{"id":"https://openalex.org/W4402352596","doi":"https://doi.org/10.1109/ijcnn60899.2024.10650468","title":"OCGEC: One-class Graph Embedding Classification for DNN Backdoor Detection","display_name":"OCGEC: One-class Graph Embedding Classification for DNN Backdoor Detection","publication_year":2024,"publication_date":"2024-06-30","ids":{"openalex":"https://openalex.org/W4402352596","doi":"https://doi.org/10.1109/ijcnn60899.2024.10650468"},"language":"en","primary_location":{"id":"doi:10.1109/ijcnn60899.2024.10650468","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ijcnn60899.2024.10650468","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014985338","display_name":"Haoyu Jiang","orcid":"https://orcid.org/0000-0002-8807-4113"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Haoyu Jiang","raw_affiliation_strings":["Shanghai Jiao Tong University,School of Cyber Science and Engineering,Shanghai,China,200240"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University,School of Cyber Science and Engineering,Shanghai,China,200240","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086740564","display_name":"Haiyang Yu","orcid":"https://orcid.org/0000-0002-0704-7077"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haiyang Yu","raw_affiliation_strings":["Shanghai Jiao Tong University,School of Cyber Science and Engineering,Shanghai,China,200240"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University,School of Cyber Science and Engineering,Shanghai,China,200240","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100341008","display_name":"Nan Li","orcid":"https://orcid.org/0000-0001-6800-7389"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Nan Li","raw_affiliation_strings":["Shanghai Jiao Tong University,School of Cyber Science and Engineering,Shanghai,China,200240"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University,School of Cyber Science and Engineering,Shanghai,China,200240","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100709379","display_name":"Ping Yi","orcid":"https://orcid.org/0000-0003-4530-5118"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ping Yi","raw_affiliation_strings":["Shanghai Jiao Tong University,School of Cyber Science and Engineering,Shanghai,China,200240"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University,School of Cyber Science and Engineering,Shanghai,China,200240","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5014985338"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.12929601,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"31","issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9873999953269958,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.9464051723480225},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6428197026252747},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.64170241355896},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.6088400483131409},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4442407786846161},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.437614381313324},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3914189040660858},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1812995970249176}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.9464051723480225},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6428197026252747},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.64170241355896},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.6088400483131409},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4442407786846161},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.437614381313324},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3914189040660858},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1812995970249176}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ijcnn60899.2024.10650468","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ijcnn60899.2024.10650468","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","display_name":"Climate action","score":0.47999998927116394}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":55,"referenced_works":["https://openalex.org/W1832693441","https://openalex.org/W1970088130","https://openalex.org/W2103633133","https://openalex.org/W2115627867","https://openalex.org/W2117876524","https://openalex.org/W2122646361","https://openalex.org/W2131904035","https://openalex.org/W2142047467","https://openalex.org/W2154851992","https://openalex.org/W2748789698","https://openalex.org/W2753783305","https://openalex.org/W2774423163","https://openalex.org/W2797583228","https://openalex.org/W2898759955","https://openalex.org/W2907492528","https://openalex.org/W2912290085","https://openalex.org/W2934843808","https://openalex.org/W2966689772","https://openalex.org/W2980257194","https://openalex.org/W2986013765","https://openalex.org/W2990270730","https://openalex.org/W3001916452","https://openalex.org/W3034258347","https://openalex.org/W3040266635","https://openalex.org/W3042368254","https://openalex.org/W3096024872","https://openalex.org/W3104097132","https://openalex.org/W3104422614","https://openalex.org/W3114686421","https://openalex.org/W3118608800","https://openalex.org/W3120064156","https://openalex.org/W3128839796","https://openalex.org/W3135550350","https://openalex.org/W3152758407","https://openalex.org/W4223466981","https://openalex.org/W4230172274","https://openalex.org/W4290876361","https://openalex.org/W4313192591","https://openalex.org/W4322614756","https://openalex.org/W4382317738","https://openalex.org/W6676047094","https://openalex.org/W6679539681","https://openalex.org/W6730084236","https://openalex.org/W6743581629","https://openalex.org/W6746897123","https://openalex.org/W6750665317","https://openalex.org/W6751494907","https://openalex.org/W6756074407","https://openalex.org/W6756333562","https://openalex.org/W6784216616","https://openalex.org/W6787972765","https://openalex.org/W6788129810","https://openalex.org/W6789325072","https://openalex.org/W6810227681","https://openalex.org/W6840499701"],"related_works":["https://openalex.org/W4320031223","https://openalex.org/W4200629851","https://openalex.org/W4281902577","https://openalex.org/W4309417370","https://openalex.org/W4292107232","https://openalex.org/W3009072493","https://openalex.org/W4386080799","https://openalex.org/W3140988292","https://openalex.org/W4317672133","https://openalex.org/W2932872266"],"abstract_inverted_index":{"Deep":[0],"Neural":[1,71],"Networks":[2,72],"(DNNs)":[3],"have":[4],"been":[5],"found":[6],"vulnerable":[7],"to":[8,24,38,100,118,133],"backdoor":[9,26,47,76,139,147,170,177,206],"attacks,":[10,27,207],"raising":[11],"security":[12],"concerns":[13],"about":[14],"their":[15,53,102],"deployment":[16],"in":[17,55,184],"mission-critical":[18],"applications.":[19,213],"While":[20],"numerous":[21],"methods":[22,179],"exist":[23],"detect":[25,146],"many":[28],"of":[29,35,46,84,91,122,152,164,194,204],"them":[30],"rely":[31,200],"on":[32,115,172,201],"prior":[33],"knowledge":[34,151,203],"the":[36,120,153,205],"attacks":[37,171],"be":[39],"detected":[40],"and":[41,105,140,197],"require":[42],"a":[43,61,81,88,135,181,191],"certain":[44],"amount":[45,90,193],"samples":[48],"for":[49,74,211],"training,":[50],"which":[51,143],"limits":[52],"application":[54],"real-world":[56,212],"scenarios.":[57],"This":[58],"study":[59],"introduces":[60],"novel":[62],"One-Class":[63],"Graph":[64,70,110],"Embedding":[65],"Classification":[66],"(OCGEC)":[67],"framework":[68],"using":[69],"(GNNs)":[73],"model-level":[75],"detection.":[77],"OCGEC":[78,160,188],"first":[79],"trains":[80],"large":[82],"number":[83],"tiny":[85],"models":[86,97,148],"with":[87,128,180],"small":[89,192],"clean":[92,195],"data,":[93],"then":[94],"converts":[95],"these":[96,116],"into":[98],"graphs":[99,117],"leverage":[101],"structural":[103],"information":[104],"weights.":[106],"A":[107],"generative":[108],"self-supervised":[109],"Auto-Encoder":[111],"(GAE)":[112],"is":[113,125],"pre-trained":[114],"learn":[119],"representation":[121],"DNNs.":[123],"It":[124],"further":[126],"combined":[127],"one-class":[129],"classification":[130,136],"optimization":[131],"objectives":[132],"form":[134],"boundary":[137],"between":[138],"benign":[141],"models,":[142],"can":[144],"effectively":[145],"without":[149],"any":[150,202],"attack":[154],"strategy.":[155],"Experiments":[156],"show":[157],"that":[158,187],"our":[159],"achieves":[161],"AUC":[162],"scores":[163],"more":[165],"than":[166],"98%":[167],"against":[168],"state-of-the-art":[169],"various":[173],"datasets,":[174],"outperforming":[175],"existing":[176],"detection":[178],"distinctive":[182],"edge":[183],"performance.":[185],"Note":[186],"only":[189],"needs":[190],"data":[196],"does":[198],"not":[199],"making":[208],"it":[209],"well-suited":[210]},"counts_by_year":[],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2025-10-10T00:00:00"}
