allows …
training data, the adversary can embed a" backdoor" into the victim model, which allows …