{"id":"https://openalex.org/W4383221538","doi":"https://doi.org/10.1145/3579856.3582829","title":"CASSOCK: Viable Backdoor Attacks against DNN in the Wall of Source-Specific Backdoor Defenses","display_name":"CASSOCK: Viable Backdoor Attacks against DNN in the Wall of Source-Specific Backdoor Defenses","publication_year":2023,"publication_date":"2023-07-05","ids":{"openalex":"https://openalex.org/W4383221538","doi":"https://doi.org/10.1145/3579856.3582829"},"language":"en","primary_location":{"id":"doi:10.1145/3579856.3582829","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3579856.3582829","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102805627","display_name":"Shang Wang","orcid":"https://orcid.org/0000-0002-5114-4659"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shang Wang","raw_affiliation_strings":["School of Computer Science and Engineering, Nanjing University of Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Nanjing University of Science and Technology, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067969908","display_name":"Yansong Gao","orcid":"https://orcid.org/0000-0001-6029-5064"},"institutions":[{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"government","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]},{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]}],"countries":["AU","CN"],"is_corresponding":false,"raw_author_name":"Yansong Gao","raw_affiliation_strings":["School of Computer Science and Engineering, Nanjing University of Science and Technology, China and Data61, CSIRO, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Nanjing University of Science and Technology, China and Data61, CSIRO, Australia","institution_ids":["https://openalex.org/I36399199","https://openalex.org/I1292875679","https://openalex.org/I42894916"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048592388","display_name":"Anmin Fu","orcid":"https://orcid.org/0000-0002-1632-5737"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Anmin Fu","raw_affiliation_strings":["School of Computer Science and Engineering, Nanjing University of Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Nanjing University of Science and Technology, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100410710","display_name":"Zhi Zhang","orcid":"https://orcid.org/0000-0003-3604-5369"},"institutions":[{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"government","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I177877127","display_name":"The University of Western Australia","ror":"https://ror.org/047272k79","country_code":"AU","type":"education","lineage":["https://openalex.org/I177877127"]},{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Zhi Zhang","raw_affiliation_strings":["Data61, CSIRO, Australia and University of Western Australia, Australia"],"affiliations":[{"raw_affiliation_string":"Data61, CSIRO, Australia and University of Western Australia, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I177877127","https://openalex.org/I1292875679"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100401884","display_name":"Yuqing Zhang","orcid":"https://orcid.org/0000-0001-8306-7195"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuqing Zhang","raw_affiliation_strings":["University of Chinese Academy of Sciences, China"],"affiliations":[{"raw_affiliation_string":"University of Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054741725","display_name":"Willy Susilo","orcid":"https://orcid.org/0000-0002-1562-5105"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Willy Susilo","raw_affiliation_strings":["School of Computing and Information Technology, University of Wollongong, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing and Information Technology, University of Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004490190","display_name":"Dongxi Liu","orcid":"https://orcid.org/0000-0002-0221-2571"},"institutions":[{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"government","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Dongxi Liu","raw_affiliation_strings":["Data61, CSIRO, Australia"],"affiliations":[{"raw_affiliation_string":"Data61, CSIRO, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5102805627"],"corresponding_institution_ids":["https://openalex.org/I36399199"],"apc_list":null,"apc_paid":null,"fwci":2.2575,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.90279337,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"938","last_page":"950"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11307","display_name":"Domain Adaptation and Few-Shot Learning","score":0.98089998960495,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9786999821662903,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.9960544109344482},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5323484539985657},{"id":"https://openalex.org/keywords/deep-neural-networks","display_name":"Deep neural networks","score":0.4791261851787567},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.35722365975379944},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.31283581256866455},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.30707448720932007}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.9960544109344482},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5323484539985657},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.4791261851787567},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.35722365975379944},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.31283581256866455},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30707448720932007}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1145/3579856.3582829","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3579856.3582829","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.atira.dk:publications/db57e3b6-a198-43c2-9cb8-b6aead228484","is_oa":false,"landing_page_url":"https://research-repository.uwa.edu.au/en/publications/db57e3b6-a198-43c2-9cb8-b6aead228484","pdf_url":null,"source":{"id":"https://openalex.org/S4306402492","display_name":"UWA Profiles and Research Repository (UWA)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I177877127","host_organization_name":"The University of Western Australia","host_organization_lineage":["https://openalex.org/I177877127"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Wang, S, Gao, Y, Fu, A, Zhang, Z, Zhang, Y, Susilo, W & Liu, D 2023, CASSOCK : Viable Backdoor Attacks against DNN in the Wall of Source-Specific Backdoor Defenses. in ASIA CCS 2023 - Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security. Proceedings of the ACM Conference on Computer and Communications Security, Association for Computing Machinery (ACM), New York, USA, pp. 938-950, 18th ACM ASIA Conference on Computer and Communications Security, ASIA CCS 2023, Melbourne, Australia, 10/07/23. https://doi.org/10.1145/3579856.3582829","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:ro.uow.edu.au:test2021-14787","is_oa":false,"landing_page_url":"https://ro.uow.edu.au/test2021/9240","pdf_url":null,"source":{"id":"https://openalex.org/S4306400510","display_name":"Research Online (University of Wollongong)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I204824540","host_organization_name":"University of Wollongong","host_organization_lineage":["https://openalex.org/I204824540"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Scopus Harvesting Series","raw_type":"text"},{"id":"pmh:oai:figshare.com:article/27807711","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},{"id":"pmh:oai:pure.atira.dk:publications/db57e3b6-a198-43c2-9cb8-b6aead228484","is_oa":false,"landing_page_url":"http://www.scopus.com/inward/record.url?scp=85168141788&partnerID=8YFLogxK","pdf_url":null,"source":{"id":"https://openalex.org/S4306402523","display_name":"UWA Profiles and Research Repository (University of Western Australia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I177877127","host_organization_name":"The University of Western Australia","host_organization_lineage":["https://openalex.org/I177877127"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Wang , S , Gao , Y , Fu , A , Zhang , Z , Zhang , Y , Susilo , W &amp; Liu , D 2023 , CASSOCK : Viable Backdoor Attacks against DNN in the Wall of Source-Specific Backdoor Defenses . in ASIA CCS 2023 - Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security . Proceedings of the ACM Conference on Computer and Communications Security , Association for Computing Machinery (ACM) , New York, USA , pp. 938-950 , 18th ACM ASIA Conference on Computer and Communications Security, ASIA CCS 2023 , Melbourne , Australia , 10/07/23 . https://doi.org/10.1145/3579856.3582829","raw_type":"contributionToPeriodical"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/27807711","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5099999904632568,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G1467083738","display_name":null,"funder_award_id":"62072239, 62002167","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6237539322","display_name":null,"funder_award_id":"BK20211192, BK20200461","funder_id":"https://openalex.org/F4320322769","funder_display_name":"Natural Science Foundation of Jiangsu Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322769","display_name":"Natural Science Foundation of Jiangsu Province","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W2067713319","https://openalex.org/W2112796928","https://openalex.org/W2187250581","https://openalex.org/W2194775991","https://openalex.org/W2325939864","https://openalex.org/W2350778671","https://openalex.org/W2604334841","https://openalex.org/W2738588019","https://openalex.org/W2796004214","https://openalex.org/W2807363941","https://openalex.org/W2887280559","https://openalex.org/W2897865027","https://openalex.org/W2898759955","https://openalex.org/W2912568927","https://openalex.org/W2934843808","https://openalex.org/W2962858109","https://openalex.org/W2971661634","https://openalex.org/W2986013765","https://openalex.org/W2996800219","https://openalex.org/W3041133507","https://openalex.org/W3047335002","https://openalex.org/W3112001526","https://openalex.org/W3114686421","https://openalex.org/W3128663834","https://openalex.org/W3171726921","https://openalex.org/W3175215793","https://openalex.org/W3211600423","https://openalex.org/W4214564822","https://openalex.org/W4243665163","https://openalex.org/W4247924304","https://openalex.org/W4255556797","https://openalex.org/W4256361765","https://openalex.org/W4281388447","https://openalex.org/W4285233920","https://openalex.org/W4298140072","https://openalex.org/W4353004773","https://openalex.org/W6756333562"],"related_works":["https://openalex.org/W4320031223","https://openalex.org/W4200629851","https://openalex.org/W4281902577","https://openalex.org/W4309417370","https://openalex.org/W4292107232","https://openalex.org/W3009072493","https://openalex.org/W4386080799","https://openalex.org/W3140988292","https://openalex.org/W4317672133","https://openalex.org/W4401407399"],"abstract_inverted_index":{"As":[0],"a":[1,63],"critical":[2],"threat":[3],"to":[4,28],"deep":[5],"neural":[6],"networks":[7],"(DNNs),":[8],"backdoor":[9,19,24],"attacks":[10,20,25],"can":[11,60,78],"be":[12,79],"categorized":[13],"into":[14],"two":[15,55],"types,":[16],"i.e.,":[17],"source-agnostic":[18],"(SABAs)":[21],"and":[22,71],"source-specific":[23],"(SSBAs).":[26],"Compared":[27],"traditional":[29],"SABAs,":[30],"SSBAs":[31,52],"are":[32,46],"more":[33],"advanced":[34],"in":[35,41],"that":[36,45],"they":[37,59,77],"have":[38],"superior":[39],"stealthier":[40],"bypassing":[42],"mainstream":[43],"countermeasures":[44,86],"effective":[47],"against":[48],"SABAs.":[49],"Nonetheless,":[50],"existing":[51],"suffer":[53],"from":[54],"major":[56],"limitations.":[57],"First,":[58],"hardly":[61],"achieve":[62],"good":[64],"trade-off":[65],"between":[66],"ASR":[67],"(attack":[68],"success":[69],"rate)":[70],"FPR":[72],"(false":[73],"positive":[74],"rate).":[75],"Besides,":[76],"effectively":[80],"detected":[81],"by":[82],"the":[83],"state-of-the-art":[84],"(SOTA)":[85],"(e.g.,":[87],"SCAn":[88],"[40]).":[89]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":2}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
