{"id":"https://openalex.org/W4387841611","doi":"https://doi.org/10.1145/3583780.3614784","title":"Attacking Neural Networks with Neural Networks: Towards Deep Synchronization for Backdoor Attacks","display_name":"Attacking Neural Networks with Neural Networks: Towards Deep Synchronization for Backdoor Attacks","publication_year":2023,"publication_date":"2023-10-21","ids":{"openalex":"https://openalex.org/W4387841611","doi":"https://doi.org/10.1145/3583780.3614784"},"language":"en","primary_location":{"id":"doi:10.1145/3583780.3614784","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3583780.3614784","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 32nd ACM International Conference on Information and Knowledge Management","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067459053","display_name":"Zihan Guan","orcid":"https://orcid.org/0000-0002-0331-3403"},"institutions":[{"id":"https://openalex.org/I165733156","display_name":"University of Georgia","ror":"https://ror.org/00te3t702","country_code":"US","type":"education","lineage":["https://openalex.org/I165733156"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Zihan Guan","raw_affiliation_strings":["University of Georgia, Athens, GA, USA","University of Georgia Athens, Georgia, USA"],"affiliations":[{"raw_affiliation_string":"University of Georgia, Athens, GA, USA","institution_ids":["https://openalex.org/I165733156"]},{"raw_affiliation_string":"University of Georgia Athens, Georgia, USA","institution_ids":["https://openalex.org/I165733156"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015105117","display_name":"Lichao Sun","orcid":"https://orcid.org/0000-0003-1539-7939"},"institutions":[{"id":"https://openalex.org/I186143895","display_name":"Lehigh University","ror":"https://ror.org/012afjb06","country_code":"US","type":"education","lineage":["https://openalex.org/I186143895"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Lichao Sun","raw_affiliation_strings":["Lehigh University, Bethlehem, PA, USA","Lehigh University Bethlehem, Pennsylvania, USA"],"affiliations":[{"raw_affiliation_string":"Lehigh University, Bethlehem, PA, USA","institution_ids":["https://openalex.org/I186143895"]},{"raw_affiliation_string":"Lehigh University Bethlehem, Pennsylvania, USA","institution_ids":["https://openalex.org/I186143895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072191151","display_name":"Mengnan Du","orcid":"https://orcid.org/0000-0002-1614-6069"},"institutions":[{"id":"https://openalex.org/I118118575","display_name":"New Jersey Institute of Technology","ror":"https://ror.org/05e74xb87","country_code":"US","type":"education","lineage":["https://openalex.org/I118118575"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mengnan Du","raw_affiliation_strings":["New Jersey Institute of Technology, Newark, NJ, USA","New Jersey Institute of Technology Newark, New Jersey, USA"],"affiliations":[{"raw_affiliation_string":"New Jersey Institute of Technology, Newark, NJ, USA","institution_ids":["https://openalex.org/I118118575"]},{"raw_affiliation_string":"New Jersey Institute of Technology Newark, New Jersey, USA","institution_ids":["https://openalex.org/I118118575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007489034","display_name":"Ninghao Liu","orcid":"https://orcid.org/0000-0002-9170-2424"},"institutions":[{"id":"https://openalex.org/I165733156","display_name":"University of Georgia","ror":"https://ror.org/00te3t702","country_code":"US","type":"education","lineage":["https://openalex.org/I165733156"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ninghao Liu","raw_affiliation_strings":["University of Georgia, Athens, GA, USA","University of Georgia Athens, Georgia, USA"],"affiliations":[{"raw_affiliation_string":"University of Georgia, Athens, GA, USA","institution_ids":["https://openalex.org/I165733156"]},{"raw_affiliation_string":"University of Georgia Athens, Georgia, USA","institution_ids":["https://openalex.org/I165733156"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5067459053"],"corresponding_institution_ids":["https://openalex.org/I165733156"],"apc_list":null,"apc_paid":null,"fwci":0.8641,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.79335755,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"608","last_page":"618"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9778000116348267,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.9933552742004395},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.659358024597168},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5953728556632996},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5610365271568298},{"id":"https://openalex.org/keywords/synchronization","display_name":"Synchronization (alternating current)","score":0.4935418367385864},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4567185640335083},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4450393319129944},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3607678711414337},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.11726567149162292}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.9933552742004395},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.659358024597168},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5953728556632996},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5610365271568298},{"id":"https://openalex.org/C2778562939","wikidata":"https://www.wikidata.org/wiki/Q1298791","display_name":"Synchronization (alternating current)","level":3,"score":0.4935418367385864},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4567185640335083},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4450393319129944},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3607678711414337},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.11726567149162292},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3583780.3614784","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3583780.3614784","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 32nd ACM International Conference on Information and Knowledge Management","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6552817191","display_name":null,"funder_award_id":"2223768","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W1915485278","https://openalex.org/W2112796928","https://openalex.org/W2183341477","https://openalex.org/W2616247523","https://openalex.org/W2807363941","https://openalex.org/W2914712270","https://openalex.org/W2949650786","https://openalex.org/W2962835968","https://openalex.org/W2964137095","https://openalex.org/W2970335439","https://openalex.org/W2971661634","https://openalex.org/W2972646903","https://openalex.org/W2988471847","https://openalex.org/W3008191164","https://openalex.org/W3023868144","https://openalex.org/W3039176595","https://openalex.org/W3081178496","https://openalex.org/W3101656801","https://openalex.org/W3102564565","https://openalex.org/W3127920203","https://openalex.org/W3130788031","https://openalex.org/W4214537185","https://openalex.org/W4214564822","https://openalex.org/W4221158906","https://openalex.org/W4226394973","https://openalex.org/W4230172274","https://openalex.org/W4286891196","https://openalex.org/W4287118252","https://openalex.org/W4287207231","https://openalex.org/W4288093767","https://openalex.org/W4288101435","https://openalex.org/W4298140072","https://openalex.org/W4300250944","https://openalex.org/W4300761327","https://openalex.org/W4306808694","https://openalex.org/W6604054835"],"related_works":["https://openalex.org/W4320031223","https://openalex.org/W4200629851","https://openalex.org/W4281902577","https://openalex.org/W4309417370","https://openalex.org/W4292107232","https://openalex.org/W3009072493","https://openalex.org/W4386080799","https://openalex.org/W3140988292","https://openalex.org/W4317672133","https://openalex.org/W4386185023"],"abstract_inverted_index":{"Backdoor":[0,181],"attacks":[1],"inject":[2],"poisoned":[3,21,37,68,95,126],"samples":[4,38,69,76,96,127,136],"into":[5,13],"training":[6,32,85],"data,":[7],"where":[8,66],"backdoor":[9,64,177],"triggers":[10],"are":[11],"embedded":[12],"the":[14,18,31,34,52,67,75,78,83,107,111,132,143,162,170,197,210],"model":[15],"trained":[16],"on":[17,151],"mixture":[19],"of":[20,36,46,94,140,145,161,200,212],"and":[22,209],"clean":[23,47],"samples.An":[24],"interesting":[25],"phenomenon":[26],"can":[27,70],"be":[28,71,119,148],"observed":[29],"in":[30,82,196],"process:":[33],"loss":[35,80],"tends":[39],"to":[40,61,121,169,188],"drop":[41],"significantly":[42],"faster":[43],"than":[44],"that":[45,116],"samples,":[48],"which":[49,104,130,184],"we":[50,114,164],"call":[51],"early-fitting":[53,117],"phenomenon.Early-fitting":[54],"provides":[55],"a":[56,100,122,141,175,201],"simple":[57],"but":[58],"effective":[59],"evidence":[60],"defend":[62],"against":[63],"attacks,":[65],"detected":[72],"by":[73,156,173,193],"selecting":[74],"with":[77],"lowest":[79],"values":[81],"early":[84],"epochs.Then,":[86],"two":[87,135],"questions":[88],"naturally":[89],"arise:":[90],"(1)":[91],"What":[92],"characteristics":[93],"cause":[97],"early-fitting?(2)":[98],"Does":[99],"stronger":[101],"attack":[102,178],"exist":[103],"could":[105,118,147],"circumvent":[106],"defense":[108],"methods?To":[109],"answer":[110,168],"first":[112],"question,":[113],"find":[115],"attributed":[120],"unique":[123],"property":[124],"among":[125],"called":[128],"synchronization,":[129],"depicts":[131],"similarity":[133],"between":[134],"at":[137,217],"different":[138],"layers":[139,160],"model.Meanwhile,":[142],"degree":[144],"synchronization":[146,187],"controlled":[149],"based":[150],"whether":[152],"it":[153],"is":[154,215],"captured":[155],"shallow":[157],"or":[158],"deep":[159,186,198],"model.Then,":[163],"give":[165],"an":[166],"affirmative":[167],"second":[171],"question":[172],"proposing":[174],"new":[176],"method,":[179],"Deep":[180],"Attack":[182],"(DBA),":[183],"utilizes":[185],"reverse":[189],"engineer":[190],"trigger":[191],"patterns":[192],"activating":[194],"neurons":[195],"layer":[199],"base":[202],"neural":[203],"network.Experimental":[204],"results":[205],"validate":[206],"our":[207],"propositions":[208],"effectiveness":[211],"DBA.Our":[213],"code":[214],"available":[216],"https://github.com/GuanZihan/Deep-Backdoor-Attack.":[218]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
