{"id":"https://openalex.org/W7108680487","doi":"https://doi.org/10.1109/tifs.2025.3640880","title":"<i>SSLDefender</i> : Backdoor Defense in Self-Supervised Learning via Distillation-Guided Unlearning","display_name":"<i>SSLDefender</i> : Backdoor Defense in Self-Supervised Learning via Distillation-Guided Unlearning","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W7108680487","doi":"https://doi.org/10.1109/tifs.2025.3640880"},"language":null,"primary_location":{"id":"doi:10.1109/tifs.2025.3640880","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3640880","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Jiale Zhang","orcid":"https://orcid.org/0000-0002-2143-5666"},"institutions":[{"id":"https://openalex.org/I4210108113","display_name":"Yango University","ror":"https://ror.org/01eqh1863","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210108113"]},{"id":"https://openalex.org/I78978612","display_name":"Yangzhou University","ror":"https://ror.org/03tqb8s11","country_code":"CN","type":"education","lineage":["https://openalex.org/I78978612"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiale Zhang","raw_affiliation_strings":["School of Information and Artificial Intelligence, Yangzhou University, Yangzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-2143-5666","affiliations":[{"raw_affiliation_string":"School of Information and Artificial Intelligence, Yangzhou University, Yangzhou, China","institution_ids":["https://openalex.org/I78978612","https://openalex.org/I4210108113"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Wanquan Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210108113","display_name":"Yango University","ror":"https://ror.org/01eqh1863","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210108113"]},{"id":"https://openalex.org/I78978612","display_name":"Yangzhou University","ror":"https://ror.org/03tqb8s11","country_code":"CN","type":"education","lineage":["https://openalex.org/I78978612"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wanquan Zhu","raw_affiliation_strings":["School of Information and Artificial Intelligence, Yangzhou University, Yangzhou, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Information and Artificial Intelligence, Yangzhou University, Yangzhou, China","institution_ids":["https://openalex.org/I78978612","https://openalex.org/I4210108113"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Kai Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210108113","display_name":"Yango University","ror":"https://ror.org/01eqh1863","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210108113"]},{"id":"https://openalex.org/I78978612","display_name":"Yangzhou University","ror":"https://ror.org/03tqb8s11","country_code":"CN","type":"education","lineage":["https://openalex.org/I78978612"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kai Wang","raw_affiliation_strings":["School of Information and Artificial Intelligence, Yangzhou University, Yangzhou, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Information and Artificial Intelligence, Yangzhou University, Yangzhou, China","institution_ids":["https://openalex.org/I78978612","https://openalex.org/I4210108113"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Chengcheng Zhu","orcid":"https://orcid.org/0009-0007-4082-0803"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chengcheng Zhu","raw_affiliation_strings":["State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"],"raw_orcid":"https://orcid.org/0009-0007-4082-0803","affiliations":[{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Xiaobing Sun","orcid":"https://orcid.org/0000-0001-5165-5080"},"institutions":[{"id":"https://openalex.org/I4210108113","display_name":"Yango University","ror":"https://ror.org/01eqh1863","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210108113"]},{"id":"https://openalex.org/I78978612","display_name":"Yangzhou University","ror":"https://ror.org/03tqb8s11","country_code":"CN","type":"education","lineage":["https://openalex.org/I78978612"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaobing Sun","raw_affiliation_strings":["School of Information and Artificial Intelligence, Yangzhou University, Yangzhou, China"],"raw_orcid":"https://orcid.org/0000-0001-5165-5080","affiliations":[{"raw_affiliation_string":"School of Information and Artificial Intelligence, Yangzhou University, Yangzhou, China","institution_ids":["https://openalex.org/I78978612","https://openalex.org/I4210108113"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Weizhi Meng","orcid":"https://orcid.org/0000-0003-4384-5786"},"institutions":[{"id":"https://openalex.org/I67415387","display_name":"Lancaster University","ror":"https://ror.org/04f2nsd36","country_code":"GB","type":"education","lineage":["https://openalex.org/I67415387"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Weizhi Meng","raw_affiliation_strings":["School of Computing and Communications, Lancaster University, Lancaster, U.K"],"raw_orcid":"https://orcid.org/0000-0003-4384-5786","affiliations":[{"raw_affiliation_string":"School of Computing and Communications, Lancaster University, Lancaster, U.K","institution_ids":["https://openalex.org/I67415387"]}]},{"author_position":"last","author":{"id":null,"display_name":"Xiapu Luo","orcid":"https://orcid.org/0000-0002-9082-3208"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Xiapu Luo","raw_affiliation_strings":["Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China"],"raw_orcid":"https://orcid.org/0000-0002-9082-3208","affiliations":[{"raw_affiliation_string":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China","institution_ids":["https://openalex.org/I14243506"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":7,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I4210108113","https://openalex.org/I78978612"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.77400933,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"20","issue":null,"first_page":"13159","last_page":"13172"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.0005000000237487257,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11307","display_name":"Domain Adaptation and Few-Shot Learning","score":0.0005000000237487257,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.9986000061035156},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.49900001287460327},{"id":"https://openalex.org/keywords/maximization","display_name":"Maximization","score":0.4812999963760376},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.4059000015258789},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.3790999948978424},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.36489999294281006}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.9986000061035156},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7746000289916992},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.49900001287460327},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4982999861240387},{"id":"https://openalex.org/C2776330181","wikidata":"https://www.wikidata.org/wiki/Q18358244","display_name":"Maximization","level":2,"score":0.4812999963760376},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4221999943256378},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.4059000015258789},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.3790999948978424},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.36489999294281006},{"id":"https://openalex.org/C136389625","wikidata":"https://www.wikidata.org/wiki/Q334384","display_name":"Supervised learning","level":3,"score":0.32350000739097595},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3050000071525574},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.2964000105857849},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.2856000065803528},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2754000127315521},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2651999890804291}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2025.3640880","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3640880","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1340246870","display_name":null,"funder_award_id":"BK20251911","funder_id":"https://openalex.org/F4320322769","funder_display_name":"Natural Science Foundation of Jiangsu Province"},{"id":"https://openalex.org/G6363995450","display_name":null,"funder_award_id":"2025T180438","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G8833945948","display_name":null,"funder_award_id":"62206238","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321543","display_name":"China Postdoctoral Science Foundation","ror":"https://ror.org/0426zh255"},{"id":"https://openalex.org/F4320322769","display_name":"Natural Science Foundation of Jiangsu Province","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W1489950266","https://openalex.org/W1979712197","https://openalex.org/W2129018774","https://openalex.org/W2138621090","https://openalex.org/W2807363941","https://openalex.org/W2934843808","https://openalex.org/W2963785020","https://openalex.org/W2979557588","https://openalex.org/W2981952041","https://openalex.org/W3034781633","https://openalex.org/W3035524453","https://openalex.org/W3168545914","https://openalex.org/W3171007011","https://openalex.org/W3177500196","https://openalex.org/W3189812816","https://openalex.org/W4285602429","https://openalex.org/W4312768002","https://openalex.org/W4367046771","https://openalex.org/W4382239683","https://openalex.org/W4385187298","https://openalex.org/W4386065388","https://openalex.org/W4386066154","https://openalex.org/W4390874616","https://openalex.org/W4393153538","https://openalex.org/W4400188454","https://openalex.org/W4402263866","https://openalex.org/W4402660115","https://openalex.org/W4402776103","https://openalex.org/W4402916465","https://openalex.org/W4404545729"],"related_works":[],"abstract_inverted_index":{"Self-supervised":[0],"learning":[1,28],"utilizes":[2],"unlabelled":[3],"data":[4,71],"to":[5,77,87,97,156,173,185,207],"train":[6],"encoders,":[7],"acquiring":[8],"high-quality":[9],"representations":[10],"of":[11,18,40,51,182,205],"input":[12],"data,":[13],"significantly":[14],"advancing":[15],"the":[16,41,48,52,141,162,180,201,216],"field":[17],"computer":[19],"vision.":[20],"However,":[21,102],"recent":[22],"studies":[23],"have":[24,110],"demonstrated":[25],"that":[26,109,160,196],"self-supervised":[27,78,84,132],"suffers":[29],"from":[30,140],"numerous":[31],"adversarial":[32],"attacks.":[33],"Among":[34],"them,":[35],"backdoor":[36,49,59,85,126,137,142,175],"attack":[37,202],"is":[38],"one":[39],"focal":[42],"issues,":[43,119],"where":[44],"downstream":[45],"classifiers":[46],"inherit":[47],"behavior":[50],"pre-trained":[53],"encoder.":[54,101,143],"Existing":[55],"defense":[56,81],"methods":[57,82],"against":[58,107],"attacks":[60],"primarily":[61],"focus":[62],"on":[63,69,91,152,191,215],"supervised":[64],"learning,":[65,133],"which":[66,134],"heavily":[67],"relies":[68],"labeled":[70],"and":[72,95,178],"cannot":[73],"be":[74],"directly":[75,139],"migrated":[76],"scenarios.":[79],"Furthermore,":[80],"for":[83,131],"aims":[86],"separate":[88],"poisoned":[89],"samples":[90],"assumed":[92],"small-scale":[93],"datasets":[94,194],"retraining":[96],"obtain":[98,158],"a":[99,114,123,147,169],"clean":[100,183],"these":[103,118],"approaches":[104],"are":[105],"useless":[106],"encoders":[108],"been":[111],"implanted":[112],"with":[113],"backdoor.":[115],"To":[116],"address":[117],"we":[120,145,167],"propose":[121],"SSLDefender,":[122],"novel":[124],"image-based":[125],"mitigation":[127],"method":[128,150],"specially":[129],"designed":[130],"can":[135,198],"remove":[136],"attributes":[138],"Specifically,":[144],"employ":[146],"trigger":[148,159],"recovery":[149],"based":[151],"mutual":[153],"information":[154],"maximization":[155],"efficiently":[157],"resembles":[161],"target":[163],"backdoor\u2019s":[164],"influence.":[165],"Additionally,":[166],"design":[168],"distillation-guided":[170],"unlearning":[171],"strategy":[172],"purify":[174],"features":[176],"steadily":[177],"ensure":[179],"retention":[181],"knowledge":[184],"prevent":[186],"overforgetting.":[187],"Extensive":[188],"experimental":[189],"evaluations":[190],"six":[192],"benchmark":[193],"demonstrate":[195],"SSLDefender":[197],"successfully":[199],"reduce":[200],"success":[203],"rate":[204],"Badencoder":[206],"around":[208],"2%":[209],"while":[210],"maintaining":[211],"high":[212],"model":[213],"accuracy":[214],"main":[217],"task.":[218],"Its":[219],"performance":[220],"surpasses":[221],"state-of-the-art":[222],"methods.":[223]},"counts_by_year":[],"updated_date":"2025-12-19T00:32:22.182498","created_date":"2025-12-05T00:00:00"}
