{"id":"https://openalex.org/W7127098314","doi":"https://doi.org/10.1109/trustcom66490.2025.00303","title":"Bad-PoseDiff: Pose-Guided Backdoor Triggering in Diffusion Models","display_name":"Bad-PoseDiff: Pose-Guided Backdoor Triggering in Diffusion Models","publication_year":2025,"publication_date":"2025-11-14","ids":{"openalex":"https://openalex.org/W7127098314","doi":"https://doi.org/10.1109/trustcom66490.2025.00303"},"language":null,"primary_location":{"id":"doi:10.1109/trustcom66490.2025.00303","is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom66490.2025.00303","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 24th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064591761","display_name":"JiaHao Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I135905480","display_name":"Shanghai Polytechnic University","ror":"https://ror.org/02as5yg64","country_code":"CN","type":"education","lineage":["https://openalex.org/I135905480"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiahao Chen","raw_affiliation_strings":["School of Computer and Information Engineering Shanghai Polytechnic University,Shanghai,China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information Engineering Shanghai Polytechnic University,Shanghai,China","institution_ids":["https://openalex.org/I135905480"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100689288","display_name":"Yu Pan","orcid":"https://orcid.org/0000-0002-5581-8657"},"institutions":[{"id":"https://openalex.org/I135905480","display_name":"Shanghai Polytechnic University","ror":"https://ror.org/02as5yg64","country_code":"CN","type":"education","lineage":["https://openalex.org/I135905480"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Pan","raw_affiliation_strings":["School of Computer and Information Engineering Shanghai Polytechnic University,Shanghai,China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information Engineering Shanghai Polytechnic University,Shanghai,China","institution_ids":["https://openalex.org/I135905480"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124802474","display_name":"Lin Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I135905480","display_name":"Shanghai Polytechnic University","ror":"https://ror.org/02as5yg64","country_code":"CN","type":"education","lineage":["https://openalex.org/I135905480"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lin Wang","raw_affiliation_strings":["School of Computer and Information Engineering Shanghai Polytechnic University,Shanghai,China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information Engineering Shanghai Polytechnic University,Shanghai,China","institution_ids":["https://openalex.org/I135905480"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043977606","display_name":"Yi Du","orcid":"https://orcid.org/0000-0002-0079-2541"},"institutions":[{"id":"https://openalex.org/I135905480","display_name":"Shanghai Polytechnic University","ror":"https://ror.org/02as5yg64","country_code":"CN","type":"education","lineage":["https://openalex.org/I135905480"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yi Du","raw_affiliation_strings":["School of Computer and Information Engineering Shanghai Polytechnic University,Shanghai,China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information Engineering Shanghai Polytechnic University,Shanghai,China","institution_ids":["https://openalex.org/I135905480"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5064591761"],"corresponding_institution_ids":["https://openalex.org/I135905480"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.72878505,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"2574","last_page":"2581"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.47690001130104065,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.47690001130104065,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.14810000360012054,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.0908999964594841,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.989300012588501},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.6840000152587891},{"id":"https://openalex.org/keywords/diffusion","display_name":"Diffusion","score":0.5230000019073486},{"id":"https://openalex.org/keywords/generative-model","display_name":"Generative model","score":0.4880000054836273},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.45730000734329224},{"id":"https://openalex.org/keywords/generative-grammar","display_name":"Generative grammar","score":0.4431000053882599}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.989300012588501},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.6840000152587891},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6703000068664551},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5371999740600586},{"id":"https://openalex.org/C69357855","wikidata":"https://www.wikidata.org/wiki/Q163214","display_name":"Diffusion","level":2,"score":0.5230000019073486},{"id":"https://openalex.org/C167966045","wikidata":"https://www.wikidata.org/wiki/Q5532625","display_name":"Generative model","level":3,"score":0.4880000054836273},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.45730000734329224},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.4431000053882599},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.37630000710487366},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.37290000915527344},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.30570000410079956},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.2919999957084656},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2721000015735626},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2694999873638153},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.26109999418258667},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.25}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/trustcom66490.2025.00303","is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom66490.2025.00303","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 24th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5836434960365295,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1861492603","https://openalex.org/W2133665775","https://openalex.org/W3042368254","https://openalex.org/W3083185154","https://openalex.org/W3155072588","https://openalex.org/W3198213150","https://openalex.org/W4285605725","https://openalex.org/W4312933868","https://openalex.org/W4382203549","https://openalex.org/W4386072042","https://openalex.org/W4386072220","https://openalex.org/W4390872151","https://openalex.org/W4390872325","https://openalex.org/W4390873752","https://openalex.org/W4393156382","https://openalex.org/W4393160691","https://openalex.org/W4402727699","https://openalex.org/W4403780662","https://openalex.org/W4403790152","https://openalex.org/W4404725244","https://openalex.org/W4409368583","https://openalex.org/W4413144602"],"related_works":[],"abstract_inverted_index":{"Diffusion":[0,80],"models":[1,110,149],"have":[2],"emerged":[3],"as":[4,53,89],"the":[5,32,36,117,126,132,139,160,173,180,183],"state-of-the-art":[6],"generative":[7,15,147],"paradigm":[8],"in":[9,31,49,86,101],"image":[10],"synthesis.":[11],"However,":[12],"their":[13],"powerful":[14],"and":[16,62,69,103,166],"representational":[17],"capabilities":[18],"also":[19],"make":[20],"them":[21],"highly":[22],"susceptible":[23],"to":[24,38,60,111,120,142,164,168],"backdoor":[25,71,174],"attacks,":[26],"where":[27],"specific":[28],"triggers":[29,43,145],"embedded":[30],"input":[33,87],"can":[34],"manipulate":[35],"model":[37,128,162],"produce":[39],"attacker-specified":[40],"outputs.":[41,211],"Traditional":[42],"typically":[44],"rely":[45],"on":[46],"explicit":[47],"perturbations":[48],"low-dimensional":[50],"space,":[51],"such":[52],"patch":[54],"overlays,":[55],"which":[56,82],"are":[57],"relatively":[58],"easy":[59],"detect":[61],"defend":[63],"against.":[64],"To":[65,131],"explore":[66],"more":[67],"covert":[68],"effective":[70],"injection":[72],"strategies,":[73],"we":[74],"propose":[75],"a":[76,95,198],"novel":[77],"method,":[78],"Bad-Pose":[79],"(Bad-PoseDiff),":[81],"uses":[83],"pose":[84,92,169],"features":[85],"images":[88],"triggers.":[90],"Since":[91],"information":[93],"is":[94,107,138,156],"high-dimensional":[96],"semantic":[97],"feature":[98],"that":[99,172,189],"manifests":[100],"diverse":[102],"non-fixed":[104],"patterns,":[105],"it":[106],"difficult":[108],"for":[109],"recognize":[112,165],"directly.":[113],"We":[114],"therefore":[115],"introduce":[116],"ControlNet":[118,155],"module":[119],"inject":[121],"pose-guided":[122],"conditioning":[123],"signals":[124],"into":[125,146,179],"diffusion":[127,148,184],"during":[129,158],"training.":[130],"best":[133],"of":[134,182],"our":[135],"knowledge,":[136],"this":[137],"first":[140],"work":[141],"incorporate":[143],"pose-based":[144],"via":[150],"ControlNet.":[151],"Notably,":[152],"even":[153],"when":[154],"detached":[157],"inference,":[159],"backdoored":[161],"continues":[163],"respond":[167],"triggers,":[170],"indicating":[171],"has":[175],"been":[176],"deeply":[177],"implanted":[178],"backbone":[181],"model.":[185],"Experimental":[186],"results":[187],"show":[188],"Bad-PoseDiff":[190],"effectively":[191],"evades":[192],"all":[193,205],"existing":[194],"defense":[195],"mechanisms,":[196],"achieving":[197],"0%":[199],"Backdoor":[200],"Detection":[201],"Rate":[202],"(BDR)":[203],"across":[204],"evaluated":[206],"frameworks,":[207],"while":[208],"preserving":[209],"high-quality":[210]},"counts_by_year":[],"updated_date":"2026-02-06T02:01:19.302388","created_date":"2026-02-03T00:00:00"}
