{"id":"https://openalex.org/W4408721961","doi":"https://doi.org/10.1142/s1793962325500369","title":"Erasing backdoor of deep neural networks using neural perturbation-based attention distillation","display_name":"Erasing backdoor of deep neural networks using neural perturbation-based attention distillation","publication_year":2025,"publication_date":"2025-03-22","ids":{"openalex":"https://openalex.org/W4408721961","doi":"https://doi.org/10.1142/s1793962325500369"},"language":"en","primary_location":{"id":"doi:10.1142/s1793962325500369","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s1793962325500369","pdf_url":null,"source":{"id":"https://openalex.org/S107361000","display_name":"Advances in Complex Systems","issn_l":"0219-5259","issn":["0219-5259","1793-6802","1793-9615","1793-9623"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Modeling, Simulation, and Scientific Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Jiaxing Chen","orcid":"https://orcid.org/0009-0001-6188-0115"},"institutions":[{"id":"https://openalex.org/I38877650","display_name":"Zhengzhou University","ror":"https://ror.org/04ypx8c21","country_code":"CN","type":"education","lineage":["https://openalex.org/I38877650"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiaxing Chen","raw_affiliation_strings":["College of Cyberspace Security, Zhengzhou University, Zhengzhou, P. R. China"],"affiliations":[{"raw_affiliation_string":"College of Cyberspace Security, Zhengzhou University, Zhengzhou, P. R. China","institution_ids":["https://openalex.org/I38877650"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Han Yan","orcid":"https://orcid.org/0009-0008-9715-2890"},"institutions":[{"id":"https://openalex.org/I4210152501","display_name":"China Power Engineering Consulting Group (China)","ror":"https://ror.org/04t59qd02","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210152501"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Han Yan","raw_affiliation_strings":["Power China Hubei Electric Engineering CO. LTD, Wuhan, P. R. China"],"affiliations":[{"raw_affiliation_string":"Power China Hubei Electric Engineering CO. LTD, Wuhan, P. R. China","institution_ids":["https://openalex.org/I4210152501"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051934365","display_name":"Bo Liu","orcid":"https://orcid.org/0000-0002-8908-0777"},"institutions":[{"id":"https://openalex.org/I38877650","display_name":"Zhengzhou University","ror":"https://ror.org/04ypx8c21","country_code":"CN","type":"education","lineage":["https://openalex.org/I38877650"]},{"id":"https://openalex.org/I4210138186","display_name":"Wuhan National Laboratory for Optoelectronics","ror":"https://ror.org/03c9ncn37","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210138186"]},{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bo Liu","raw_affiliation_strings":["School of Computer and Artificial Intelligence, College of Cyberspace Security, Zhengzhou University, Zhengzhou, P. R. China","Wuhan National Laboratory for Optoelectronics, Huazhong University of Science and Technology, Wuhan, P. R. China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Artificial Intelligence, College of Cyberspace Security, Zhengzhou University, Zhengzhou, P. R. China","institution_ids":["https://openalex.org/I38877650"]},{"raw_affiliation_string":"Wuhan National Laboratory for Optoelectronics, Huazhong University of Science and Technology, Wuhan, P. R. China","institution_ids":["https://openalex.org/I4210138186","https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Shaofeng Zhao","orcid":"https://orcid.org/0009-0005-2712-4753"},"institutions":[{"id":"https://openalex.org/I7726996","display_name":"Henan University of Economic and Law","ror":"https://ror.org/000jtc944","country_code":"CN","type":"education","lineage":["https://openalex.org/I7726996"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shaofeng Zhao","raw_affiliation_strings":["Henan University of Economics and Law, Zhengzhou, P. R. China"],"affiliations":[{"raw_affiliation_string":"Henan University of Economics and Law, Zhengzhou, P. R. China","institution_ids":["https://openalex.org/I7726996"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Xiang Chen","orcid":"https://orcid.org/0009-0008-2009-7803"},"institutions":[{"id":"https://openalex.org/I38877650","display_name":"Zhengzhou University","ror":"https://ror.org/04ypx8c21","country_code":"CN","type":"education","lineage":["https://openalex.org/I38877650"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiang Chen","raw_affiliation_strings":["College of Cyberspace Security, Zhengzhou University, Zhengzhou, P. R. China"],"affiliations":[{"raw_affiliation_string":"College of Cyberspace Security, Zhengzhou University, Zhengzhou, P. R. China","institution_ids":["https://openalex.org/I38877650"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034346065","display_name":"Zhanbo Li","orcid":"https://orcid.org/0009-0002-3899-5245"},"institutions":[{"id":"https://openalex.org/I38877650","display_name":"Zhengzhou University","ror":"https://ror.org/04ypx8c21","country_code":"CN","type":"education","lineage":["https://openalex.org/I38877650"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhanbo Li","raw_affiliation_strings":["College of Cyberspace Security, Zhengzhou University, Zhengzhou, P. R. China"],"affiliations":[{"raw_affiliation_string":"College of Cyberspace Security, Zhengzhou University, Zhengzhou, P. R. China","institution_ids":["https://openalex.org/I38877650"]}]},{"author_position":"last","author":{"id":null,"display_name":"Hui Xu","orcid":"https://orcid.org/0000-0002-5526-2986"},"institutions":[{"id":"https://openalex.org/I4210100200","display_name":"China Internet Network Information Center","ror":"https://ror.org/011t9p927","country_code":"CN","type":"nonprofit","lineage":["https://openalex.org/I4210100200","https://openalex.org/I890469752"]},{"id":"https://openalex.org/I4210130112","display_name":"China Academy of Information and Communications Technology","ror":"https://ror.org/038dte259","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210130112","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Xu","raw_affiliation_strings":["China Academy of Industrial Internet, Beijing, P. R. China"],"affiliations":[{"raw_affiliation_string":"China Academy of Industrial Internet, Beijing, P. R. China","institution_ids":["https://openalex.org/I4210100200","https://openalex.org/I4210130112"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I38877650"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0234119,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"16","issue":"02","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10320","display_name":"Neural Networks and Applications","score":0.6220999956130981,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10320","display_name":"Neural Networks and Applications","score":0.6220999956130981,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.8875595331192017},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.7805535197257996},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.49820733070373535},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4838096499443054},{"id":"https://openalex.org/keywords/neural-system","display_name":"Neural system","score":0.4383634626865387},{"id":"https://openalex.org/keywords/deep-neural-networks","display_name":"Deep neural networks","score":0.42449355125427246},{"id":"https://openalex.org/keywords/perturbation","display_name":"Perturbation (astronomy)","score":0.4244224727153778},{"id":"https://openalex.org/keywords/biological-system","display_name":"Biological system","score":0.36519908905029297},{"id":"https://openalex.org/keywords/neuroscience","display_name":"Neuroscience","score":0.3616650402545929},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.34032225608825684},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.19434061646461487},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.1868341863155365},{"id":"https://openalex.org/keywords/biology","display_name":"Biology","score":0.17739537358283997},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.06486901640892029}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.8875595331192017},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.7805535197257996},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.49820733070373535},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4838096499443054},{"id":"https://openalex.org/C2986949344","wikidata":"https://www.wikidata.org/wiki/Q9404","display_name":"Neural system","level":2,"score":0.4383634626865387},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.42449355125427246},{"id":"https://openalex.org/C177918212","wikidata":"https://www.wikidata.org/wiki/Q803623","display_name":"Perturbation (astronomy)","level":2,"score":0.4244224727153778},{"id":"https://openalex.org/C186060115","wikidata":"https://www.wikidata.org/wiki/Q30336093","display_name":"Biological system","level":1,"score":0.36519908905029297},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.3616650402545929},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.34032225608825684},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.19434061646461487},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.1868341863155365},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.17739537358283997},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.06486901640892029},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s1793962325500369","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s1793962325500369","pdf_url":null,"source":{"id":"https://openalex.org/S107361000","display_name":"Advances in Complex Systems","issn_l":"0219-5259","issn":["0219-5259","1793-6802","1793-9615","1793-9623"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Modeling, Simulation, and Scientific Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6899999976158142,"id":"https://metadata.un.org/sdg/13","display_name":"Climate action"}],"awards":[{"id":"https://openalex.org/G5725872831","display_name":null,"funder_award_id":"62402451","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W2753783305","https://openalex.org/W2807363941","https://openalex.org/W2942091739","https://openalex.org/W2970335439","https://openalex.org/W2996800219","https://openalex.org/W3107337211","https://openalex.org/W3114838227","https://openalex.org/W4214564822","https://openalex.org/W4214680449","https://openalex.org/W4214883719","https://openalex.org/W4285601739","https://openalex.org/W4327519267","https://openalex.org/W4386920545","https://openalex.org/W4387682186","https://openalex.org/W4391697066","https://openalex.org/W4393158745"],"related_works":["https://openalex.org/W4320031223","https://openalex.org/W4200629851","https://openalex.org/W4281902577","https://openalex.org/W4309417370","https://openalex.org/W4292107232","https://openalex.org/W3009072493","https://openalex.org/W4386080799","https://openalex.org/W3140988292","https://openalex.org/W4317672133","https://openalex.org/W4386185023"],"abstract_inverted_index":{"In":[0],"the":[1,6,17,33,41,77,87,91,100,110,114,117,133,151,175,190,197,201,210],"realm":[2],"of":[3,8,20,35,79,116,169,177,189,205,225],"safety-critical":[4],"domains,":[5],"security":[7],"Deep":[9],"Neural":[10,70,183],"Networks":[11],"(DNNs)":[12],"is":[13,107],"constantly":[14],"challenged":[15],"by":[16,44,99,194,220],"insidious":[18],"threat":[19],"backdoor":[21,92,126,178,207,218],"attacks.":[22,208],"These":[23],"attacks,":[24,179],"which":[25],"manipulate":[26],"model":[27],"outputs":[28],"through":[29],"malicious":[30],"triggers,":[31],"impede":[32],"development":[34],"DNNs":[36,57],"in":[37,173,196,235],"mission-critical":[38],"applications.":[39],"Despite":[40],"progress":[42],"made":[43],"existing":[45,170],"defense":[46,130,192],"mechanisms,":[47],"it":[48],"remains":[49],"unclear":[50],"how":[51],"to":[52,94,144],"remove":[53],"backdoor-related":[54],"neurons":[55,93],"from":[56],"effectively.":[58],"To":[59],"address":[60],"this":[61],"challenge,":[62],"we":[63,137],"propose":[64],"a":[65,139,167,222],"novel":[66],"eraser-based":[67],"framework":[68],"called":[69],"Perturbation-based":[71],"Attention":[72,184],"Distillation":[73,185],"(NPAD).":[74],"NPAD":[75,164,181,215],"utilizes":[76],"ideas":[78],"neural":[80,83],"perturbation":[81],"and":[82,128],"attention":[84,105,141],"distillation.":[85],"Initially,":[86],"teacher":[88,119],"network":[89,112,154],"perturbs":[90],"reveal":[95],"their":[96],"presence,":[97],"followed":[98],"targeted":[101],"pruning":[102],"operations.":[103],"Subsequently,":[104],"distillation":[106],"performed":[108],"on":[109,200,237],"student":[111,153],"under":[113],"guidance":[115],"adapted":[118],"network,":[120],"thus":[121],"maintaining":[122],"its":[123],"resilience":[124],"against":[125],"attacks":[127],"enhancing":[129],"performance.":[131],"During":[132],"knowledge":[134],"transfer":[135],"process,":[136],"introduce":[138],"weighted":[140],"alignment":[142],"mechanism":[143],"accelerate":[145],"convergence":[146],"during":[147],"training,":[148],"thereby":[149],"achieving":[150],"resultant":[152],"with":[155],"heightened":[156],"robustness.":[157],"The":[158],"experimental":[159],"results":[160,211],"clearly":[161],"demonstrate":[162],"that":[163,214],"consistently":[165],"outperforms":[166,182],"variety":[168],"state-of-the-art":[171],"methods":[172],"mitigating":[174],"effects":[176],"where":[180],"(NAD)":[186],"(the":[187],"best":[188],"four":[191],"methods)":[193],"9.75%":[195],"average":[198],"reduction":[199],"attack":[202],"success":[203],"rate":[204],"10":[206],"Furthermore,":[209],"also":[212],"show":[213],"effectively":[216],"eliminates":[217],"triggers":[219],"utilizing":[221],"mere":[223],"1%":[224],"clean":[226,238],"training":[227],"data":[228],"while":[229],"simultaneously":[230],"preventing":[231],"any":[232],"significant":[233],"decline":[234],"performance":[236],"data.":[239]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
