Backdoor attacks against voice recognition systems: A survey

B Yan, J Lan, Z Yan - ACM Computing Surveys, 2024 - dl.acm.org
Voice Recognition Systems (VRSs) employ deep learning for speech recognition and
speaker recognition. They have been widely deployed in various real-world applications …

Distributed backdoor attacks on federated graph learning and certified defenses

Y Yang, Q Li, J Jia, Y Hong, B Wang - Proceedings of the 2024 on ACM …, 2024 - dl.acm.org
Federated graph learning (FedGL) is an emerging federated learning (FL) framework that
extends FL to learn graph data from diverse sources without accessing the data. FL for non …

" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

{VILLAIN}: Backdoor Attacks Against Vertical Split Learning

Y Bai, Y Chen, H Zhang, W Xu, H Weng… - 32nd USENIX Security …, 2023 - usenix.org
Vertical split learning is a new paradigm of federated learning for participants with vertically
partitioned data. In this paper, we make the first attempt to explore the possibility of backdoor …

Redeem myself: Purifying backdoors in deep learning models using self attention distillation

X Gong, Y Chen, W Yang, Q Wang, Y Gu… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Recent works have revealed the vulnerability of deep neural networks to backdoor attacks,
where a backdoored model orchestrates targeted or untargeted misclassification when …

Flowmur: A stealthy and practical audio backdoor attack with limited knowledge

J Lan, J Wang, B Yan, Z Yan… - 2024 IEEE Symposium …, 2024 - ieeexplore.ieee.org
Speech recognition systems driven by Deep Neural Networks (DNNs) have revolutionized
human-computer interaction through voice interfaces, which significantly facilitate our daily …

M-to-n backdoor paradigm: A multi-trigger and multi-target attack to deep learning models

L Hou, Z Hua, Y Li, Y Zheng… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Deep neural networks (DNNs) are vulnerable to backdoor attacks, where a backdoored
model behaves normally with clean inputs but exhibits attacker-specified behaviors upon the …

Backdoor attacks in the supply chain of masked image modeling

X Shen, X He, Z Li, Y Shen, M Backes, Y Zhang - 2022 - openreview.net
Masked image modeling (MIM) revolutionizes self-supervised learning (SSL) for image pre-
training. In contrast to previous dominating self-supervised methods, ie, contrastive learning …

Palette: Physically-Realizable Backdoor Attacks Against Video Recognition Models

X Gong, Z Fang, B Li, T Wang, Y Chen… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Backdoor attacks have been widely studied for image classification tasks, but rarely
investigated for video recognition tasks. In this paper, we explore the possibility of physically …

From Toxic to Trustworthy: Using Self-Distillation and Semi-supervised Methods to Refine Neural Networks

X Zhang, B Zheng, J Hu, C Li, X Bai - Proceedings of the AAAI …, 2024 - ojs.aaai.org
Despite the tremendous success of deep neural networks (DNNs) across various fields, their
susceptibility to potential backdoor attacks seriously threatens their application security …