• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Bai, Yang (Bai, Yang.) [1] | Xing, Gaojie (Xing, Gaojie.) [2] | Wu, Hongyan (Wu, Hongyan.) [3] | Rao, Zhihong (Rao, Zhihong.) [4] | Ma, Chuan (Ma, Chuan.) [5] | Wang, Shiping (Wang, Shiping.) [6] | Liu, Xiaolei (Liu, Xiaolei.) [7] | Zhou, Yimin (Zhou, Yimin.) [8] | Tang, Jiajia (Tang, Jiajia.) [9] | Huang, Kaijun (Huang, Kaijun.) [10] | Kang, Jiale (Kang, Jiale.) [11]

Indexed by:

EI

Abstract:

Deep learning, as an important branch of machine learning, has been widely applied in computer vision, natural language processing, speech recognition, and more. However, recent studies have revealed that deep learning systems are vulnerable to backdoor attacks. Backdoor attackers inject a hidden backdoor into the deep learning model, such that the predictions of the infected model will be maliciously changed if the hidden backdoor is activated by input with a backdoor trigger while behaving normally on any benign sample. This kind of attack can potentially result in severe consequences in the real world. Therefore, research on defending against backdoor attacks has emerged rapidly. In this article, we have provided a comprehensive survey of backdoor attacks, detections, and defenses previously demonstrated on deep learning. We have investigated widely used model architectures, benchmark datasets, and metrics in backdoor research and have classified attacks, detections and defenses based on different criteria. Furthermore, we have analyzed some limitations in existing methods and, based on this, pointed out several promising future research directions. Through this survey, beginners can gain a preliminary understanding of backdoor attacks and defenses. Furthermore, we anticipate that this work will provide new perspectives and inspire extra research into the backdoor attack and defense methods in deep learning. © 2014 IEEE.

Keyword:

Adversarial machine learning Contrastive Learning Deep reinforcement learning Federated learning

Community:

  • [ 1 ] [Bai, Yang]Chengdu University of Information Technology, School of Cybersecurity, Xin Gu Industrial College, SUGON Industrial Control and Security Center, Chengdu; 610225, China
  • [ 2 ] [Xing, Gaojie]Chengdu University of Information Technology, School of Cybersecurity, Xin Gu Industrial College, SUGON Industrial Control and Security Center, Chengdu; 610225, China
  • [ 3 ] [Wu, Hongyan]Chengdu University of Information Technology, School of Cybersecurity, Xin Gu Industrial College, SUGON Industrial Control and Security Center, Chengdu; 610225, China
  • [ 4 ] [Rao, Zhihong]30th Institute of Electronics Technology Group, Chengdu; 610041, China
  • [ 5 ] [Ma, Chuan]Chongqing University, School of Computer Science, Chongqing; 400044, China
  • [ 6 ] [Wang, Shiping]Fuzhou University, College of Computer and Data Science, Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing, Fuzhou; 350108, China
  • [ 7 ] [Liu, Xiaolei]Institute of Computer Application, China Academy of Engineering Physics, Mianyang; 621900, China
  • [ 8 ] [Zhou, Yimin]Chengdu University of Information Technology, School of Cybersecurity, Xin Gu Industrial College, SUGON Industrial Control and Security Center, Chengdu; 610225, China
  • [ 9 ] [Tang, Jiajia]Chengdu University of Information Technology, School of Cybersecurity, Xin Gu Industrial College, SUGON Industrial Control and Security Center, Chengdu; 610225, China
  • [ 10 ] [Huang, Kaijun]Chengdu University of Information Technology, School of Cybersecurity, Xin Gu Industrial College, SUGON Industrial Control and Security Center, Chengdu; 610225, China
  • [ 11 ] [Kang, Jiale]Chengdu University of Information Technology, School of Cybersecurity, Xin Gu Industrial College, SUGON Industrial Control and Security Center, Chengdu; 610225, China

Reprint 's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

IEEE Transactions on Computational Social Systems

Year: 2025

Issue: 1

Volume: 12

Page: 404-434

4 . 5 0 0

JCR@2023

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 1

Affiliated Colleges:

Online/Total:124/9984010
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1