firstbacksecondback
17 Results
Poster
|
Revisiting the Assumption of Latent Separability for Backdoor Defenses Xiangyu Qi · Tinghao Xie · Yiming Li · Saeed Mahloujifar · Prateek Mittal |
||
Poster
|
Mon 2:30 |
UNICORN: A Unified Backdoor Trigger Inversion Framework Zhenting Wang · Kai Mei · Juan Zhai · Shiqing Ma |
|
Oral
|
Mon 1:40 |
UNICORN: A Unified Backdoor Trigger Inversion Framework Zhenting Wang · Kai Mei · Juan Zhai · Shiqing Ma |
|
Poster
|
The Dark Side of AutoML: Towards Architectural Backdoor Search Ren Pang · Changjiang Li · Zhaohan Xi · Shouling Ji · Ting Wang |
||
Poster
|
Tue 7:30 |
Incompatibility Clustering as a Defense Against Backdoor Poisoning Attacks Charles Jin · Melinda Sun · Martin Rinard |
|
Poster
|
TrojText: Test-time Invisible Textual Trojan Insertion Qian Lou · Yepeng Liu · Bo Feng |
||
Workshop
|
Fri 12:05 |
Learning to Backdoor Federated Learning Henger Li · Chen Wu · Sencun Zhu · Zizhan Zheng |
|
Workshop
|
Fri 12:05 |
Unlearning Backdoor Attacks in Federated Learning Chen Wu · SENCUN ZHU · Prasenjit Mitra |
|
Poster
|
Tue 2:30 |
Few-shot Backdoor Attacks via Neural Tangent Kernels Jonathan Hayase · Sewoong Oh |
|
Poster
|
Towards Robustness Certification Against Universal Perturbations Yi Zeng · Zhouxing Shi · Ming Jin · Feiyang Kang · Lingjuan Lyu · Cho-Jui Hsieh · Ruoxi Jia |
||
Workshop
|
Fri 13:45 |
Exploring Vulnerabilities of Semi-Supervised Learning to Simple Backdoor Attacks Marissa Connor · Vincent Emanuele |
|
Workshop
|
Fri 13:45 |
BackdoorBox: A Python Toolbox for Backdoor Learning Yiming Li · Mengxi Ya · Yang Bai · Yong Jiang · Shu-Tao Xia |