{"id":"https://openalex.org/W7129326401","doi":"https://doi.org/10.1109/icipw68931.2025.11385957","title":"Unmasking Backdoors: Generative Anomaly Detection for VLM Poison Samples and Trigger Characterization","display_name":"Unmasking Backdoors: Generative Anomaly Detection for VLM Poison Samples and Trigger Characterization","publication_year":2025,"publication_date":"2025-09-14","ids":{"openalex":"https://openalex.org/W7129326401","doi":"https://doi.org/10.1109/icipw68931.2025.11385957"},"language":null,"primary_location":{"id":"doi:10.1109/icipw68931.2025.11385957","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icipw68931.2025.11385957","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Image Processing Workshops (ICIPW)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5119549041","display_name":"Pooja Bandal","orcid":null},"institutions":[{"id":"https://openalex.org/I4210126680","display_name":"Protected Trust Services (United Kingdom)","ror":"https://ror.org/03d3dj187","country_code":"GB","type":"company","lineage":["https://openalex.org/I4210126680"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Pooja Bandal","raw_affiliation_strings":["SGS&#x0026;Co2 Dorchester Avenue,Toronto"],"affiliations":[{"raw_affiliation_string":"SGS&#x0026;Co2 Dorchester Avenue,Toronto","institution_ids":["https://openalex.org/I4210126680"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5126173952","display_name":"Anshul Verma","orcid":null},"institutions":[{"id":"https://openalex.org/I4210126680","display_name":"Protected Trust Services (United Kingdom)","ror":"https://ror.org/03d3dj187","country_code":"GB","type":"company","lineage":["https://openalex.org/I4210126680"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Anshul Verma","raw_affiliation_strings":["SGS&#x0026;Co2 Dorchester Avenue,Toronto"],"affiliations":[{"raw_affiliation_string":"SGS&#x0026;Co2 Dorchester Avenue,Toronto","institution_ids":["https://openalex.org/I4210126680"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5119549041"],"corresponding_institution_ids":["https://openalex.org/I4210126680"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.88250984,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"75","last_page":"79"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9312000274658203,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9312000274658203,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.02329999953508377,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.004800000227987766,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7008000016212463},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6662999987602234},{"id":"https://openalex.org/keywords/generative-grammar","display_name":"Generative grammar","score":0.5228999853134155},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.5091000199317932},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.4357999861240387},{"id":"https://openalex.org/keywords/mixture-model","display_name":"Mixture model","score":0.42899999022483826},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.42080000042915344}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7008000016212463},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6662999987602234},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6543999910354614},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6014999747276306},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.5228999853134155},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.5091000199317932},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.4357999861240387},{"id":"https://openalex.org/C61224824","wikidata":"https://www.wikidata.org/wiki/Q2260434","display_name":"Mixture model","level":2,"score":0.42899999022483826},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.42080000042915344},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.41440001130104065},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.4092999994754791},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.38269999623298645},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.37389999628067017},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.3691999912261963},{"id":"https://openalex.org/C2775941552","wikidata":"https://www.wikidata.org/wiki/Q25212305","display_name":"Isolation (microbiology)","level":2,"score":0.3637999892234802},{"id":"https://openalex.org/C83665646","wikidata":"https://www.wikidata.org/wiki/Q42139305","display_name":"Feature vector","level":2,"score":0.3361000120639801},{"id":"https://openalex.org/C167966045","wikidata":"https://www.wikidata.org/wiki/Q5532625","display_name":"Generative model","level":3,"score":0.3278999924659729},{"id":"https://openalex.org/C163716315","wikidata":"https://www.wikidata.org/wiki/Q901177","display_name":"Gaussian","level":2,"score":0.326200008392334},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.30379998683929443}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icipw68931.2025.11385957","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icipw68931.2025.11385957","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Image Processing Workshops (ICIPW)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6681183576583862,"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":2,"referenced_works":["https://openalex.org/W2296719434","https://openalex.org/W4402754214"],"related_works":[],"abstract_inverted_index":{"Multimodal":[0],"Vision-Language":[1],"Models":[2],"are":[3],"increasingly":[4],"deployed":[5],"in":[6,46,138],"critical":[7],"applications,":[8],"yet":[9],"remain":[10],"vulnerable":[11],"to":[12,22,116],"back-door":[13],"attacks\u2014maliciously":[14],"crafted":[15],"training":[16,74],"data":[17],"that":[18],"embeds":[19],"hidden":[20],"triggers":[21],"elicit":[23],"adversarial":[24,99],"outputs.":[25],"Addressing":[26],"this":[27],"threat,":[28],"we":[29,57],"propose":[30],"a":[31,76,112],"hybrid":[32],"anomaly":[33,68],"detection":[34,141],"and":[35,42,50,142],"generative":[36],"framework":[37],"for":[38,52,66],"identifying":[39],"poisoned":[40,85],"samples":[41,71],"characterizing":[43],"trigger":[44,118],"severity":[45,119,143],"VLMs.":[47],"Leveraging":[48],"CLIP":[49],"BLIP":[51],"rich":[53],"multimodal":[54],"feature":[55],"extraction,":[56],"apply":[58],"Isolation":[59,94],"Forests":[60],"with":[61],"an":[62],"elbow-method-optimized":[63],"contamination":[64],"threshold":[65],"initial":[67],"screening.":[69],"Clean":[70],"guide":[72],"the":[73,93,127,133],"of":[75,83,135],"RUNet-based":[77],"generator,":[78],"which":[79],"reconstructs":[80],"\u201cclean\u201d":[81],"versions":[82],"suspected":[84],"images.":[86],"A":[87],"frozen":[88],"surrogate":[89],"discriminator,":[90],"modeled":[91],"on":[92,126],"Forest":[95],"decision":[96],"boundary,":[97],"guides":[98],"refinement.":[100],"The":[101],"extracted":[102],"poison\u2014obtained":[103],"by":[104],"subtracting":[105],"clean":[106],"reconstructions":[107],"from":[108],"originals\u2014is":[109],"analyzed":[110],"using":[111],"Gaussian":[113],"Mixture":[114],"Model":[115],"classify":[117],"into":[120],"weak,":[121],"moderate,":[122],"or":[123],"strong.":[124],"Experiments":[125],"ICIP":[128],"2025":[129],"challenge":[130],"dataset":[131],"demonstrate":[132],"robustness":[134],"our":[136],"approach":[137],"both":[139],"poison":[140],"classification.":[144]},"counts_by_year":[],"updated_date":"2026-02-19T06:27:42.648592","created_date":"2026-02-18T00:00:00"}
