{"id":"https://openalex.org/W4225911886","doi":"https://doi.org/10.1109/icassp43922.2022.9746573","title":"Test-Time Detection of Backdoor Triggers for Poisoned Deep Neural Networks","display_name":"Test-Time Detection of Backdoor Triggers for Poisoned Deep Neural Networks","publication_year":2022,"publication_date":"2022-04-27","ids":{"openalex":"https://openalex.org/W4225911886","doi":"https://doi.org/10.1109/icassp43922.2022.9746573"},"language":"en","primary_location":{"id":"doi:10.1109/icassp43922.2022.9746573","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icassp43922.2022.9746573","pdf_url":null,"source":{"id":"https://openalex.org/S4363607702","display_name":"ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100407758","display_name":"Xi Li","orcid":"https://orcid.org/0000-0003-3023-1662"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Xi Li","raw_affiliation_strings":["Pennsylvania State University,School of EECS","School of EECS, Pennsylvania State University"],"affiliations":[{"raw_affiliation_string":"Pennsylvania State University,School of EECS","institution_ids":["https://openalex.org/I130769515"]},{"raw_affiliation_string":"School of EECS, Pennsylvania State University","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085283385","display_name":"Zhen Xiang","orcid":"https://orcid.org/0000-0002-4284-2041"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zhen Xiang","raw_affiliation_strings":["Pennsylvania State University,School of EECS","School of EECS, Pennsylvania State University"],"affiliations":[{"raw_affiliation_string":"Pennsylvania State University,School of EECS","institution_ids":["https://openalex.org/I130769515"]},{"raw_affiliation_string":"School of EECS, Pennsylvania State University","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109550792","display_name":"David J. Miller","orcid":null},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"David J. Miller","raw_affiliation_strings":["Pennsylvania State University,School of EECS","School of EECS, Pennsylvania State University"],"affiliations":[{"raw_affiliation_string":"Pennsylvania State University,School of EECS","institution_ids":["https://openalex.org/I130769515"]},{"raw_affiliation_string":"School of EECS, Pennsylvania State University","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063903486","display_name":"George Kesidis","orcid":"https://orcid.org/0000-0001-7947-8127"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"George Kesidis","raw_affiliation_strings":["Pennsylvania State University,School of EECS","School of EECS, Pennsylvania State University"],"affiliations":[{"raw_affiliation_string":"Pennsylvania State University,School of EECS","institution_ids":["https://openalex.org/I130769515"]},{"raw_affiliation_string":"School of EECS, Pennsylvania State University","institution_ids":["https://openalex.org/I130769515"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100407758"],"corresponding_institution_ids":["https://openalex.org/I130769515"],"apc_list":null,"apc_paid":null,"fwci":0.944,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.75916896,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"3333","last_page":"3337"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9771999716758728,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9688000082969666,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.9997023344039917},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6387481093406677},{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.6050435900688171},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.6012474298477173},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5789269208908081},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.48086172342300415},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3421313762664795},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.33160996437072754}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.9997023344039917},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6387481093406677},{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.6050435900688171},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.6012474298477173},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5789269208908081},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.48086172342300415},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3421313762664795},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33160996437072754}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icassp43922.2022.9746573","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icassp43922.2022.9746573","pdf_url":null,"source":{"id":"https://openalex.org/S4363607702","display_name":"ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W1686810756","https://openalex.org/W2007339694","https://openalex.org/W2112796928","https://openalex.org/W2194775991","https://openalex.org/W2536626143","https://openalex.org/W2750384547","https://openalex.org/W2753783305","https://openalex.org/W2774423163","https://openalex.org/W2898759955","https://openalex.org/W2934843808","https://openalex.org/W2942091739","https://openalex.org/W2966187620","https://openalex.org/W2972120770","https://openalex.org/W2973217491","https://openalex.org/W2980257194","https://openalex.org/W2990270730","https://openalex.org/W2996800219","https://openalex.org/W3007264885","https://openalex.org/W3015716673","https://openalex.org/W3113332968","https://openalex.org/W3118608800","https://openalex.org/W3198645503","https://openalex.org/W4214563788","https://openalex.org/W4230172274","https://openalex.org/W4289300166","https://openalex.org/W4300250944","https://openalex.org/W6637373629","https://openalex.org/W6743688258","https://openalex.org/W6746897123","https://openalex.org/W6756074407","https://openalex.org/W6756333562","https://openalex.org/W6766253520","https://openalex.org/W6767346468","https://openalex.org/W6780292011","https://openalex.org/W6787972765","https://openalex.org/W6788243578","https://openalex.org/W6800721505"],"related_works":["https://openalex.org/W4320031223","https://openalex.org/W3106646114","https://openalex.org/W4308244459","https://openalex.org/W4221166349","https://openalex.org/W4226092343","https://openalex.org/W4200628936","https://openalex.org/W4391093411","https://openalex.org/W4389518867","https://openalex.org/W4225678119","https://openalex.org/W2969023901"],"abstract_inverted_index":{"Backdoor":[0],"(Trojan)":[1],"attacks":[2,128],"are":[3],"emerging":[4],"threats":[5],"against":[6,126],"deep":[7],"neural":[8],"networks":[9],"(DNN).":[10],"A":[11],"DNN":[12,53,72,169],"being":[13],"attacked":[14,55],"will":[15],"predict":[16],"to":[17,70,73,87],"an":[18,122],"attacker-desired":[19],"target":[20],"class":[21,29,146],"whenever":[22],"a":[23,33,52,63,77,137,152,165],"test":[24,41],"sample":[25],"from":[26],"any":[27],"source":[28],"is":[30,54,161],"embedded":[31],"with":[32],"backdoor":[34,44,60,108,113,127,138,173],"pattern,":[35],"while":[36],"correctly":[37],"classifying":[38],"clean":[39,79],"(attack-free)":[40],"samples.":[42],"Existing":[43],"defenses":[45,98],"have":[46],"shown":[47],"success":[48],"in":[49,57,62,102],"detecting":[50],"whether":[51],"and":[56,76,142,172],"reverse-engineering":[58],"the":[59,66,71,88,94,103,107,112,145],"pattern":[61],"\"post-training\"":[64],"scenario:":[65],"defender":[67],"has":[68,84],"access":[69,86],"be":[74],"inspected":[75],"small,":[78],"dataset":[80],"collected":[81],"independently,":[82],"but":[83],"no":[85],"(possibly":[89],"poisoned)":[90],"training":[91],"set":[92],"of":[93,105,136,147,158,168],"DNN.":[95],"However,":[96],"these":[97],"neither":[99],"catch":[100],"culprits":[101],"act":[104],"triggering":[106],"mapping,":[109],"nor":[110],"mitigate":[111],"attack":[114,174],"at":[115,140],"test-time.":[116],"In":[117],"this":[118],"paper,":[119],"we":[120],"propose":[121],"\"in-flight\"":[123],"unsupervised":[124],"defense":[125,160],"on":[129],"image":[130],"classification":[131],"that":[132],"1)":[133],"detects":[134],"use":[135],"trigger":[139,154],"test-time;":[141],"2)":[143],"infers":[144],"origin":[148],"(source":[149],"class)":[150],"for":[151,164],"detected":[153],"example.":[155],"The":[156],"effectiveness":[157],"our":[159],"demonstrated":[162],"experimentally":[163],"wide":[166],"variety":[167],"architectures,":[170],"datasets,":[171],"configurations.":[175]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":2}],"updated_date":"2026-03-13T14:20:09.374765","created_date":"2025-10-10T00:00:00"}
