{"id":"https://openalex.org/W3157459315","doi":"https://doi.org/10.1109/tifs.2022.3160359","title":"Stealthy Backdoors as Compression Artifacts","display_name":"Stealthy Backdoors as Compression Artifacts","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W3157459315","doi":"https://doi.org/10.1109/tifs.2022.3160359","mag":"3157459315"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2022.3160359","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3160359","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101976156","display_name":"Yulong Tian","orcid":"https://orcid.org/0000-0003-0163-4542"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yulong Tian","raw_affiliation_strings":["State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026365218","display_name":"Fnu Suya","orcid":"https://orcid.org/0000-0002-3334-6257"},"institutions":[{"id":"https://openalex.org/I51556381","display_name":"University of Virginia","ror":"https://ror.org/0153tk833","country_code":"US","type":"education","lineage":["https://openalex.org/I51556381"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Fnu Suya","raw_affiliation_strings":["Department of Computer Science, University of Virginia, Charlottesville, VA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Virginia, Charlottesville, VA, USA","institution_ids":["https://openalex.org/I51556381"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114549816","display_name":"Fengyuan Xu","orcid":"https://orcid.org/0000-0003-3388-7544"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fengyuan Xu","raw_affiliation_strings":["State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027001546","display_name":"David Evans","orcid":"https://orcid.org/0000-0001-7988-8943"},"institutions":[{"id":"https://openalex.org/I51556381","display_name":"University of Virginia","ror":"https://ror.org/0153tk833","country_code":"US","type":"education","lineage":["https://openalex.org/I51556381"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"David Evans","raw_affiliation_strings":["Department of Computer Science, University of Virginia, Charlottesville, VA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Virginia, Charlottesville, VA, USA","institution_ids":["https://openalex.org/I51556381"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101976156"],"corresponding_institution_ids":["https://openalex.org/I881766915"],"apc_list":null,"apc_paid":null,"fwci":2.6208,"has_fulltext":false,"cited_by_count":23,"citation_normalized_percentile":{"value":0.90833398,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":93,"max":99},"biblio":{"volume":"17","issue":null,"first_page":"1372","last_page":"1387"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9872999787330627,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10036","display_name":"Advanced Neural Network Applications","score":0.9797000288963318,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.97288578748703},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8677691221237183},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.7187092900276184},{"id":"https://openalex.org/keywords/compression","display_name":"Compression (physics)","score":0.48096004128456116},{"id":"https://openalex.org/keywords/lossy-compression","display_name":"Lossy compression","score":0.44323253631591797},{"id":"https://openalex.org/keywords/quantization","display_name":"Quantization (signal processing)","score":0.4418152868747711},{"id":"https://openalex.org/keywords/pruning","display_name":"Pruning","score":0.4344254732131958},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40301376581192017},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.399831086397171},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3400822877883911},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.21903309226036072}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.97288578748703},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8677691221237183},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.7187092900276184},{"id":"https://openalex.org/C180016635","wikidata":"https://www.wikidata.org/wiki/Q2712821","display_name":"Compression (physics)","level":2,"score":0.48096004128456116},{"id":"https://openalex.org/C165021410","wikidata":"https://www.wikidata.org/wiki/Q55564","display_name":"Lossy compression","level":2,"score":0.44323253631591797},{"id":"https://openalex.org/C28855332","wikidata":"https://www.wikidata.org/wiki/Q198099","display_name":"Quantization (signal processing)","level":2,"score":0.4418152868747711},{"id":"https://openalex.org/C108010975","wikidata":"https://www.wikidata.org/wiki/Q500094","display_name":"Pruning","level":2,"score":0.4344254732131958},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40301376581192017},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.399831086397171},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3400822877883911},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.21903309226036072},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C6557445","wikidata":"https://www.wikidata.org/wiki/Q173113","display_name":"Agronomy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2022.3160359","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3160359","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5099999904632568,"display_name":"Decent work and economic growth","id":"https://metadata.un.org/sdg/8"}],"awards":[{"id":"https://openalex.org/G7062936185","display_name":null,"funder_award_id":"2021YFB3100300","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G932960369","display_name":null,"funder_award_id":"61872180","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320324852","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":91,"referenced_works":["https://openalex.org/W120838261","https://openalex.org/W992687842","https://openalex.org/W1532826273","https://openalex.org/W1724438581","https://openalex.org/W1821462560","https://openalex.org/W2002427601","https://openalex.org/W2137842291","https://openalex.org/W2194775991","https://openalex.org/W2233116163","https://openalex.org/W2242818861","https://openalex.org/W2335728318","https://openalex.org/W2402144811","https://openalex.org/W2515385951","https://openalex.org/W2554302513","https://openalex.org/W2554931888","https://openalex.org/W2582794520","https://openalex.org/W2583037806","https://openalex.org/W2612445135","https://openalex.org/W2748789698","https://openalex.org/W2753783305","https://openalex.org/W2757528734","https://openalex.org/W2774423163","https://openalex.org/W2809624076","https://openalex.org/W2886851211","https://openalex.org/W2896457183","https://openalex.org/W2928560789","https://openalex.org/W2934843808","https://openalex.org/W2962835968","https://openalex.org/W2962965870","https://openalex.org/W2963000224","https://openalex.org/W2963122961","https://openalex.org/W2963341956","https://openalex.org/W2963446712","https://openalex.org/W2963452728","https://openalex.org/W2963674932","https://openalex.org/W2963981420","https://openalex.org/W2964023041","https://openalex.org/W2965628707","https://openalex.org/W2966187620","https://openalex.org/W2966689772","https://openalex.org/W2970971581","https://openalex.org/W2985913519","https://openalex.org/W2986013765","https://openalex.org/W2988471847","https://openalex.org/W2990270730","https://openalex.org/W2997768846","https://openalex.org/W3008088841","https://openalex.org/W3009751875","https://openalex.org/W3010216907","https://openalex.org/W3012324658","https://openalex.org/W3015146382","https://openalex.org/W3016075089","https://openalex.org/W3030163527","https://openalex.org/W3035160371","https://openalex.org/W3081178496","https://openalex.org/W3096785379","https://openalex.org/W3097217077","https://openalex.org/W3097981673","https://openalex.org/W3098605233","https://openalex.org/W3118608800","https://openalex.org/W3152758407","https://openalex.org/W4287022642","https://openalex.org/W4292779060","https://openalex.org/W4294679663","https://openalex.org/W4297775537","https://openalex.org/W4298324472","https://openalex.org/W6631798071","https://openalex.org/W6637373629","https://openalex.org/W6690026940","https://openalex.org/W6703116779","https://openalex.org/W6713134421","https://openalex.org/W6724998850","https://openalex.org/W6726275242","https://openalex.org/W6737664043","https://openalex.org/W6738957339","https://openalex.org/W6743581629","https://openalex.org/W6746897123","https://openalex.org/W6753069482","https://openalex.org/W6754938779","https://openalex.org/W6755207826","https://openalex.org/W6766253520","https://openalex.org/W6766313860","https://openalex.org/W6766978945","https://openalex.org/W6767905742","https://openalex.org/W6770286897","https://openalex.org/W6774904085","https://openalex.org/W6775248243","https://openalex.org/W6776469819","https://openalex.org/W6778883912","https://openalex.org/W6802961543","https://openalex.org/W6840471665"],"related_works":["https://openalex.org/W4320031223","https://openalex.org/W4200629851","https://openalex.org/W4281902577","https://openalex.org/W4309417370","https://openalex.org/W4292107232","https://openalex.org/W3009072493","https://openalex.org/W4386080799","https://openalex.org/W3140988292","https://openalex.org/W4317672133","https://openalex.org/W4328053081"],"abstract_inverted_index":{"Model":[0],"compression":[1,38,127,145],"is":[2,109,173],"a":[3,50,54,61,76,113],"widely-used":[4],"approach":[5],"for":[6,24,43,123],"reducing":[7],"the":[8,34,87,107,136,143,152,159],"size":[9],"of":[10,141,154],"deep":[11],"learning":[12,56],"models":[13,20,160],"without":[14],"much":[15],"accuracy":[16],"loss,":[17],"enabling":[18],"resource-hungry":[19],"to":[21,45,94],"be":[22,95,121,147,164],"compressed":[23,110],"use":[25],"on":[26,53,66,73,158],"resource-constrained":[27],"devices.":[28],"In":[29,49],"this":[30,119],"paper,":[31],"we":[32],"study":[33],"risk":[35],"that":[36,63,86,161],"model":[37,62,89,108,126,131],"could":[39],"provide":[40],"an":[41,58],"opportunity":[42],"adversaries":[44,92],"inject":[46],"stealthy":[47,82],"backdoors.":[48],"backdoor":[51,83],"attack":[52],"machine":[55],"model,":[57],"adversary":[59,137],"produces":[60],"performs":[64],"well":[65],"normal":[67],"inputs":[68,74],"but":[69,105],"outputs":[70],"targeted":[71],"misclassifications":[72],"containing":[75],"small":[77],"trigger":[78],"pattern.":[79],"We":[80,117],"design":[81],"attacks":[84],"such":[85],"full-sized":[88],"released":[90],"by":[91],"appears":[93],"free":[96],"from":[97],"backdoors":[98],"(even":[99],"when":[100,106],"tested":[101],"using":[102],"state-of-the-art":[103],"techniques),":[104],"it":[111],"exhibits":[112],"highly":[114],"effective":[115],"backdoor.":[116],"show":[118],"can":[120],"done":[122],"two":[124],"common":[125],"techniques\u2014model":[128],"pruning":[129],"and":[130],"quantization\u2014even":[132],"in":[133,167],"settings":[134],"where":[135],"has":[138],"limited":[139],"knowledge":[140],"how":[142],"particular":[144],"will":[146,162],"done.":[148],"Our":[149,171],"findings":[150],"demonstrate":[151],"importance":[153],"performing":[155],"security":[156],"tests":[157],"actually":[163],"deployed":[165],"not":[166],"their":[168],"precompressed":[169],"version.":[170],"implementation":[172],"available":[174],"at":[175],"<uri":[176],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[177],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">https://github.com/yulongtzzz/Stealthy-Backdoors-as-Compression-Artifacts</uri>":[178],".":[179]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":2}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
