{"id":"https://openalex.org/W4280555383","doi":"https://doi.org/10.1007/978-3-031-13185-1_9","title":"Verifying Neural Networks Against Backdoor Attacks","display_name":"Verifying Neural Networks Against Backdoor Attacks","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4280555383","doi":"https://doi.org/10.1007/978-3-031-13185-1_9"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-031-13185-1_9","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-031-13185-1_9","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-031-13185-1_9.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/978-3-031-13185-1_9.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088791019","display_name":"Long Hoang Pham","orcid":"https://orcid.org/0000-0002-3240-657X"},"institutions":[{"id":"https://openalex.org/I79891267","display_name":"Singapore Management University","ror":"https://ror.org/050qmg959","country_code":"SG","type":"education","lineage":["https://openalex.org/I79891267"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Long H. Pham","raw_affiliation_strings":["Singapore Management University, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"Singapore Management University, Singapore, Singapore","institution_ids":["https://openalex.org/I79891267"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100429004","display_name":"Jun Sun","orcid":"https://orcid.org/0000-0002-3545-1392"},"institutions":[{"id":"https://openalex.org/I79891267","display_name":"Singapore Management University","ror":"https://ror.org/050qmg959","country_code":"SG","type":"education","lineage":["https://openalex.org/I79891267"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Jun Sun","raw_affiliation_strings":["Singapore Management University, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"Singapore Management University, Singapore, Singapore","institution_ids":["https://openalex.org/I79891267"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5088791019"],"corresponding_institution_ids":["https://openalex.org/I79891267"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":{"value":5000,"currency":"EUR","value_usd":5392},"fwci":2.396,"has_fulltext":true,"cited_by_count":8,"citation_normalized_percentile":{"value":0.90481015,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"171","last_page":"192"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12026","display_name":"Explainable Artificial Intelligence (XAI)","score":0.9894000291824341,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.9980599880218506},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.762274444103241},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6468574404716492},{"id":"https://openalex.org/keywords/heuristics","display_name":"Heuristics","score":0.6115210652351379},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4591715633869171},{"id":"https://openalex.org/keywords/smoothing","display_name":"Smoothing","score":0.45684635639190674},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.45059120655059814},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2226639688014984}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.9980599880218506},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.762274444103241},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6468574404716492},{"id":"https://openalex.org/C127705205","wikidata":"https://www.wikidata.org/wiki/Q5748245","display_name":"Heuristics","level":2,"score":0.6115210652351379},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4591715633869171},{"id":"https://openalex.org/C3770464","wikidata":"https://www.wikidata.org/wiki/Q775963","display_name":"Smoothing","level":2,"score":0.45684635639190674},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.45059120655059814},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2226639688014984},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-031-13185-1_9","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-031-13185-1_9","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-031-13185-1_9.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:ink.library.smu.edu.sg:sis_research-8282","is_oa":true,"landing_page_url":"https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=8282&context=sis_research","pdf_url":null,"source":{"id":"https://openalex.org/S4377196871","display_name":"Institutional Knowledge (InK) - Institutional Knowledge at Singapore Management University (Singapore Management University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79891267","host_organization_name":"Singapore Management University","host_organization_lineage":["https://openalex.org/I79891267"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"https://doi.org/10.1007/978-3-031-13185-1_9","raw_type":"Conference Proceeding Article"}],"best_oa_location":{"id":"doi:10.1007/978-3-031-13185-1_9","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-031-13185-1_9","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-031-13185-1_9.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2616091977","display_name":null,"funder_award_id":"SN-ZJU-SIAS-001","funder_id":"https://openalex.org/F4320322927","funder_display_name":"Zhejiang University"},{"id":"https://openalex.org/G3882347383","display_name":null,"funder_award_id":"Tier 3","funder_id":"https://openalex.org/F4320320751","funder_display_name":"Ministry of Education - Singapore"},{"id":"https://openalex.org/G5016601650","display_name":null,"funder_award_id":"Academic Research Fund","funder_id":"https://openalex.org/F4320320751","funder_display_name":"Ministry of Education - Singapore"},{"id":"https://openalex.org/G5027370758","display_name":null,"funder_award_id":"MOET32020-0004","funder_id":"https://openalex.org/F4320320751","funder_display_name":"Ministry of Education - Singapore"},{"id":"https://openalex.org/G901625343","display_name":null,"funder_award_id":"Academic Research F","funder_id":"https://openalex.org/F4320320751","funder_display_name":"Ministry of Education - Singapore"}],"funders":[{"id":"https://openalex.org/F4320320751","display_name":"Ministry of Education - Singapore","ror":"https://ror.org/01kcva023"},{"id":"https://openalex.org/F4320322927","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884"},{"id":"https://openalex.org/F4320323346","display_name":"B\u1ed9 Gi\u00e1o d\u1ee5c v\u00e0 \u00d0\u00e0o t\u1ea1o","ror":"https://ror.org/00drv3378"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4280555383.pdf","grobid_xml":"https://content.openalex.org/works/W4280555383.grobid-xml"},"referenced_works_count":26,"referenced_works":["https://openalex.org/W2044097773","https://openalex.org/W2180612164","https://openalex.org/W2325939864","https://openalex.org/W2543296129","https://openalex.org/W2543927648","https://openalex.org/W2594877703","https://openalex.org/W2753783305","https://openalex.org/W2774644650","https://openalex.org/W2787596386","https://openalex.org/W2794609696","https://openalex.org/W2807363941","https://openalex.org/W2900153411","https://openalex.org/W2934843808","https://openalex.org/W2963054787","https://openalex.org/W2963857521","https://openalex.org/W2964164993","https://openalex.org/W2970335439","https://openalex.org/W2986013765","https://openalex.org/W2990270730","https://openalex.org/W3002398329","https://openalex.org/W3003257820","https://openalex.org/W3107337211","https://openalex.org/W6600018615","https://openalex.org/W6600159499","https://openalex.org/W6902242262","https://openalex.org/W7045220936"],"related_works":["https://openalex.org/W2114811871","https://openalex.org/W2961085424","https://openalex.org/W4224919924","https://openalex.org/W4306674287","https://openalex.org/W2884576438","https://openalex.org/W1756885467","https://openalex.org/W4224009465","https://openalex.org/W2905364337","https://openalex.org/W1522517976","https://openalex.org/W4286629047"],"abstract_inverted_index":{"Abstract":[0],"Neural":[1],"networks":[2],"have":[3],"achieved":[4],"state-of-the-art":[5],"performance":[6],"in":[7,14,52],"solving":[8],"many":[9,12],"problems,":[10],"including":[11],"applications":[13],"safety/security-critical":[15],"systems.":[16],"Researchers":[17],"also":[18],"discovered":[19],"multiple":[20],"security":[21],"issues":[22],"associated":[23],"with":[24,40,126],"neural":[25,35,67,105,120],"networks.":[26],"One":[27],"of":[28,55,80,86,92,124,130,154],"them":[29],"is":[30,48,69,94,100,122],"backdoor":[31,42,93,125,155,158],"attacks,":[32],"i.e.,":[33],"a":[34,41,45,56,66,118,127],"network":[36,68,106,121],"may":[37],"be":[38],"embedded":[39],"such":[43],"that":[44,147],"target":[46],"output":[47],"almost":[49],"always":[50],"generated":[51],"the":[53,78,83,90,152],"presence":[54],"trigger.":[57],"Existing":[58],"defense":[59],"approaches":[60],"mostly":[61],"focus":[62],"on":[63,72,96],"detecting":[64],"whether":[65,117],"\u2018backdoored\u2019":[70],"based":[71,95],"heuristics,":[73],"e.g.,":[74],"activation":[75],"patterns.":[76],"To":[77],"best":[79],"our":[81,148],"knowledge,":[82],"only":[84],"line":[85],"work":[87],"which":[88,99],"certifies":[89],"absence":[91,153],"randomized":[97],"smoothing,":[98],"known":[101],"to":[102,115],"significantly":[103],"reduce":[104],"performance.":[107],"In":[108],"this":[109],"work,":[110],"we":[111],"propose":[112],"an":[113],"approach":[114,134,149],"verify":[116],"given":[119],"free":[123],"certain":[128],"level":[129],"success":[131],"rate.":[132],"Our":[133],"integrates":[135],"statistical":[136],"sampling":[137],"as":[138,140],"well":[139],"abstract":[141],"interpretation.":[142],"The":[143],"experiment":[144],"results":[145],"show":[146],"effectively":[150],"verifies":[151],"or":[156],"generates":[157],"triggers.":[159]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
