{"id":"https://openalex.org/W4382893141","doi":"https://doi.org/10.1186/s42400-023-00154-z","title":"NBA: defensive distillation for backdoor removal via neural behavior alignment","display_name":"NBA: defensive distillation for backdoor removal via neural behavior alignment","publication_year":2023,"publication_date":"2023-07-03","ids":{"openalex":"https://openalex.org/W4382893141","doi":"https://doi.org/10.1186/s42400-023-00154-z"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-023-00154-z","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-023-00154-z","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00154-z","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00154-z","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020945039","display_name":"Zonghao Ying","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zonghao Ying","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022894420","display_name":"Bin Wu","orcid":"https://orcid.org/0000-0002-8103-0468"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Bin Wu","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5022894420"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.8579,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.78373758,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"6","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9872000217437744,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.9994666576385498},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.7007526159286499},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.651282548904419},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4723825454711914},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4638545513153076},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3518541753292084},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3238389492034912}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.9994666576385498},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.7007526159286499},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.651282548904419},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4723825454711914},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4638545513153076},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3518541753292084},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3238389492034912},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1186/s42400-023-00154-z","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-023-00154-z","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00154-z","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:2406.10846","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2406.10846","pdf_url":"https://arxiv.org/pdf/2406.10846","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:doaj.org/article:93dc70cdd9874120ae5072cd59ca309f","is_oa":true,"landing_page_url":"https://doaj.org/article/93dc70cdd9874120ae5072cd59ca309f","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 6, Iss 1, Pp 1-12 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-023-00154-z","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-023-00154-z","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00154-z","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.4699999988079071,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"},{"score":0.46000000834465027,"id":"https://metadata.un.org/sdg/4","display_name":"Quality Education"}],"awards":[{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1516916842","display_name":null,"funder_award_id":"No.62272007","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1999575507","display_name":null,"funder_award_id":"2019003","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3092615922","display_name":null,"funder_award_id":"6227200","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G349424075","display_name":null,"funder_award_id":"U1936119","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3667641059","display_name":null,"funder_award_id":"2019QY(Y)0602","funder_id":"https://openalex.org/F4320335774","funder_display_name":"Key Technologies Research and Development Program"},{"id":"https://openalex.org/G37568934","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4020255992","display_name":null,"funder_award_id":"Project","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4575716184","display_name":null,"funder_award_id":"62272007","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5249178904","display_name":null,"funder_award_id":"Grant No. 6","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5939423041","display_name":null,"funder_award_id":"Technology","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7726157001","display_name":null,"funder_award_id":"Grant No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8479330993","display_name":null,"funder_award_id":"61941116","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8955107213","display_name":null,"funder_award_id":"Major","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335774","display_name":"Key Technologies Research and Development Program","ror":null},{"id":"https://openalex.org/F4320335957","display_name":"Major Science and Technology Project of Hainan Province","ror":null}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4382893141.pdf"},"referenced_works_count":32,"referenced_works":["https://openalex.org/W1622838444","https://openalex.org/W2294710185","https://openalex.org/W2475287302","https://openalex.org/W2560647685","https://openalex.org/W2739879705","https://openalex.org/W2753783305","https://openalex.org/W2807363941","https://openalex.org/W2875908989","https://openalex.org/W2929803724","https://openalex.org/W2934843808","https://openalex.org/W2945976633","https://openalex.org/W2963140444","https://openalex.org/W2964082701","https://openalex.org/W2964137095","https://openalex.org/W2970335439","https://openalex.org/W2971661634","https://openalex.org/W2981207549","https://openalex.org/W2990183786","https://openalex.org/W3008275043","https://openalex.org/W3107337211","https://openalex.org/W3112001526","https://openalex.org/W3112288498","https://openalex.org/W3112787034","https://openalex.org/W3152758407","https://openalex.org/W3163966458","https://openalex.org/W3205328330","https://openalex.org/W3215171287","https://openalex.org/W4211185538","https://openalex.org/W4214537185","https://openalex.org/W4254278150","https://openalex.org/W4285601739","https://openalex.org/W4312329503"],"related_works":["https://openalex.org/W4320031223","https://openalex.org/W4200629851","https://openalex.org/W4281902577","https://openalex.org/W4309417370","https://openalex.org/W4292107232","https://openalex.org/W3009072493","https://openalex.org/W4386080799","https://openalex.org/W3140988292","https://openalex.org/W4317672133","https://openalex.org/W4386185023"],"abstract_inverted_index":{"Abstract":[0],"Recently,":[1],"deep":[2],"neural":[3,19,120,143,149,158],"networks":[4,20,123],"have":[5],"been":[6],"shown":[7],"to":[8,11,54,63,104,109,126,137],"be":[9],"vulnerable":[10],"backdoor":[12,15,45,66,89,113,142,148,182],"attacks.":[13],"A":[14],"is":[16,49,60],"inserted":[17],"into":[18],"via":[21],"this":[22,76],"attack":[23],"paradigm,":[24],"thus":[25],"compromising":[26],"the":[27,30,41,44,47,52,93,110,128,147,152,156,161,166],"integrity":[28],"of":[29,98,112,119,130,169],"network.":[31],"As":[32],"soon":[33],"as":[34],"an":[35],"attacker":[36],"presents":[37],"a":[38,80],"trigger":[39],"during":[40],"testing":[42],"phase,":[43],"in":[46,96,124],"model":[48],"activated,":[50],"allowing":[51],"network":[53,154],"make":[55],"specific":[56],"wrong":[57],"predictions.":[58],"It":[59],"extremely":[61],"important":[62],"defend":[64,178],"against":[65,179],"attacks":[67,183],"since":[68],"they":[69],"are":[70],"very":[71],"stealthy":[72],"and":[73,101,184],"dangerous.":[74],"In":[75],"paper,":[77],"we":[78],"propose":[79],"novel":[81],"defense":[82,106],"mechanism,":[83],"Neural":[84],"Behavioral":[85],"Alignment":[86],"(NBA),":[87],"for":[88],"removal.":[90],"NBA":[91,115,133,164,175],"optimizes":[92],"distillation":[94,102],"process":[95],"terms":[97],"knowledge":[99],"form":[100],"samples":[103,136],"improve":[105],"performance":[107],"according":[108],"characteristics":[111],"defense.":[114],"builds":[116],"high-level":[117],"representations":[118],"behavior":[121,150,159],"within":[122],"order":[125],"facilitate":[127],"transfer":[129],"knowledge.":[131],"Additionally,":[132],"crafts":[134],"pseudo":[135],"induce":[138],"student":[139,153],"models":[140],"exhibit":[141],"behavior.":[144],"By":[145],"aligning":[146],"from":[151,160],"with":[155],"benign":[157],"teacher":[162],"network,":[163],"enables":[165],"proactive":[167],"removal":[168],"backdoors.":[170],"Extensive":[171],"experiments":[172],"show":[173],"that":[174],"can":[176],"effectively":[177],"six":[180],"different":[181],"outperform":[185],"five":[186],"state-of-the-art":[187],"defenses.":[188]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2023-07-03T00:00:00"}
