{"id":"https://openalex.org/W4399115701","doi":"https://doi.org/10.48550/arxiv.2405.16488","title":"Partial train and isolate, mitigate backdoor attack","display_name":"Partial train and isolate, mitigate backdoor attack","publication_year":2024,"publication_date":"2024-05-26","ids":{"openalex":"https://openalex.org/W4399115701","doi":"https://doi.org/10.48550/arxiv.2405.16488"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"http://arxiv.org/abs/2405.16488","pdf_url":"http://arxiv.org/pdf/2405.16488","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false},"type":"preprint","type_crossref":"posted-content","indexed_in":["arxiv"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://arxiv.org/pdf/2405.16488","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100355339","display_name":"Yong Li","orcid":"https://orcid.org/0000-0002-1183-5359"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Li, Yong","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5100644405","display_name":"Han Gao","orcid":"https://orcid.org/0009-0008-2085-6558"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gao, Han","raw_affiliation_strings":[],"affiliations":[]}],"institution_assertions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":77},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.692,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.692,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.98895603}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.98895603},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.58401334},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.50983447},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.33172265}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"http://arxiv.org/abs/2405.16488","pdf_url":"http://arxiv.org/pdf/2405.16488","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"http://arxiv.org/abs/2405.16488","pdf_url":"http://arxiv.org/pdf/2405.16488","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W4386080799","https://openalex.org/W4320031223","https://openalex.org/W4309417370","https://openalex.org/W4292107232","https://openalex.org/W4281902577","https://openalex.org/W4200629851","https://openalex.org/W3140988292","https://openalex.org/W3009072493","https://openalex.org/W2748952813"],"abstract_inverted_index":{"Neural":[0],"networks":[1],"are":[2,44,50],"widely":[3],"known":[4],"to":[5,8,21,56,113,131],"be":[6],"vulnerable":[7],"backdoor":[9,97,133],"attacks,":[10,98],"a":[11,15,101,115,126],"method":[12,105],"that":[13,86,107,117],"poisons":[14],"portion":[16],"of":[17,46,75,87,96,110],"the":[18,23,39,62,70,73,94,111],"training":[19,104],"data":[20,30],"make":[22],"target":[24],"model":[25,103,112,116,128],"perform":[26],"well":[27],"on":[28,38,79,123],"normal":[29,58,80],"sets,":[31],"while":[32],"outputting":[33],"attacker-specified":[34],"or":[35],"random":[36],"categories":[37],"poisoned":[40],"samples.":[41,121],"Backdoor":[42],"attacks":[43],"full":[45],"threats.":[47],"Poisoned":[48],"samples":[49,81],"becoming":[51],"more":[52,54],"and":[53,60],"similar":[55],"corresponding":[57],"samples,":[59],"even":[61],"human":[63],"eye":[64],"cannot":[65],"easily":[66],"distinguish":[67],"them.":[68],"On":[69],"other":[71],"hand,":[72],"accuracy":[74],"models":[76],"carrying":[77],"backdoors":[78],"is":[82,129],"no":[83],"different":[84],"from":[85],"clean":[88,127],"models.In":[89],"this":[90,124],"article,":[91],"by":[92],"observing":[93],"characteristics":[95],"We":[99],"provide":[100],"new":[102],"(PT)":[106],"freezes":[108],"part":[109],"train":[114],"can":[118],"isolate":[119],"suspicious":[120],"Then,":[122],"basis,":[125],"fine-tuned":[130],"resist":[132],"attacks.":[134]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4399115701","counts_by_year":[],"updated_date":"2025-04-18T17:55:36.664594","created_date":"2024-05-29"}