Статті в журналах з теми "Backdoor Attack"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Backdoor Attack".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Saha, Aniruddha, Akshayvarun Subramanya, and Hamed Pirsiavash. "Hidden Trigger Backdoor Attacks." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 07 (April 3, 2020): 11957–65. http://dx.doi.org/10.1609/aaai.v34i07.6871.
Повний текст джерелаNing, Rui, Jiang Li, Chunsheng Xin, Hongyi Wu, and Chonggang Wang. "Hibernated Backdoor: A Mutual Information Empowered Backdoor Attack to Deep Neural Networks." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 9 (June 28, 2022): 10309–18. http://dx.doi.org/10.1609/aaai.v36i9.21272.
Повний текст джерелаKwon, Hyun, and Sanghyun Lee. "Textual Backdoor Attack for the Text Classification System." Security and Communication Networks 2021 (October 22, 2021): 1–11. http://dx.doi.org/10.1155/2021/2938386.
Повний текст джерелаYe, Jianbin, Xiaoyuan Liu, Zheng You, Guowei Li, and Bo Liu. "DriNet: Dynamic Backdoor Attack against Automatic Speech Recognization Models." Applied Sciences 12, no. 12 (June 7, 2022): 5786. http://dx.doi.org/10.3390/app12125786.
Повний текст джерелаXu, Yixiao, Xiaolei Liu, Kangyi Ding, and Bangzhou Xin. "IBD: An Interpretable Backdoor-Detection Method via Multivariate Interactions." Sensors 22, no. 22 (November 10, 2022): 8697. http://dx.doi.org/10.3390/s22228697.
Повний текст джерелаXiang, Zhen, David J. Miller, Hang Wang, and George Kesidis. "Detecting Scene-Plausible Perceptible Backdoors in Trained DNNs Without Access to the Training Set." Neural Computation 33, no. 5 (April 13, 2021): 1329–71. http://dx.doi.org/10.1162/neco_a_01376.
Повний текст джерелаZhao, Feng, Li Zhou, Qi Zhong, Rushi Lan, and Leo Yu Zhang. "Natural Backdoor Attacks on Deep Neural Networks via Raindrops." Security and Communication Networks 2022 (March 26, 2022): 1–11. http://dx.doi.org/10.1155/2022/4593002.
Повний текст джерелаFang, Shihong, and Anna Choromanska. "Backdoor Attacks on the DNN Interpretation System." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 1 (June 28, 2022): 561–70. http://dx.doi.org/10.1609/aaai.v36i1.19935.
Повний текст джерелаOzdayi, Mustafa Safa, Murat Kantarcioglu, and Yulia R. Gel. "Defending against Backdoors in Federated Learning with Robust Learning Rate." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 10 (May 18, 2021): 9268–76. http://dx.doi.org/10.1609/aaai.v35i10.17118.
Повний текст джерелаKWON, Hyun, Hyunsoo YOON, and Ki-Woong PARK. "Multi-Targeted Backdoor: Indentifying Backdoor Attack for Multiple Deep Neural Networks." IEICE Transactions on Information and Systems E103.D, no. 4 (April 1, 2020): 883–87. http://dx.doi.org/10.1587/transinf.2019edl8170.
Повний текст джерелаCheng, Siyuan, Yingqi Liu, Shiqing Ma, and Xiangyu Zhang. "Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 2 (May 18, 2021): 1148–56. http://dx.doi.org/10.1609/aaai.v35i2.16201.
Повний текст джерелаChen, Congcong, Lifei Wei, Lei Zhang, Ya Peng, and Jianting Ning. "DeepGuard: Backdoor Attack Detection and Identification Schemes in Privacy-Preserving Deep Neural Networks." Security and Communication Networks 2022 (October 10, 2022): 1–20. http://dx.doi.org/10.1155/2022/2985308.
Повний текст джерелаZhang, Jie, Chen Dongdong, Qidong Huang, Jing Liao, Weiming Zhang, Huamin Feng, Gang Hua, and Nenghai Yu. "Poison Ink: Robust and Invisible Backdoor Attack." IEEE Transactions on Image Processing 31 (2022): 5691–705. http://dx.doi.org/10.1109/tip.2022.3201472.
Повний текст джерелаReddy, Gopaldinne Sanjeev, and Sripada Manasa Lakshmi. "Exploring adversarial attacks against malware classifiers in the backdoor poisoning attack." IOP Conference Series: Materials Science and Engineering 1022 (January 19, 2021): 012037. http://dx.doi.org/10.1088/1757-899x/1022/1/012037.
Повний текст джерелаYan, Zhicong, Gaolei Li, Yuan TIan, Jun Wu, Shenghong Li, Mingzhe Chen, and H. Vincent Poor. "DeHiB: Deep Hidden Backdoor Attack on Semi-supervised Learning via Adversarial Perturbation." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 12 (May 18, 2021): 10585–93. http://dx.doi.org/10.1609/aaai.v35i12.17266.
Повний текст джерелаXue, Mingfu, Can He, Jian Wang, and Weiqiang Liu. "Backdoors hidden in facial features: a novel invisible backdoor attack against face recognition systems." Peer-to-Peer Networking and Applications 14, no. 3 (January 8, 2021): 1458–74. http://dx.doi.org/10.1007/s12083-020-01031-z.
Повний текст джерелаFan, Mingyuan, Xue Du, Ximeng Liu, and Wenzhong Guo. "VarDefense: Variance-Based Defense against Poison Attack." Wireless Communications and Mobile Computing 2021 (December 9, 2021): 1–9. http://dx.doi.org/10.1155/2021/1974822.
Повний текст джерелаYang, Zhichao, Rongmao Chen, Chao Li, Longjiang Qu, and Guomin Yang. "On the Security of LWE Cryptosystem against Subversion Attacks." Computer Journal 63, no. 4 (September 10, 2019): 495–507. http://dx.doi.org/10.1093/comjnl/bxz084.
Повний текст джерелаKWON, Hyun. "Multi-Model Selective Backdoor Attack with Different Trigger Positions." IEICE Transactions on Information and Systems E105.D, no. 1 (January 1, 2022): 170–74. http://dx.doi.org/10.1587/transinf.2021edl8054.
Повний текст джерелаDai, Jiazhu, Chuanshuai Chen, and Yufeng Li. "A Backdoor Attack Against LSTM-Based Text Classification Systems." IEEE Access 7 (2019): 138872–78. http://dx.doi.org/10.1109/access.2019.2941376.
Повний текст джерелаYang, Jie, Jun Zheng, Haochen Wang, Jiaxing Li, Haipeng Sun, Weifeng Han, Nan Jiang, and Yu-An Tan. "Edge-Cloud Collaborative Defense against Backdoor Attacks in Federated Learning." Sensors 23, no. 3 (January 17, 2023): 1052. http://dx.doi.org/10.3390/s23031052.
Повний текст джерелаKwon, Hyun, and Yongchul Kim. "BlindNet backdoor: Attack on deep neural network using blind watermark." Multimedia Tools and Applications 81, no. 5 (January 7, 2022): 6217–34. http://dx.doi.org/10.1007/s11042-021-11135-0.
Повний текст джерелаYoshida, Kota, and Takeshi Fujino. "Countermeasure against Backdoor Attack on Neural Networks Utilizing Knowledge Distillation." Journal of Signal Processing 24, no. 4 (July 15, 2020): 141–44. http://dx.doi.org/10.2299/jsp.24.141.
Повний текст джерелаWang, Derui, Sheng Wen, Alireza Jolfaei, Mohammad Sayad Haghighi, Surya Nepal, and Yang Xiang. "On the Neural Backdoor of Federated Generative Models in Edge Computing." ACM Transactions on Internet Technology 22, no. 2 (May 31, 2022): 1–21. http://dx.doi.org/10.1145/3425662.
Повний текст джерелаGumilang, Paulus Miki Resa, and Dian Widiyanto Chandra. "Implementasi dan modifikasi WebShell untuk monitoring serangan berbasis website." AITI 18, no. 1 (July 19, 2021): 54–68. http://dx.doi.org/10.24246/aiti.v18i1.54-68.
Повний текст джерелаKwon, Hyun, and Sanghyun Lee. "Toward Backdoor Attacks for Image Captioning Model in Deep Neural Networks." Security and Communication Networks 2022 (August 16, 2022): 1–10. http://dx.doi.org/10.1155/2022/1525052.
Повний текст джерелаM. Alghazzawi, Daniyal, Osama Bassam J. Rabie, Surbhi Bhatia, and Syed Hamid Hasan. "An Improved Optimized Model for Invisible Backdoor Attack Creation Using Steganography." Computers, Materials & Continua 72, no. 1 (2022): 1173–93. http://dx.doi.org/10.32604/cmc.2022.022748.
Повний текст джерелаAb Wahab, Hidayat Ul Hazazi, and Jasni Mohamad Zain. "WINDOWS PRIVILEGE ESCALATION THROUGH NETWORK BACKDOOR AND INFORMATION MINING USING USB HACKTOOL." MALAYSIAN JOURNAL OF COMPUTING 3, no. 1 (June 29, 2018): 12. http://dx.doi.org/10.24191/mjoc.v3i1.4811.
Повний текст джерелаAi, Zhuang, Nurbol Luktarhan, AiJun Zhou, and Dan Lv. "WebShell Attack Detection Based on a Deep Super Learner." Symmetry 12, no. 9 (August 24, 2020): 1406. http://dx.doi.org/10.3390/sym12091406.
Повний текст джерелаGuo, Wei, Benedetta Tondi, and Mauro Barni. "A Master Key backdoor for universal impersonation attack against DNN-based face verification." Pattern Recognition Letters 144 (April 2021): 61–67. http://dx.doi.org/10.1016/j.patrec.2021.01.009.
Повний текст джерелаHairab, Belal Ibrahim, Heba K. Aslan, Mahmoud Said Elsayed, Anca D. Jurcut, and Marianne A. Azer. "Anomaly Detection of Zero-Day Attacks Based on CNN and Regularization Techniques." Electronics 12, no. 3 (January 23, 2023): 573. http://dx.doi.org/10.3390/electronics12030573.
Повний текст джерелаZimba, Aaron, and Mumbi Chishimba. "Exploitation of DNS Tunneling for Optimization of Data Exfiltration in Malware-free APT Intrusions." Zambia ICT Journal 1, no. 1 (December 11, 2017): 51–56. http://dx.doi.org/10.33260/zictjournal.v1i1.26.
Повний текст джерелаLiu, I.-Hsien, Jung-Shian Li, Yen-Chu Peng, and Chuan-Gang Liu. "A Robust Countermeasures for Poisoning Attacks on Deep Neural Networks of Computer Interaction Systems." Applied Sciences 12, no. 15 (August 1, 2022): 7753. http://dx.doi.org/10.3390/app12157753.
Повний текст джерелаWon, Yoo-Seung, Bo-Yeon Sim, and Jong-Yeon Park. "Key Schedule against Template Attack-Based Simple Power Analysis on a Single Target." Applied Sciences 10, no. 11 (May 30, 2020): 3804. http://dx.doi.org/10.3390/app10113804.
Повний текст джерелаReddy, Gopaldinne Sanjeev, and Sripada Manasa Lakshmi. "Retraction: Exploring adversarial attacks against malware classifiers in the backdoor poisoning attack (IOP Conf. Ser.: Mater. Sci. Eng. 1022 012037)." IOP Conference Series: Materials Science and Engineering 1022, no. 1 (January 1, 2021): 012125. http://dx.doi.org/10.1088/1757-899x/1022/1/012125.
Повний текст джерелаAltoub, Majed, Fahad AlQurashi, Tan Yigitcanlar, Juan M. Corchado, and Rashid Mehmood. "An Ontological Knowledge Base of Poisoning Attacks on Deep Neural Networks." Applied Sciences 12, no. 21 (October 31, 2022): 11053. http://dx.doi.org/10.3390/app122111053.
Повний текст джерелаWaliulu, Raditya Faisal, and Teguh Hidayat Iskandar Alam. "Reverse Engineering Analysis Statis Forensic Malware Webc2-Div." Insect (Informatics and Security): Jurnal Teknik Informatika 4, no. 1 (August 23, 2019): 15. http://dx.doi.org/10.33506/insect.v4i1.223.
Повний текст джерелаWang, Weizheng, Zhuo Deng, and Jin Wang. "Enhancing Sensor Network Security with Improved Internal Hardware Design." Sensors 19, no. 8 (April 12, 2019): 1752. http://dx.doi.org/10.3390/s19081752.
Повний текст джерелаMatsuo, Yuki, and Kazuhiro Takemoto. "Backdoor Attacks on Deep Neural Networks via Transfer Learning from Natural Images." Applied Sciences 12, no. 24 (December 8, 2022): 12564. http://dx.doi.org/10.3390/app122412564.
Повний текст джерелаGosselin, Rémi, Loïc Vieu, Faiza Loukil, and Alexandre Benoit. "Privacy and Security in Federated Learning: A Survey." Applied Sciences 12, no. 19 (October 1, 2022): 9901. http://dx.doi.org/10.3390/app12199901.
Повний текст джерелаHyun, Sangwon, Junsung Cho, Geumhwan Cho, and Hyoungshick Kim. "Design and Analysis of Push Notification-Based Malware on Android." Security and Communication Networks 2018 (July 9, 2018): 1–12. http://dx.doi.org/10.1155/2018/8510256.
Повний текст джерелаSegal, Yoram, and Ofer Hadar. "Covert channel implementation using motion vectors over H.264 compression." Revista de Estudos e Pesquisas Avançadas do Terceiro Setor 2, no. 2 (August 18, 2019): 111. http://dx.doi.org/10.31501/repats.v2i2.10567.
Повний текст джерелаMatsuo, Yuki, and Kazuhiro Takemoto. "Backdoor Attacks to Deep Neural Network-Based System for COVID-19 Detection from Chest X-ray Images." Applied Sciences 11, no. 20 (October 14, 2021): 9556. http://dx.doi.org/10.3390/app11209556.
Повний текст джерелаMatsuo, Yuki, and Kazuhiro Takemoto. "Backdoor Attacks to Deep Neural Network-Based System for COVID-19 Detection from Chest X-ray Images." Applied Sciences 11, no. 20 (October 14, 2021): 9556. http://dx.doi.org/10.3390/app11209556.
Повний текст джерелаLi, Tao, Wenzhe Dong, Aiqun Hu, and Jinguang Han. "Task-Oriented Network Abnormal Behavior Detection Method." Security and Communication Networks 2022 (June 30, 2022): 1–13. http://dx.doi.org/10.1155/2022/3105291.
Повний текст джерелаVishwakarma, Gopal, and Wonjun Lee. "Exploiting JTAG and Its Mitigation in IOT: A Survey." Future Internet 10, no. 12 (December 3, 2018): 121. http://dx.doi.org/10.3390/fi10120121.
Повний текст джерелаElhattab, Fatima, Sara Bouchenak, Rania Talbi, and Vlad Nitu. "Robust Federated Learning for Ubiquitous Computing through Mitigation of Edge-Case Backdoor Attacks." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 6, no. 4 (December 21, 2022): 1–27. http://dx.doi.org/10.1145/3569492.
Повний текст джерелаChen, Chuanshuai, and Jiazhu Dai. "Mitigating backdoor attacks in LSTM-based text classification systems by Backdoor Keyword Identification." Neurocomputing 452 (September 2021): 253–62. http://dx.doi.org/10.1016/j.neucom.2021.04.105.
Повний текст джерелаShao, Kun, Yu Zhang, Junan Yang, and Hui Liu. "Textual Backdoor Defense via Poisoned Sample Recognition." Applied Sciences 11, no. 21 (October 25, 2021): 9938. http://dx.doi.org/10.3390/app11219938.
Повний текст джерелаFang, Yong, Mingyu Xie, and Cheng Huang. "PBDT: Python Backdoor Detection Model Based on Combined Features." Security and Communication Networks 2021 (September 14, 2021): 1–13. http://dx.doi.org/10.1155/2021/9923234.
Повний текст джерела