{"id":"https://openalex.org/W4415708117","doi":"https://doi.org/10.1109/icme59968.2025.11209199","title":"Poison in the Well: Feature Embedding Disruption in Backdoor Attacks","display_name":"Poison in the Well: Feature Embedding Disruption in Backdoor Attacks","publication_year":2025,"publication_date":"2025-06-30","ids":{"openalex":"https://openalex.org/W4415708117","doi":"https://doi.org/10.1109/icme59968.2025.11209199"},"language":null,"primary_location":{"id":"doi:10.1109/icme59968.2025.11209199","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icme59968.2025.11209199","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Multimedia and Expo (ICME)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064086456","display_name":"Feng Zhou","orcid":"https://orcid.org/0000-0002-2906-8127"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhou Feng","raw_affiliation_strings":["Zhejiang University,College of Computer Science and Technology,Hangzhou,China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University,College of Computer Science and Technology,Hangzhou,China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103325733","display_name":"Jiahao Chen","orcid":"https://orcid.org/0000-0002-5894-662X"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiahao Chen","raw_affiliation_strings":["Zhejiang University,College of Computer Science and Technology,Hangzhou,China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University,College of Computer Science and Technology,Hangzhou,China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016021356","display_name":"Chunyi Zhou","orcid":"https://orcid.org/0000-0003-0081-0946"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chunyi Zhou","raw_affiliation_strings":["Zhejiang University,College of Computer Science and Technology,Hangzhou,China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University,College of Computer Science and Technology,Hangzhou,China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072729601","display_name":"Yuwen Pu","orcid":"https://orcid.org/0000-0003-2311-4943"},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuwen Pu","raw_affiliation_strings":["Chongqing University,School of Big Data &#x0026; Software Engineering,China"],"affiliations":[{"raw_affiliation_string":"Chongqing University,School of Big Data &#x0026; Software Engineering,China","institution_ids":["https://openalex.org/I158842170"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101607289","display_name":"Qingming Li","orcid":"https://orcid.org/0000-0001-7410-4345"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingming Li","raw_affiliation_strings":["Zhejiang University,College of Computer Science and Technology,Hangzhou,China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University,College of Computer Science and Technology,Hangzhou,China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058611515","display_name":"Shouling Ji","orcid":"https://orcid.org/0000-0003-4268-372X"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shouling Ji","raw_affiliation_strings":["Zhejiang University,College of Computer Science and Technology,Hangzhou,China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University,College of Computer Science and Technology,Hangzhou,China","institution_ids":["https://openalex.org/I168879160"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5064086456"],"corresponding_institution_ids":["https://openalex.org/I168879160"],"apc_list":null,"apc_paid":null,"fwci":2.3568,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.91628907,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9757999777793884,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9757999777793884,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.0052999998442828655,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.00419999985024333,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.9968000054359436},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.7207000255584717},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.4997999966144562},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.4498000144958496},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4162999987602234},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.40149998664855957},{"id":"https://openalex.org/keywords/feature-vector","display_name":"Feature vector","score":0.375}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.9968000054359436},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.7207000255584717},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6800000071525574},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.4997999966144562},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49219998717308044},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4657000005245209},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.4498000144958496},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4162999987602234},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.40149998664855957},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.38449999690055847},{"id":"https://openalex.org/C83665646","wikidata":"https://www.wikidata.org/wiki/Q42139305","display_name":"Feature vector","level":2,"score":0.375},{"id":"https://openalex.org/C112972136","wikidata":"https://www.wikidata.org/wiki/Q7595718","display_name":"Stability (learning theory)","level":2,"score":0.37369999289512634},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.32019999623298645},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.313400000333786},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.3131999969482422},{"id":"https://openalex.org/C2777211547","wikidata":"https://www.wikidata.org/wiki/Q17141490","display_name":"Training (meteorology)","level":2,"score":0.26989999413490295},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.25679999589920044}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icme59968.2025.11209199","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icme59968.2025.11209199","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Multimedia and Expo (ICME)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321543","display_name":"China Postdoctoral Science Foundation","ror":"https://ror.org/0426zh255"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W2194775991","https://openalex.org/W2294710185","https://openalex.org/W2586702902","https://openalex.org/W2753783305","https://openalex.org/W2807363941","https://openalex.org/W2934843808","https://openalex.org/W2942091739","https://openalex.org/W2970335439","https://openalex.org/W2990270730","https://openalex.org/W4323655037","https://openalex.org/W4388867373","https://openalex.org/W4390871881"],"related_works":[],"abstract_inverted_index":{"Backdoor":[0],"attacks":[1,27],"embed":[2],"malicious":[3],"triggers":[4],"into":[5],"training":[6,35,77],"data,":[7,36],"enabling":[8],"attackers":[9],"to":[10,64,98,122,157],"manipulate":[11],"neural":[12,62],"network":[13],"behavior":[14],"during":[15],"inference":[16],"while":[17,108],"maintaining":[18,109],"high":[19,66],"accuracy":[20],"on":[21,34,76,176],"benign":[22],"inputs.":[23],"However,":[24],"existing":[25],"backdoor":[26,55,164],"face":[28],"limitations":[29],"manifesting":[30],"in":[31,45,132],"excessive":[32],"reliance":[33,75],"poor":[37],"stealth,":[38],"and":[39,68,80,111,135,144,147,167],"instability,":[40],"which":[41],"hinder":[42],"their":[43],"effectiveness":[44],"real-world":[46],"applications.":[47],"Therefore,":[48],"this":[49],"paper":[50],"introduces":[51],"ShadowPrint,":[52],"a":[53,94,160],"versatile":[54],"attack":[56,165],"that":[57,116],"targets":[58],"feature":[59,100,177],"embeddings":[60],"within":[61],"networks":[63],"achieve":[65],"ASRs":[67],"stealthiness.":[69],"Unlike":[70],"traditional":[71],"approaches,":[72],"ShadowPrint":[73,117],"reduces":[74],"data":[78],"access":[79],"operates":[81],"effectively":[82],"with":[83,148],"exceedingly":[84],"low":[85,89,136,154],"poison":[86,149],"rates":[87,150],"(as":[88],"as":[90,153,155],"0.01%).":[91],"It":[92],"leverages":[93],"clustering-based":[95],"optimization":[96],"strategy":[97],"align":[99],"embeddings,":[101],"ensuring":[102],"robust":[103],"performance":[104],"across":[105,141],"diverse":[106],"scenarios":[107],"stability":[110],"stealth.":[112],"Extensive":[113],"evaluations":[114],"demonstrate":[115],"achieves":[118],"superior":[119],"ASR":[120],"(up":[121],"100%),":[123],"steady":[124],"CA":[125],"(with":[126],"decay":[127],"no":[128],"more":[129],"than":[130],"1%":[131],"most":[133],"cases),":[134],"DDR":[137],"(averaging":[138],"below":[139],"5%)":[140],"both":[142],"clean-label":[143],"dirty-label":[145],"settings,":[146],"ranging":[151],"from":[152],"0.01%":[156],"0.05%,":[158],"setting":[159],"new":[161],"standard":[162],"for":[163,171],"capabilities":[166],"emphasizing":[168],"the":[169],"need":[170],"advanced":[172],"defense":[173],"strategies":[174],"focused":[175],"space":[178],"manipulations.":[179]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-30T00:00:00"}
