{“状态”:“确定”,“消息类型”:“工作”,“信息版本”:“1.0.0”,“邮件”:{“索引”:{“日期-部件”:[[2024,6,20]],“日期-时间”:“2024-06-20T11:13:40Z”,“时间戳”:1718882020331},“参考-计数”:79,“出版商”:“IEEE”,“许可证”:[{“开始”:{“日期-零件”:[2022,6,1]],”日期-时间“:“2022-06-01T00:00:00Z”,“timestamp”:1654041600000},“content-version”:“stm-asf”,“delay-in-days”:0,“URL”:“https:\/\/doi.org\/10.15223\/policy-029”},{“start”:{“date-parts”:[2022,6,1]],“date-time”:“2022-06-01T00:00:00Z”,“timestamp”:1654041600000},“content-version”:“stm-asf”,“dellay-in-days”:0域“:{”域“:[],”交叉标记-限制“:false},”短容器-时间“:[],“published-print”:{“date-parts”:[[2022,6]]},“DOI”:“10.1109\/cvpr52688.2022.01301”,“type”:“proceedings-article”,“created”:{“date-ports”:[[2022,9,27]],“date-time”:“2022-09-27T19:56:41Z”,“timestamp”:1664308601000},”source“Crossref”,“is-referenced-by-count”:14,“title”:[“Backdoor Scanning中的更好的触发器反转优化”],“前缀”:“10.1109”,“作者”:[{“given”:“Guanhong”,“family”:“Tao”,“sequence”:“first”,“affiliation”:[}“name”:“Purdue University”}]},{“given”:“Guangyu”,“家庭”:“Shen”,“sequence”:“additional”,“feliation”:[{(名称):“Purtue University}]},{{“给定”:“生威”,“家庭”:“An”,“sequence”:“additional”,“affiliation”:[{“name”:“Purdue University”}]},{“given”:“Qiuling”,“family”:“Xu”,“sequence”:“additionable”,“abfiliance”:[[{”name“:”Purdue University“}]},{”given“:”Shiqing“,”family“:”Ma“,”sequence“:”additional,“sequence”:“additional”,“affiliation”:[{“name”:“Purdue University”}]},{“given”:“Xiangyu”,“family”:“Zhang”,“sequence”:“additional”,“affiliation”:“[{”name“:”Purdue University“}]}],“member”:“263”,“reference”:[{key“:”ref73“,”doi-asserted-by“:”publisher“,”doi“10.1145\/3319535.3354209”},“key”:”ref72“,”article-title“:”使用元检测ai特洛伊木马“神经分析”,“作者”:“晓君”,“年”:“2019”,“新闻标题”:“ArXiv预印本”},{“键”:“ref71”,“文章标题”:”Dba:针对联合学习的分布式后门攻击“,”author“:”xie“,”year“:”2019“,”journal-title“:”ICLRE“},”{“key”:“ref70”,“论文标题“:”Fast胜于free:重审对抗性训练“密钥”:“ref76”,“article-title”:“Cassandra:从对抗性干扰中检测木马网络”,“author”:“zhang”,“year”:“2020”,“journal-title“:”ArXiv Preprint“},{“key”:“ref77”,“doi-asserted-by”:“publisher”,”doi“:”10.1109\/EuroSP51992.2021.00022“}”,{”key“:”ref74“article-title:“Deepsweep:使用数据增强缓解dnn后门攻击的评估框架”,“author”:“zeng”,“year”:“2020”,“journal-title”:“ArXiv预打印”},{“key”:“ref39”,“doi-asserted-by”:“publisher”,“doi”:“10.14722\/ndss.2018.23291”}:“zhang”,“year”:“2021”,“journal-title”:“ArXiv Preprint”},{“key”:“ref38”,“doi-asserted-by”:“publisher”,”doi“:”10.1145\/3319535.3363216“},”{“key”:”ref78“,”doi-assert-by“:”publisher“,”doi:“10.1109\/CVPR42600.2020.01445”}145\/3394171.3413546“},{“key”:“ref33”,“article-title”:“神经注意蒸馏:清除深层神经网络的后门触发器”,“卷”:“21”,“作者”:“li”,“年份”:“2021”,“新闻标题”:“ICLRE”},{“key”:“ref32”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/TDSC.2020.3021407”},“年份”:“2018年”,“新闻标题”:“第32届神经信息处理系统国际会议论文集”},{“key”:“ref30”,“article-title”:“深层分区聚合:对一般中毒攻击的有效防御”,“author”:“levine”,“year”:“2020”,“journal title”:,“article-title”:“精细修剪:防御对深层神经网络的后门攻击”,“author”:“liu”,“year”:“2018”,“journal-title“:”调查Raidology“},{“key”:“ref36”,“artice-title(文章标题):“Network in Network”,“author”:“lin”,”year“:”2013“,”journal-title“”:“ArXiv Preprint”},“key“:”ref35“,”doi-asserted-by“:”publisher“,”doi“:“10.1145\/3372297.3423362”},{“key”:“ref34”,“article-title”:“重新思考后门攻击的触发因素”,“author”:“li”,“year”:“2020”,“journal-title“:”ArXiv Preprint“},}“key”:“ref60”,“article-title”:“Demon in the variant:统计分析dnns for robust backdoor polution detection”,“author”:“tang”,“year”:”2021“,”journal-title“:“Usenix Security”},{“key”:“ref62”,“first-page”:“8000”,“article-title”:“后门攻击中的光谱特征”,“author”:“tran”,“year”:“2018”,“journal-title“:”NeurIPS“}”,{”key“:”ref61 63英寸,“article-title”:“Nnoculation:后门dnns的广谱和靶向治疗”,“author”:“kumar veldanda”,“year”:“2020”,“journal-title“:”ArXiv预印本“},{“key”:“ref28”,“artice-title(文章-标题):“预处理模型上的体重中毒攻击”,“author”:“kurita”,“year”:“2020”:“通过随机平滑验证对后门攻击的鲁棒性”,“author”:“wang”,“year”:“0”,“journal-title”:“ArXiv预打印”},{“key”:“ref27”,“author”,“krizhevsky”,“year”:《2009年》,“jornal-tittle”:《从微小图像中学习多层特征》},“key“:“ref65”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/SP.2019.00031”}、{“key”:“ref66”,“first page”:“1281”,“article-title”:“经过良好的培训,就会出现巨大的漏洞:针对迁移学习的实际攻击”,“author”:“wang”,“year”:“2018”,“journal-title“:”USENIX Security 18“},{“key”:”ref29“,”doi-asserted-by“:”publisher“,”doi“:”10.1049 \/iet-cvi.201.0040“}”,{”key“:”ref67“,”article-title“:“尾部攻击:是的,你真的可以后门联合学习”,“卷”:“33”,“作者”:“wang”,“年份”:“2020”,“日志标题”:“NeurIPS”},{“key”:“ref68”,“文章标题”:”木马神经网络的实际检测:数据列表和无数据案例“,”作者“:”wang“,”年份“:”2020“,”日志标题“:”ECCV“},”{“密钥”:“ref69”,“论文标题”:“Rab:对后门攻击的可证明鲁棒性”,“作者”:“weber”,“年份”:“2020”,“期刊标题”:“ArXiv预印本”},{“密钥”:“ref2”,“第一页”:“19”,“文章标题”:“深度学习模型中的盲后门”,“卷”:“21”,“作者”:“bagdasaryan”,“年份”:“2021”,“期刊标题”:“Usenix Security”},{“密钥”:“ref1”,“年份”:“2022”,“期刊标题”:“PixelBackdoor”},{“key”:“ref20”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/CVPR.2016.90”}:“10.1007\/978-3-030-58583-9_20”},{“key”:“ref24”,“首页”:“arxiv-1612”,“author”:“jiwoong im”,“year”:“2016”,“journal-title”:“深度网络损失面优化的实证分析”},“journal-title”:“ArXiv预打印”},{“key”:“ref26”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/CVPR42600.2020.00038”}key“:”ref51“,”doi-asserted-by“:”publisher“,”doi“:“10.1109\/EuroSP.2016.36”},{“key”:“ref59”,“article-title”:“通过k-arm优化对深层神经网络进行后门扫描”,“author”:“shen yingqi”,“year”:“2021”,“journal-title“:”ICML“}”,{”key“:”ref58“,”doi-asserted-by“:”crossref“,”first page“:“5636”,“doi”:“10.1609\/aaaai.v34i04.6017”,“article-titel”:“通用对抗训练“,”卷“:“34”,“author”:“ali”,“year”:“2020”,“journal-title”:“AAAI'20”},{“key”:“ref57”,“first-page”:“6103”,“article-title“:“毒蛙!针对神经网络的清洁标签中毒攻击”,“author”:“shafahi”,”year“:“2018”,“日记标题”:“NeurIPS'18”}:“salem”,“year”:“2020”,“journal-title”:“ArXiv预打印”},{“key”:“ref55”,“doi-asserted-by”:“publisher”,“doi”:“10.1609\/aaaai.v34i07.6871”}深度模型:利用转移学习的安全漏洞”,“author”:“rezaei”,“year”:“2020”,“journal-title”:“ICLRE”},{“key”:“ref52”,“first-page”:“14004”,“article-title“:“Defending neural backdoors via generative distribution modeling”,“au作者”:“乔”,“年份”:“2019”,“日记标题”:“NeurIPS'19”}、{“密钥”:“ref10”,“article-titel”:“Robust anormation detection and backdoor attack detection via differential privacy”,“author”:“du”,“year”:“2019”,“journal-title”:“ICLR'19”},{“key”:“ref11”,“doi-asserted-by”:“publisher”,”doi“:”10.1109\/CVPR.2018.00175“},”{“key”:”ref40“,”first page“:”182“,”article-title“:”Reflection backdoor:A natural backdoor attack on deep neural networks“,”author“:”liu“,”year“:”2020“,”journal-title“:”ECCVV 20“}”,{“key”:“ref12”,“article-title”:“使用基于新特征的异常检测检测神经网络后门”,“author”:“fu”,“year”:“2020”,“journal-title”:“ArXiv预打印”},{“key”:“ref13”,“first page”:《113》,“article-title》:“Strip:防御深度神经网络上的特洛伊木马攻击”,“作者”:“yansong”,“年份”:“2019”,“日记标题”:“ACSAC 19”}、{“密钥”:“ref14”,“doi-asserted-by”:“publisher”,“doi”:“10.1177\/02783649113491297”},{“key”:“ref15”,“article-title”:“解释和利用对抗性示例”,“author”:“ian”,年:“2014”,“journal-title“:”ArXiv Preprint“},”{“key”:“ref16”,“article-title”:“定性表征神经网络优化问题”,“期刊标题”:“ICLR 2015”},{“key”:“ref17”,“doi断言者”:“publisher”,“doi”:“10.1109\/ACCESS.20192909068”},{“key”:“ref18”,“文章标题”:“Tabor:一种检查和恢复ai系统中特洛伊木马后门的高度准确方法”,“author”:“guo”,“year”:“2019”,“期刊标题”:“ArXiv预印本”},{“key”:“ref19”,“doi断言者”:“publisher”,“DOI”:“10.1109\/ICDM50108.2020.00025”},{“key”:“ref4”,“DOI-asserted-by”:“publisher”,“DOI:”10.1109\/SP.2017.49“},}“key:”ref3“,”first page“:”2938“,”article-title“:“How to backdoor federated learning”,“author”:“bagdasaryan”,“year”:“2020”,“journal-title”:“AISTATS 2020”}“”:“通过激活聚类检测对深层神经网络的后门攻击”,“author”:“chen”,“year”:“2018”,“journal-title”:“ArXiv Preprint”},{“key”:“ref5”,“doi-asserted-by”:“publisher”,“doi”:“10.29007\/3b2l”}、{“密钥”:“ref8”,“doi-asserted-by”:“publishers”,“DI:”10.1109\/SPW50608.2020.00025“},“{”key:“ref7”,“article-title“”:“使用数据中毒对深度学习系统进行有针对性的后门攻击”,“author”:“chen”,“year”:“2017”,“journal-title”:“ArXiv Preprint”},{“key”:“ref49”,“article-title“:”输入软件动态后门攻击“,“author”:“anh nguyen”,”year“2020”,“journal-ttitle”:”NeurIPS 20“},“key“:”:“ref9”,“first-page”:“3213”,“article-titel”:“用于语义城市场景理解的城市景观数据集”,“作者”:“cordts”,“年份”:“2016年”,“新闻标题”:“CVPR'20”},{“key”:“ref46”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/CVPR.2017.17”}tle“:“Wanet-imperceptible warping-based backdoor attack”,“author”:“nguyen”,“year”:“2021”,“journal-title”:“ICLR 2021”},{“key”:“ref47”,“作者”:“netzer”,“年份”:“2011”,“日记标题”:“通过无监督的特征学习读取自然图像中的数字”}参考41“,“article-title”:“Ex-ray:通过检查差分特征对称性来区分神经网络中的注入后门和自然特征”,“author”:“liu”,“year”:“2021”,“journal-title“:”ArXiv预印本“},{“key”:“ref44”,“artice-title(文章):“Towards deep learning models resistance to敌意攻击”,“author”:“madry”,“year”:“2018”,“journal-ttitle”:“ICLR'18”},{“key”:“ref43”,“first page”:“19”,“article title”:“Nic:用神经网络不变量检查检测对抗性样本”,“author”:“mayingqi”,“year”:“2019”,“journal title”:“NDSS”}],“event”:{“name”:“2022 IEEE\/CFF计算机视觉与模式识别会议(CVPR)”,“location”:“New Orleans,LA,USA”,“start”:{“date parts”:[2022,6,18]]},“end”:{“date-parts”:[[2022,6,24]]}},”container-title“:[”2022 IEEE\/CVF计算机视觉和模式识别会议(CVPR)“],”original-title”:[],“link”:[{“URL”:“http://\explorestaging.IEEE.org\/ielx7\/987378\/987366\/098799000.pdf?arnumber=9879000“,”content-type“:”未指定“,”内容version“:”vor“,”intended-application“:“相似性检查”}],“存放”:{“日期部分”:[[2022,10,14]],“日期时间”:“2022-10-14T20:56:17Z”,“时间戳”:1665780977000},“分数”:1,“资源”:{-“主要”:{“URL”:“https:\/\/ieeexplore.ieee.org\/document\/9879000\/”}},”副标题“:[],”短标题“:[],”已发布“:{”日期部分“:[2022,6]]},“references-count”:79,“URL”:“http://\/dx.doi.org\/10.109\/cvpr52688.2022.01301”,“关系”:{},“主题”:[],“发布”:{“日期部分”:[[2022,6]]}}}