{"id":"https://openalex.org/W4412129241","doi":"https://doi.org/10.1109/tifs.2025.3587194","title":"Contrastive Learning and Feature Space Tactics: A Dual Approach to Strengthen Backdoor Attacks","display_name":"Contrastive Learning and Feature Space Tactics: A Dual Approach to Strengthen Backdoor Attacks","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4412129241","doi":"https://doi.org/10.1109/tifs.2025.3587194"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2025.3587194","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3587194","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Hao Fu","orcid":"https://orcid.org/0009-0000-8086-7779"},"institutions":[{"id":"https://openalex.org/I100188998","display_name":"Harbin University of Science and Technology","ror":"https://ror.org/04e6y1282","country_code":"CN","type":"education","lineage":["https://openalex.org/I100188998"]},{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hao Fu","raw_affiliation_strings":["College of Computer Science and Technology, Harbin Engineering University, Harbin, China","Computer Science and Technology Department, Harbin Engineering University, China"],"raw_orcid":"https://orcid.org/0009-0000-8086-7779","affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Harbin Engineering University, Harbin, China","institution_ids":["https://openalex.org/I151727225"]},{"raw_affiliation_string":"Computer Science and Technology Department, Harbin Engineering University, China","institution_ids":["https://openalex.org/I100188998"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082969851","display_name":"Ming Liu","orcid":"https://orcid.org/0000-0002-2160-6111"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Ming Liu","raw_affiliation_strings":["School of Information Technology, Deakin University, Burwood, VIC, Australia","School of Information Technology, Deakin University, Victoria, Australia"],"raw_orcid":"https://orcid.org/0000-0002-2160-6111","affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Burwood, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]},{"raw_affiliation_string":"School of Information Technology, Deakin University, Victoria, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101636691","display_name":"Rongsheng Li","orcid":"https://orcid.org/0000-0003-4597-1583"},"institutions":[{"id":"https://openalex.org/I100188998","display_name":"Harbin University of Science and Technology","ror":"https://ror.org/04e6y1282","country_code":"CN","type":"education","lineage":["https://openalex.org/I100188998"]},{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rongsheng Li","raw_affiliation_strings":["College of Computer Science and Technology, Harbin Engineering University, Harbin, China","Computer Science and Technology Department, Harbin Engineering University, China"],"raw_orcid":"https://orcid.org/0000-0003-4597-1583","affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Harbin Engineering University, Harbin, China","institution_ids":["https://openalex.org/I151727225"]},{"raw_affiliation_string":"Computer Science and Technology Department, Harbin Engineering University, China","institution_ids":["https://openalex.org/I100188998"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I100188998","https://openalex.org/I151727225"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07768841,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"20","issue":null,"first_page":"7347","last_page":"7361"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9878000020980835,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9878000020980835,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9873999953269958,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.979200005531311,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.9459847807884216},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7968270778656006},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5958595871925354},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.586369514465332},{"id":"https://openalex.org/keywords/dual","display_name":"Dual (grammatical number)","score":0.5711979269981384},{"id":"https://openalex.org/keywords/space","display_name":"Space (punctuation)","score":0.4860396981239319},{"id":"https://openalex.org/keywords/feature-vector","display_name":"Feature vector","score":0.4617718458175659},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4395748972892761}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.9459847807884216},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7968270778656006},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5958595871925354},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.586369514465332},{"id":"https://openalex.org/C2780980858","wikidata":"https://www.wikidata.org/wiki/Q110022","display_name":"Dual (grammatical number)","level":2,"score":0.5711979269981384},{"id":"https://openalex.org/C2778572836","wikidata":"https://www.wikidata.org/wiki/Q380933","display_name":"Space (punctuation)","level":2,"score":0.4860396981239319},{"id":"https://openalex.org/C83665646","wikidata":"https://www.wikidata.org/wiki/Q42139305","display_name":"Feature vector","level":2,"score":0.4617718458175659},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4395748972892761},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C124952713","wikidata":"https://www.wikidata.org/wiki/Q8242","display_name":"Literature","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tifs.2025.3587194","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3587194","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:figshare.com:article/29832818","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Journal contribution"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/29832818","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Journal contribution"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6866034937","display_name":null,"funder_award_id":"62302121","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":64,"referenced_works":["https://openalex.org/W2753783305","https://openalex.org/W2913340405","https://openalex.org/W2934843808","https://openalex.org/W2951434086","https://openalex.org/W2956090150","https://openalex.org/W2965373594","https://openalex.org/W2966689772","https://openalex.org/W2973217491","https://openalex.org/W2985913519","https://openalex.org/W2998559045","https://openalex.org/W3092288641","https://openalex.org/W3098605233","https://openalex.org/W3100727892","https://openalex.org/W3134665270","https://openalex.org/W3136209691","https://openalex.org/W3158487140","https://openalex.org/W3163083600","https://openalex.org/W3176270593","https://openalex.org/W3199824684","https://openalex.org/W3204619801","https://openalex.org/W3205696278","https://openalex.org/W3215670835","https://openalex.org/W4214537185","https://openalex.org/W4280510162","https://openalex.org/W4288057740","https://openalex.org/W4304091911","https://openalex.org/W4306179629","https://openalex.org/W4375869076","https://openalex.org/W4385570757","https://openalex.org/W4386566654","https://openalex.org/W4392946707","https://openalex.org/W4392956390","https://openalex.org/W4393171290","https://openalex.org/W4398757423","https://openalex.org/W4400909489","https://openalex.org/W4401880101","https://openalex.org/W4403905376","https://openalex.org/W4406731455","https://openalex.org/W4408182509","https://openalex.org/W4409374173","https://openalex.org/W6679734692","https://openalex.org/W6685053522","https://openalex.org/W6691459498","https://openalex.org/W6743581629","https://openalex.org/W6746897123","https://openalex.org/W6748816842","https://openalex.org/W6755207826","https://openalex.org/W6768851824","https://openalex.org/W6770897281","https://openalex.org/W6775918922","https://openalex.org/W6776700526","https://openalex.org/W6778883912","https://openalex.org/W6786651539","https://openalex.org/W6788876066","https://openalex.org/W6791576469","https://openalex.org/W6798182279","https://openalex.org/W6799444384","https://openalex.org/W6802269988","https://openalex.org/W6803329306","https://openalex.org/W6803329705","https://openalex.org/W6838562696","https://openalex.org/W6851880694","https://openalex.org/W6861479177","https://openalex.org/W6929491212"],"related_works":["https://openalex.org/W4320031223","https://openalex.org/W4200629851","https://openalex.org/W4281902577","https://openalex.org/W4309417370","https://openalex.org/W4292107232","https://openalex.org/W3009072493","https://openalex.org/W4386080799","https://openalex.org/W3140988292","https://openalex.org/W4317672133","https://openalex.org/W4386185023"],"abstract_inverted_index":{"Contrastive":[0],"Learning":[1],"and":[2],"Feature":[3],"Space":[4],"Tactics:":[5],"A":[6],"Dual":[7],"Approach":[8],"to":[9],"Strengthen":[10],"Backdoor":[11],"Attacks":[12]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
