{"id":"https://openalex.org/W4416016654","doi":"https://doi.org/10.1145/3746252.3761026","title":"Rethinking Lipschitzness Data-free Backdoor Defense","display_name":"Rethinking Lipschitzness Data-free Backdoor Defense","publication_year":2025,"publication_date":"2025-11-07","ids":{"openalex":"https://openalex.org/W4416016654","doi":"https://doi.org/10.1145/3746252.3761026"},"language":null,"primary_location":{"id":"doi:10.1145/3746252.3761026","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3746252.3761026","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 34th ACM International Conference on Information and Knowledge Management","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3746252.3761026","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060973933","display_name":"Xinyi Wang","orcid":"https://orcid.org/0009-0000-5103-011X"},"institutions":[{"id":"https://openalex.org/I33849332","display_name":"University of Malaya","ror":"https://ror.org/00rzspn62","country_code":"MY","type":"education","lineage":["https://openalex.org/I33849332"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Xinyi Wang","raw_affiliation_strings":["University of Malaya, Kuala Lumpur, Malaysia"],"affiliations":[{"raw_affiliation_string":"University of Malaya, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I33849332"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080401047","display_name":"Zhiyu Zhu","orcid":"https://orcid.org/0009-0009-0231-4410"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Zhiyu Zhu","raw_affiliation_strings":["University of Technology Sydney, Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"University of Technology Sydney, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100704183","display_name":"Zhibo Jin","orcid":"https://orcid.org/0009-0003-0218-1941"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Zhibo Jin","raw_affiliation_strings":["University of Technology Sydney, Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"University of Technology Sydney, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101987301","display_name":"Huaming Chen","orcid":"https://orcid.org/0000-0001-5678-472X"},"institutions":[{"id":"https://openalex.org/I129604602","display_name":"The University of Sydney","ror":"https://ror.org/0384j8v12","country_code":"AU","type":"education","lineage":["https://openalex.org/I129604602"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Huaming Chen","raw_affiliation_strings":["The University of Sydney, Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"The University of Sydney, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I129604602"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068478144","display_name":"Teng Joon Lim","orcid":"https://orcid.org/0000-0002-3356-2240"},"institutions":[{"id":"https://openalex.org/I129604602","display_name":"The University of Sydney","ror":"https://ror.org/0384j8v12","country_code":"AU","type":"education","lineage":["https://openalex.org/I129604602"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Teng Joon Lim","raw_affiliation_strings":["The University of Sydney, Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"The University of Sydney, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I129604602"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5060973933"],"corresponding_institution_ids":["https://openalex.org/I33849332"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.17531609,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"3113","last_page":"3122"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.0012000000569969416,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.0012000000569969416,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.9901000261306763},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.48969998955726624},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.4490000009536743},{"id":"https://openalex.org/keywords/scope","display_name":"Scope (computer science)","score":0.43140000104904175},{"id":"https://openalex.org/keywords/pruning","display_name":"Pruning","score":0.3529999852180481},{"id":"https://openalex.org/keywords/relation","display_name":"Relation (database)","score":0.30090001225471497},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.2944999933242798}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.9901000261306763},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6561999917030334},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5514000058174133},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.48969998955726624},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.4490000009536743},{"id":"https://openalex.org/C2778012447","wikidata":"https://www.wikidata.org/wiki/Q1034415","display_name":"Scope (computer science)","level":2,"score":0.43140000104904175},{"id":"https://openalex.org/C108010975","wikidata":"https://www.wikidata.org/wiki/Q500094","display_name":"Pruning","level":2,"score":0.3529999852180481},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.30320000648498535},{"id":"https://openalex.org/C25343380","wikidata":"https://www.wikidata.org/wiki/Q277521","display_name":"Relation (database)","level":2,"score":0.30090001225471497},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.2944999933242798},{"id":"https://openalex.org/C2776654903","wikidata":"https://www.wikidata.org/wiki/Q2601463","display_name":"SAFER","level":2,"score":0.2944999933242798},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.2793000042438507},{"id":"https://openalex.org/C2781251061","wikidata":"https://www.wikidata.org/wiki/Q5416089","display_name":"Evasion (ethics)","level":3,"score":0.2680000066757202},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.25839999318122864},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.2581999897956848},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.25679999589920044}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3746252.3761026","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3746252.3761026","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 34th ACM International Conference on Information and Knowledge Management","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3746252.3761026","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3746252.3761026","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 34th ACM International Conference on Information and Knowledge Management","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W2194775991","https://openalex.org/W2807363941","https://openalex.org/W2963163009","https://openalex.org/W2970335439","https://openalex.org/W4214680449","https://openalex.org/W4214940715","https://openalex.org/W4230172274","https://openalex.org/W4297094728","https://openalex.org/W4312329299","https://openalex.org/W4312877401","https://openalex.org/W4313192591","https://openalex.org/W4317425876"],"related_works":[],"abstract_inverted_index":{"Deep":[0],"Neural":[1],"Networks":[2],"(DNNs)":[3],"have":[4],"demonstrated":[5],"remarkable":[6],"success":[7],"across":[8],"various":[9],"applications,":[10],"yet":[11],"some":[12],"studies":[13],"reveal":[14],"their":[15],"vulnerability":[16],"to":[17,44,66,69,107,169],"backdoor":[18,97,111,118,167],"attacks,":[19],"where":[20],"attackers":[21],"manipulate":[22],"models":[23],"under":[24],"specific":[25],"conditions":[26],"using":[27,133],"triggers.":[28],"It":[29],"significantly":[30],"compromise":[31],"the":[32,46,77,102,127,130,147,156,164,208],"model":[33],"integrity.":[34],"Addressing":[35],"this":[36,86],"critical":[37],"security":[38,73],"issue":[39],"requires":[40],"robust":[41],"defence":[42,54,60,83,98,151,205,212],"mechanisms":[43,55],"ensure":[45],"reliability":[47],"of":[48,104,129,143,149,158,166,177],"DNN":[49,178],"models.":[50,179],"However,":[51],"most":[52],"existing":[53,159],"heavily":[56],"rely":[57],"on":[58],"specialized":[59],"datasets,":[61],"which":[62],"are":[63],"often":[64],"difficult":[65],"obtain":[67],"due":[68],"data":[70,186],"privacy":[71],"and":[72,109,140,162,193],"concerns.":[74],"This":[75,153],"highlights":[76],"urgent":[78],"need":[79,148,209],"for":[80,138,210],"effective":[81],"data-free":[82,96,160],"strategies.":[84],"In":[85],"work,":[87],"we":[88],"propose":[89],"Lipschitzness":[90],"Precise":[91],"Pruning":[92],"(LPP),":[93],"a":[94],"novel":[95],"algorithm":[99],"that":[100,201],"leverages":[101],"properties":[103],"Lipschitz":[105,131],"function":[106],"detect":[108],"mitigate":[110],"vulnerabilities":[112],"by":[113],"pruning":[114],"neurons":[115,145],"with":[116],"strong":[117],"correlations":[119],"while":[120],"fine-tuning":[121],"unaffected":[122],"neurons.":[123],"Our":[124],"approach":[125,182],"optimizes":[126],"computation":[128],"constant":[132],"dot":[134],"product":[135],"properties,":[136],"allowing":[137],"efficient":[139],"precise":[141],"identification":[142],"compromised":[144],"without":[146,207],"clean":[150],"data.":[152],"method":[154],"addresses":[155],"limitations":[157],"defences":[161],"extends":[163],"scope":[165],"mitigation":[168],"include":[170],"fully":[171],"connected":[172],"layers,":[173],"ensuring":[174],"comprehensive":[175],"protection":[176],"As":[180],"our":[181,216],"does":[183],"not":[184],"require":[185],"exchange,":[187],"it":[188],"can":[189],"be":[190],"implemented":[191],"efficiently":[192],"effectively":[194],"in":[195],"diverse":[196],"environments.":[197],"Extensive":[198],"experiments":[199],"demonstrate":[200],"LPP":[202],"outperforms":[203],"state-of-the-art":[204],"approaches":[206],"additional":[211],"datasets.":[213],"We":[214],"release":[215],"code":[217],"at:":[218],"https://github.com/LMBTough/LPP":[219]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-11-08T00:00:00"}
