{"id":"https://openalex.org/W4417170241","doi":"https://doi.org/10.1109/tpami.2025.3642161","title":"Versatile Backdoor Attack With Visible, Semantic, Sample-Specific and Compatible Triggers","display_name":"Versatile Backdoor Attack With Visible, Semantic, Sample-Specific and Compatible Triggers","publication_year":2025,"publication_date":"2025-12-09","ids":{"openalex":"https://openalex.org/W4417170241","doi":"https://doi.org/10.1109/tpami.2025.3642161","pmid":"https://pubmed.ncbi.nlm.nih.gov/41364567"},"language":"en","primary_location":{"id":"doi:10.1109/tpami.2025.3642161","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tpami.2025.3642161","pdf_url":null,"source":{"id":"https://openalex.org/S199944782","display_name":"IEEE Transactions on Pattern Analysis and Machine Intelligence","issn_l":"0162-8828","issn":["0162-8828","1939-3539","2160-9292"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Pattern Analysis and Machine Intelligence","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","pubmed"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062748081","display_name":"Ruotong Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210116924","display_name":"Chinese University of Hong Kong, Shenzhen","ror":"https://ror.org/02d5ks197","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633","https://openalex.org/I180726961","https://openalex.org/I4210116924"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ruotong Wang","raw_affiliation_strings":["Chinese University of Hong Kong, Shenzhen, China","Chinese University of Hong Kong, Shenzhen, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"Chinese University of Hong Kong, Shenzhen, China","institution_ids":["https://openalex.org/I4210116924"]},{"raw_affiliation_string":"Chinese University of Hong Kong, Shenzhen, Guangdong, China","institution_ids":["https://openalex.org/I4210116924"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002810045","display_name":"Hongrui Chen","orcid":"https://orcid.org/0009-0007-5997-3041"},"institutions":[{"id":"https://openalex.org/I4210116924","display_name":"Chinese University of Hong Kong, Shenzhen","ror":"https://ror.org/02d5ks197","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633","https://openalex.org/I180726961","https://openalex.org/I4210116924"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongrui Chen","raw_affiliation_strings":["Chinese University of Hong Kong, Shenzhen, China","Chinese University of Hong Kong, Shenzhen, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"Chinese University of Hong Kong, Shenzhen, China","institution_ids":["https://openalex.org/I4210116924"]},{"raw_affiliation_string":"Chinese University of Hong Kong, Shenzhen, Guangdong, China","institution_ids":["https://openalex.org/I4210116924"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101190196","display_name":"Zihao Zhu","orcid":"https://orcid.org/0000-0002-1225-1718"},"institutions":[{"id":"https://openalex.org/I4210116924","display_name":"Chinese University of Hong Kong, Shenzhen","ror":"https://ror.org/02d5ks197","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633","https://openalex.org/I180726961","https://openalex.org/I4210116924"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zihao Zhu","raw_affiliation_strings":["Chinese University of Hong Kong, Shenzhen, China","Chinese University of Hong Kong, Shenzhen, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"Chinese University of Hong Kong, Shenzhen, China","institution_ids":["https://openalex.org/I4210116924"]},{"raw_affiliation_string":"Chinese University of Hong Kong, Shenzhen, Guangdong, China","institution_ids":["https://openalex.org/I4210116924"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Li Liu","orcid":"https://orcid.org/0000-0002-4497-0135"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Li Liu","raw_affiliation_strings":["Hong Kong University of Science and Technology (Guangzhou), Guangzhou, China","Hong Kong University of Science and Technology (Guangzhou), China"],"affiliations":[{"raw_affiliation_string":"Hong Kong University of Science and Technology (Guangzhou), Guangzhou, China","institution_ids":[]},{"raw_affiliation_string":"Hong Kong University of Science and Technology (Guangzhou), China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111337701","display_name":"Baoyuan Wu","orcid":"https://orcid.org/0000-0003-2183-5990"},"institutions":[{"id":"https://openalex.org/I4210116924","display_name":"Chinese University of Hong Kong, Shenzhen","ror":"https://ror.org/02d5ks197","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633","https://openalex.org/I180726961","https://openalex.org/I4210116924"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Baoyuan Wu","raw_affiliation_strings":["Chinese University of Hong Kong, Shenzhen, China","Chinese University of Hong Kong, Shenzhen, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"Chinese University of Hong Kong, Shenzhen, China","institution_ids":["https://openalex.org/I4210116924"]},{"raw_affiliation_string":"Chinese University of Hong Kong, Shenzhen, Guangdong, China","institution_ids":["https://openalex.org/I4210116924"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5062748081"],"corresponding_institution_ids":["https://openalex.org/I4210116924"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.20578756,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"48","issue":"3","first_page":"3680","last_page":"3697"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9039999842643738,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9039999842643738,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.03629999980330467,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.016599999740719795,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.9699000120162964},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.7218999862670898},{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.5979999899864197},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.33320000767707825},{"id":"https://openalex.org/keywords/heuristic","display_name":"Heuristic","score":0.3181999921798706},{"id":"https://openalex.org/keywords/deep-neural-networks","display_name":"Deep neural networks","score":0.29510000348091125}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.9699000120162964},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8357999920845032},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.7218999862670898},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.620199978351593},{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.5979999899864197},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5236999988555908},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.33320000767707825},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.3181999921798706},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.29510000348091125},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.27630001306533813},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2759999930858612},{"id":"https://openalex.org/C127705205","wikidata":"https://www.wikidata.org/wiki/Q5748245","display_name":"Heuristics","level":2,"score":0.2703000009059906},{"id":"https://openalex.org/C2777548347","wikidata":"https://www.wikidata.org/wiki/Q5456937","display_name":"Flagging","level":2,"score":0.2676999866962433},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.2556000053882599}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tpami.2025.3642161","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tpami.2025.3642161","pdf_url":null,"source":{"id":"https://openalex.org/S199944782","display_name":"IEEE Transactions on Pattern Analysis and Machine Intelligence","issn_l":"0162-8828","issn":["0162-8828","1939-3539","2160-9292"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Pattern Analysis and Machine Intelligence","raw_type":"journal-article"},{"id":"pmid:41364567","is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/41364567","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE transactions on pattern analysis and machine intelligence","raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4221860282","display_name":null,"funder_award_id":"62471420","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5191358174","display_name":null,"funder_award_id":"2025A1515012296","funder_id":"https://openalex.org/F4320337111","funder_display_name":"Basic and Applied Basic Research Foundation of Guangdong Province"},{"id":"https://openalex.org/G6479059842","display_name":null,"funder_award_id":"2024B1515020095","funder_id":"https://openalex.org/F4320337111","funder_display_name":"Basic and Applied Basic Research Foundation of Guangdong Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320337111","display_name":"Basic and Applied Basic Research Foundation of Guangdong Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W639708223","https://openalex.org/W2031489346","https://openalex.org/W2048335335","https://openalex.org/W2108598243","https://openalex.org/W2194775991","https://openalex.org/W2531634031","https://openalex.org/W2753783305","https://openalex.org/W2807363941","https://openalex.org/W2890952074","https://openalex.org/W2934843808","https://openalex.org/W2942091739","https://openalex.org/W2962858109","https://openalex.org/W2970335439","https://openalex.org/W2971661634","https://openalex.org/W2990270730","https://openalex.org/W3037511928","https://openalex.org/W3083185154","https://openalex.org/W3087056823","https://openalex.org/W3087124270","https://openalex.org/W3106646114","https://openalex.org/W3119570222","https://openalex.org/W3175215793","https://openalex.org/W4214537185","https://openalex.org/W4214680449","https://openalex.org/W4292347911","https://openalex.org/W4304091855","https://openalex.org/W4307964213","https://openalex.org/W4312329299","https://openalex.org/W4313192591","https://openalex.org/W4320736757","https://openalex.org/W4372260097","https://openalex.org/W4386076215","https://openalex.org/W4386076532","https://openalex.org/W4386083011","https://openalex.org/W4388726687","https://openalex.org/W4389747908","https://openalex.org/W4390120069","https://openalex.org/W4390873054","https://openalex.org/W4391678082","https://openalex.org/W4396982204","https://openalex.org/W4402716223","https://openalex.org/W4407744573","https://openalex.org/W4410125919","https://openalex.org/W4414271590","https://openalex.org/W4415796637","https://openalex.org/W7103749039"],"related_works":[],"abstract_inverted_index":{"Deep":[0],"neural":[1],"networks":[2],"(DNNs)":[3],"can":[4,107,192],"be":[5,109],"manipulated":[6],"to":[7,13,59,66,69,99,153,230],"exhibit":[8],"specific":[9,14],"behaviors":[10],"when":[11],"exposed":[12],"trigger":[15,89,133,146,239],"patterns,":[16],"without":[17],"affecting":[18],"their":[19,67],"performance":[20],"on":[21,247],"benign":[22],"samples,":[23],"dubbed":[24],"backdoor":[25,29,218,253],"attack.":[26],"Currently,":[27],"implementing":[28],"attacks":[30,39,58,219],"in":[31,49,77,112,205,252],"physical":[32,60,114,207,217],"scenarios":[33,61],"still":[34],"faces":[35,62],"significant":[36],"challenges.":[37],"Physical":[38],"are":[40,47],"labor-intensive":[41,222],"and":[42,44,52,72,95,103,159,168,179,185,227,240],"time-consuming,":[43],"the":[45,73,78,91,113,121,166,182,188,206,211,236],"triggers":[46,140,156,172,251],"selected":[48],"a":[50,87,132,145,160,221,225],"manual":[51],"heuristic":[53],"way.":[54],"Moreover,":[55],"expanding":[56],"digital":[57],"many":[63],"challenges":[64],"due":[65],"sensitivity":[68],"visual":[70,198],"distortions":[71,199],"absence":[74],"of":[75,171,187],"counterparts":[76],"real":[79],"world.":[80],"To":[81,119],"address":[82],"these":[83],"challenges,":[84],"we":[85,124],"define":[86],"novel":[88],"called":[90],"Visible,":[92],"Semantic,":[93],"Sample-specific,":[94],"Compatible":[96],"(VSSC)":[97],"trigger,":[98,123],"achieve":[100],"effective,":[101],"stealthy":[102],"robust":[104],"simultaneously,":[105],"which":[106],"also":[108,201],"effectively":[110],"deployed":[111],"scenario":[115],"using":[116],"corresponding":[117],"objects.":[118],"implement":[120],"VSSC":[122,189,215,238],"propose":[125],"an":[126],"automated":[127,213],"pipeline":[128],"comprising":[129],"three":[130],"modules:":[131],"selection":[134],"module":[135,148,163],"that":[136,149,164],"systematically":[137],"identifies":[138],"suitable":[139],"leveraging":[141],"large":[142],"language":[143],"models,":[144],"insertion":[147,170],"employs":[150],"generative":[151],"models":[152],"seamlessly":[154],"integrate":[155],"into":[157,224],"images,":[158],"quality":[161],"assessment":[162],"ensures":[165],"natural":[167],"successful":[169],"through":[173],"vision-language":[174],"models.":[175],"Extensive":[176],"experimental":[177],"results":[178],"analysis":[180],"validate":[181],"effectiveness,":[183],"stealthiness,":[184],"robustness":[186,196],"trigger.":[190],"It":[191],"not":[193],"only":[194],"maintain":[195],"under":[197],"but":[200],"demonstrates":[202],"strong":[203],"practicality":[204],"scenario.":[208],"By":[209],"providing":[210],"first":[212],"pipeline,":[214],"transforms":[216],"from":[220],"craft":[223],"systematic":[226],"realistic":[228],"threat":[229],"real-world":[231],"AI":[232],"systems.":[233],"We":[234],"hope":[235],"proposed":[237],"implementation":[241],"approach":[242],"could":[243],"inspire":[244],"future":[245],"studies":[246],"designing":[248],"more":[249],"practical":[250],"attacks.":[254]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-12-09T00:00:00"}
