Cited By
View all- Arshad IAlsamhi SQiao YLee BYe Y(2024)IOTM: Iterative Optimization Trigger Method—A Runtime Data-Free Backdoor Attacks on Deep Neural NetworksIEEE Transactions on Artificial Intelligence10.1109/TAI.2024.33849385:9(4562-4573)Online publication date: Sep-2024
- Brechelmacher ONičković DNießen TSallinger SWeissenbacher G(2024)Differential Property Monitoring for Backdoor DetectionFormal Methods and Software Engineering10.1007/978-981-96-0617-7_13(216-236)Online publication date: 29-Nov-2024
- Yue GXiao HChen J(2023)Backdoor Detection Based on Static Code Analysis and Software Component AnalysisProceedings of the 2023 3rd International Conference on Big Data, Artificial Intelligence and Risk Management10.1145/3656766.3656967(1120-1124)Online publication date: 24-Nov-2023
- Show More Cited By