{"id":"https://openalex.org/W4416286273","doi":"https://doi.org/10.1109/tdsc.2025.3633381","title":"When Deepfake Meets Backdoor: Leveraging GAN Fingerprints for Data Poisoning Attack","display_name":"When Deepfake Meets Backdoor: Leveraging GAN Fingerprints for Data Poisoning Attack","publication_year":2025,"publication_date":"2025-11-17","ids":{"openalex":"https://openalex.org/W4416286273","doi":"https://doi.org/10.1109/tdsc.2025.3633381"},"language":null,"primary_location":{"id":"doi:10.1109/tdsc.2025.3633381","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3633381","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013595393","display_name":"Yiru Zhao","orcid":"https://orcid.org/0000-0002-1896-2131"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]},{"id":"https://openalex.org/I4210111616","display_name":"Wuhan Business University","ror":"https://ror.org/0282ggx30","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210111616"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yiru Zhao","raw_affiliation_strings":["Institute for Math &#x0026; AI, Wuhan University, Wuhan, China","Institute for Math &amp; AI, Wuhan University, Wuhan, Hubei, China"],"affiliations":[{"raw_affiliation_string":"Institute for Math &#x0026; AI, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Institute for Math &amp; AI, Wuhan University, Wuhan, Hubei, China","institution_ids":["https://openalex.org/I4210111616"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019899328","display_name":"Yuwei Ma","orcid":"https://orcid.org/0000-0002-0009-8496"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yiran Ma","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060410658","display_name":"Yunjie Ge","orcid":"https://orcid.org/0000-0001-6158-3180"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]},{"id":"https://openalex.org/I4210111616","display_name":"Wuhan Business University","ror":"https://ror.org/0282ggx30","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210111616"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yunjie Ge","raw_affiliation_strings":["Institute for Math &#x0026; AI, Wuhan University, Wuhan, China","Institute for Math &amp; AI, Wuhan University, Wuhan, Hubei, China"],"affiliations":[{"raw_affiliation_string":"Institute for Math &#x0026; AI, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Institute for Math &amp; AI, Wuhan University, Wuhan, Hubei, China","institution_ids":["https://openalex.org/I4210111616"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030015523","display_name":"Lingchen Zhao","orcid":"https://orcid.org/0000-0002-1700-3836"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lingchen Zhao","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100671319","display_name":"Lei Zhao","orcid":"https://orcid.org/0000-0003-2412-7279"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Zhao","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100391116","display_name":"Qian Wang","orcid":"https://orcid.org/0000-0002-8967-8525"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qian Wang","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei, China","institution_ids":["https://openalex.org/I37461747"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5013595393"],"corresponding_institution_ids":["https://openalex.org/I37461747","https://openalex.org/I4210111616"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.19170194,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"23","issue":"2","first_page":"3161","last_page":"3175"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9036999940872192,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9036999940872192,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.020400000736117363,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.01810000091791153,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.98089998960495},{"id":"https://openalex.org/keywords/training-set","display_name":"Training set","score":0.5498999953269958},{"id":"https://openalex.org/keywords/generative-adversarial-network","display_name":"Generative adversarial network","score":0.5425000190734863},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.47530001401901245},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.47189998626708984},{"id":"https://openalex.org/keywords/sample","display_name":"Sample (material)","score":0.4115999937057495},{"id":"https://openalex.org/keywords/data-set","display_name":"Data set","score":0.4032000005245209},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.3961000144481659}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.98089998960495},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8046000003814697},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.5498999953269958},{"id":"https://openalex.org/C2988773926","wikidata":"https://www.wikidata.org/wiki/Q25104379","display_name":"Generative adversarial network","level":3,"score":0.5425000190734863},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5069000124931335},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.47530001401901245},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.47350001335144043},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.47189998626708984},{"id":"https://openalex.org/C198531522","wikidata":"https://www.wikidata.org/wiki/Q485146","display_name":"Sample (material)","level":2,"score":0.4115999937057495},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4106999933719635},{"id":"https://openalex.org/C58489278","wikidata":"https://www.wikidata.org/wiki/Q1172284","display_name":"Data set","level":2,"score":0.4032000005245209},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.3961000144481659},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.39500001072883606},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3571999967098236},{"id":"https://openalex.org/C174839445","wikidata":"https://www.wikidata.org/wiki/Q1134386","display_name":"Lock (firearm)","level":2,"score":0.3497999906539917},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.3443000018596649},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.3127000033855438},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.30550000071525574},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.2994000017642975},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.2985000014305115},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.257999986410141},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.2538999915122986}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2025.3633381","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3633381","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":48,"referenced_works":["https://openalex.org/W2067713319","https://openalex.org/W2194775991","https://openalex.org/W2417429787","https://openalex.org/W2475287302","https://openalex.org/W2752782242","https://openalex.org/W2753783305","https://openalex.org/W2765424254","https://openalex.org/W2907295878","https://openalex.org/W2934843808","https://openalex.org/W2950689937","https://openalex.org/W2955577133","https://openalex.org/W2963767194","https://openalex.org/W2964024144","https://openalex.org/W2970335439","https://openalex.org/W2986013765","https://openalex.org/W2990270730","https://openalex.org/W2991318208","https://openalex.org/W2996800219","https://openalex.org/W3003301247","https://openalex.org/W3012113073","https://openalex.org/W3024103409","https://openalex.org/W3034577585","https://openalex.org/W3035574324","https://openalex.org/W3039098095","https://openalex.org/W3042368254","https://openalex.org/W3106646114","https://openalex.org/W3107337211","https://openalex.org/W3155871095","https://openalex.org/W3173962029","https://openalex.org/W4214564822","https://openalex.org/W4226550712","https://openalex.org/W4283811667","https://openalex.org/W4285605767","https://openalex.org/W4287884584","https://openalex.org/W4312329503","https://openalex.org/W4312769845","https://openalex.org/W4313128851","https://openalex.org/W4323244256","https://openalex.org/W4323655037","https://openalex.org/W4324007135","https://openalex.org/W4383221550","https://openalex.org/W4386065356","https://openalex.org/W4386071953","https://openalex.org/W4388867373","https://openalex.org/W4393154709","https://openalex.org/W4393160907","https://openalex.org/W4394712384","https://openalex.org/W4415797709"],"related_works":[],"abstract_inverted_index":{"Deep":[0],"Neural":[1],"Networks":[2],"are":[3],"vulnerable":[4],"to":[5,35,74,115],"data":[6,17,95,118,124],"poisoning":[7,14],"attacks,":[8],"which":[9],"inject":[10],"a":[11,20,40,105],"backdoor":[12,176,180],"by":[13,78,163],"the":[15,44,66,83,98,165],"training":[16,94],"set":[18],"with":[19,112],"predefined":[21],"trigger":[22,29,76,136],"pattern.":[23],"However,":[24],"most":[25],"existing":[26,175],"studies":[27],"design":[28,75],"patterns":[30,77,137],"as":[31,39,52,135],"exogenous":[32],"features":[33,46],"introduced":[34],"clean":[36],"samples":[37,110],"(such":[38,51],"checkerboard":[41],"patch),":[42],"whereas":[43],"endogenous":[45],"inherited":[47],"from":[48],"sample":[49],"origins":[50],"deep":[53],"generative":[54],"models)":[55],"have":[56],"not":[57],"been":[58],"investigated":[59],"yet.":[60],"In":[61],"this":[62],"study,":[63],"we":[64,92],"investigate":[65],"efficacy":[67],"of":[68,100,146,167],"utilizing":[69],"Generative":[70],"Adversarial":[71],"Network":[72],"fingerprints":[73,114,134],"examining":[79],"three":[80,123,179],"attack":[81,102,142],"patterns:":[82],"all-label":[84,149],"attack,":[85,87,150,154,159],"label-specific":[86,153],"and":[88,108,128,155,170,183],"semantic-specific":[89,158],"attack.":[90],"Specifically,":[91],"select":[93],"that":[96,131],"satisfies":[97],"requirements":[99],"various":[101],"patterns,":[103],"train":[104],"GAN":[106,113,133],"model,":[107],"employ":[109],"embedded":[111],"generate":[116],"poisoned":[117],"sets.":[119],"Our":[120],"evaluations":[121],"on":[122],"sets":[125],"(CIFAR-10,":[126],"GTSRB,":[127],"LSUN)":[129],"demonstrate":[130],"employing":[132],"1)":[138],"can":[139,172],"achieve":[140],"average":[141],"success":[143],"rate":[144],"results":[145],"39.40%":[147],"in":[148,152,157,193],"89.84%":[151],"91.06%":[156],"2)":[160],"is":[161],"stealthy":[162],"reducing":[164],"probability":[166],"being":[168],"exposed,":[169],"3)":[171],"resist":[173],"six":[174],"detection":[177,186],"techniques,":[178,182],"erasing":[181],"two":[184],"deepfake":[185],"techniques.":[187],"Furthermore,":[188],"it":[189],"exhibits":[190],"practical":[191],"applicability":[192],"federated":[194],"learning":[195],"scenario.":[196]},"counts_by_year":[],"updated_date":"2026-03-17T06:59:57.516163","created_date":"2025-11-17T00:00:00"}
