{"id":"https://openalex.org/W4416252102","doi":"https://doi.org/10.1109/ijcnn64981.2025.11228380","title":"Backdoor Defense via Malicious Knowledge Capturing and Machine Unlearning with Out-of-Distribution Data","display_name":"Backdoor Defense via Malicious Knowledge Capturing and Machine Unlearning with Out-of-Distribution Data","publication_year":2025,"publication_date":"2025-06-30","ids":{"openalex":"https://openalex.org/W4416252102","doi":"https://doi.org/10.1109/ijcnn64981.2025.11228380"},"language":null,"primary_location":{"id":"doi:10.1109/ijcnn64981.2025.11228380","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn64981.2025.11228380","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101545461","display_name":"Dong Liang","orcid":"https://orcid.org/0000-0002-6253-8039"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Dongyang Liang","raw_affiliation_strings":["Guangzhou University,Institute of Artificial Intelligence,Guangzhou,China"],"affiliations":[{"raw_affiliation_string":"Guangzhou University,Institute of Artificial Intelligence,Guangzhou,China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004966418","display_name":"Keyu Chen","orcid":"https://orcid.org/0000-0002-9695-8242"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Keyu Chen","raw_affiliation_strings":["Guangzhou University,Institute of Artificial Intelligence,Guangzhou,China"],"affiliations":[{"raw_affiliation_string":"Guangzhou University,Institute of Artificial Intelligence,Guangzhou,China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111123738","display_name":"Hongyang Yan","orcid":null},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongyang Yan","raw_affiliation_strings":["Guangzhou University,Institute of Artificial Intelligence,Guangzhou,China"],"affiliations":[{"raw_affiliation_string":"Guangzhou University,Institute of Artificial Intelligence,Guangzhou,China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034211796","display_name":"Changyu Dong","orcid":"https://orcid.org/0000-0002-8625-0275"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Changyu Dong","raw_affiliation_strings":["Guangzhou University,Institute of Artificial Intelligence,Guangzhou,China"],"affiliations":[{"raw_affiliation_string":"Guangzhou University,Institute of Artificial Intelligence,Guangzhou,China","institution_ids":["https://openalex.org/I37987034"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101545461"],"corresponding_institution_ids":["https://openalex.org/I37987034"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.18319785,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9240000247955322,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9240000247955322,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.03779999911785126,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.01140000019222498,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.9995999932289124},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5809999704360962},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.44020000100135803},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.35190001130104065},{"id":"https://openalex.org/keywords/training-set","display_name":"Training set","score":0.31470000743865967}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.9995999932289124},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6561999917030334},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5809999704360962},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5236999988555908},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.44020000100135803},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4036000072956085},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.35190001130104065},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3476000130176544},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.31470000743865967},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.23399999737739563}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ijcnn64981.2025.11228380","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn64981.2025.11228380","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320328715","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2117876524","https://openalex.org/W2302255633","https://openalex.org/W2753783305","https://openalex.org/W2807363941","https://openalex.org/W2934843808","https://openalex.org/W2942091739","https://openalex.org/W2963542245","https://openalex.org/W2970335439","https://openalex.org/W2986013765","https://openalex.org/W3093137868","https://openalex.org/W3107337211","https://openalex.org/W4225750584","https://openalex.org/W4285601739","https://openalex.org/W4312569687","https://openalex.org/W4382051836","https://openalex.org/W4386065356","https://openalex.org/W4386072159","https://openalex.org/W4390871934"],"related_works":[],"abstract_inverted_index":{"Recent":[0],"studies":[1],"reveal":[2],"that":[3,26,142,167],"backdoor":[4,52,85,101,116,139,154],"attacks":[5,140,155],"are":[6],"a":[7,50,60,92,105],"significant":[8],"security":[9],"threat":[10],"to":[11,30,67,83,97],"deep":[12],"neural":[13],"networks.":[14],"Existing":[15],"defense":[16,53,165],"methods":[17,166],"for":[18],"removing":[19],"backdoors":[20],"from":[21,87],"victim":[22,89,121],"models":[23],"often":[24],"assume":[25],"defenders":[27],"have":[28],"access":[29],"limited":[31],"clean":[32,170],"training":[33,171],"data,":[34,130],"which":[35],"is":[36,65],"unrealistic":[37],"in":[38],"real-world":[39],"scenarios.":[40],"Inspired":[41],"by":[42,110,156],"the":[43,69,88,100,112,115,120,147],"biological":[44],"immune":[45],"response":[46],"process,":[47],"we":[48,103],"propose":[49],"novel":[51],"framework":[54,124],"comprises":[55],"three":[56],"key":[57],"steps.":[58],"First,":[59],"max-entropy":[61],"staircase":[62],"approximator":[63],"(MSA)":[64],"implemented":[66],"capture":[68],"valid":[70],"trigger":[71,74,81],"distribution":[72],"through":[73],"reconstruction.":[75],"We":[76],"then":[77],"utilize":[78],"these":[79],"reconstructed":[80],"patterns":[82],"extract":[84],"knowledge":[86,93,117],"model":[90],"using":[91],"distillation-based":[94],"approach.":[95],"Finally,":[96],"completely":[98],"eliminate":[99],"knowledge,":[102],"design":[104],"machine":[106],"unlearning":[107],"method":[108],"optimized":[109],"maximizing":[111],"KL-divergence":[113],"between":[114],"representation":[118],"and":[119,161],"model.":[122],"Our":[123],"relies":[125],"solely":[126],"on":[127,137,169],"unlabeled":[128],"out-of-distribution":[129],"significantly":[131],"enhancing":[132],"its":[133],"practicality.":[134],"Extensive":[135],"experiments":[136],"various":[138],"show":[141],"our":[143],"approach":[144],"can":[145],"lower":[146],"attack":[148],"success":[149],"rates":[150],"of":[151,159],"five":[152,163],"state-of-the-art":[153,164],"an":[157],"average":[158],"99%":[160],"outperforms":[162],"rely":[168],"data.":[172]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-11-14T00:00:00"}
