{"id":"https://openalex.org/W7138478736","doi":"https://doi.org/10.1609/aaai.v40i2.37141","title":"DIFT: Protecting Contrastive Learning Against Data Poisoning Backdoor Attacks","display_name":"DIFT: Protecting Contrastive Learning Against Data Poisoning Backdoor Attacks","publication_year":2026,"publication_date":"2026-03-14","ids":{"openalex":"https://openalex.org/W7138478736","doi":"https://doi.org/10.1609/aaai.v40i2.37141"},"language":null,"primary_location":{"id":"doi:10.1609/aaai.v40i2.37141","is_oa":true,"landing_page_url":"https://doi.org/10.1609/aaai.v40i2.37141","pdf_url":"https://ojs.aaai.org/index.php/AAAI/article/download/37141/41103","source":{"id":"https://openalex.org/S4210191458","display_name":"Proceedings of the AAAI Conference on Artificial Intelligence","issn_l":"2159-5399","issn":["2159-5399","2374-3468"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320058","host_organization_name":"Association for the Advancement of Artificial Intelligence","host_organization_lineage":["https://openalex.org/P4310320058"],"host_organization_lineage_names":["Association for the Advancement of Artificial Intelligence"],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the AAAI Conference on Artificial Intelligence","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://ojs.aaai.org/index.php/AAAI/article/download/37141/41103","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5129676520","display_name":"Jiang Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":true,"raw_author_name":"Jiang Zhu","raw_affiliation_strings":["Hong Kong Polytechnic University"],"affiliations":[{"raw_affiliation_string":"Hong Kong Polytechnic University","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129645686","display_name":"Yulin Jin","orcid":null},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Yulin Jin","raw_affiliation_strings":["Hong Kong Polytechnic University"],"affiliations":[{"raw_affiliation_string":"Hong Kong Polytechnic University","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129696498","display_name":"Qingqing Ye","orcid":null},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Qingqing Ye","raw_affiliation_strings":["The Hong Kong Polytechnic University"],"affiliations":[{"raw_affiliation_string":"The Hong Kong Polytechnic University","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122530244","display_name":"Zhibiao Guo","orcid":null},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Zhibiao Guo","raw_affiliation_strings":["Hong Kong Polytechnic University"],"affiliations":[{"raw_affiliation_string":"Hong Kong Polytechnic University","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129662566","display_name":"Kun Fang","orcid":null},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Kun Fang","raw_affiliation_strings":["The Hong Kong Polytechnic University"],"affiliations":[{"raw_affiliation_string":"The Hong Kong Polytechnic University","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5107018562","display_name":"Ruochen Du","orcid":null},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruochen Du","raw_affiliation_strings":["Harbin Engineering University"],"affiliations":[{"raw_affiliation_string":"Harbin Engineering University","institution_ids":["https://openalex.org/I151727225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129741752","display_name":"Yingnan Zhao","orcid":null},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yingnan Zhao","raw_affiliation_strings":["Harbin Institute of Technology"],"affiliations":[{"raw_affiliation_string":"Harbin Institute of Technology","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5129694211","display_name":"Haibo Hu","orcid":null},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Haibo Hu","raw_affiliation_strings":["Hong Kong Polytechnic University"],"affiliations":[{"raw_affiliation_string":"Hong Kong Polytechnic University","institution_ids":["https://openalex.org/I14243506"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5129676520"],"corresponding_institution_ids":["https://openalex.org/I14243506"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.63854219,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"40","issue":"2","first_page":"1641","last_page":"1649"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9469000101089478,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9469000101089478,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11307","display_name":"Domain Adaptation and Few-Shot Learning","score":0.01140000019222498,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.006300000008195639,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.9995999932289124},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.545199990272522},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4772999882698059},{"id":"https://openalex.org/keywords/training-set","display_name":"Training set","score":0.4756999909877777},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.4343999922275543}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.9995999932289124},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6693000197410583},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6355000138282776},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.545199990272522},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4772999882698059},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.4756999909877777},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.47360000014305115},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.4343999922275543},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.40450000762939453},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.37229999899864197},{"id":"https://openalex.org/C44280652","wikidata":"https://www.wikidata.org/wiki/Q104837","display_name":"Phase (matter)","level":2,"score":0.3140000104904175},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.29490000009536743}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1609/aaai.v40i2.37141","is_oa":true,"landing_page_url":"https://doi.org/10.1609/aaai.v40i2.37141","pdf_url":"https://ojs.aaai.org/index.php/AAAI/article/download/37141/41103","source":{"id":"https://openalex.org/S4210191458","display_name":"Proceedings of the AAAI Conference on Artificial Intelligence","issn_l":"2159-5399","issn":["2159-5399","2374-3468"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320058","host_organization_name":"Association for the Advancement of Artificial Intelligence","host_organization_lineage":["https://openalex.org/P4310320058"],"host_organization_lineage_names":["Association for the Advancement of Artificial Intelligence"],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the AAAI Conference on Artificial Intelligence","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1609/aaai.v40i2.37141","is_oa":true,"landing_page_url":"https://doi.org/10.1609/aaai.v40i2.37141","pdf_url":"https://ojs.aaai.org/index.php/AAAI/article/download/37141/41103","source":{"id":"https://openalex.org/S4210191458","display_name":"Proceedings of the AAAI Conference on Artificial Intelligence","issn_l":"2159-5399","issn":["2159-5399","2374-3468"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320058","host_organization_name":"Association for the Advancement of Artificial Intelligence","host_organization_lineage":["https://openalex.org/P4310320058"],"host_organization_lineage_names":["Association for the Advancement of Artificial Intelligence"],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the AAAI Conference on Artificial Intelligence","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1492706270","display_name":null,"funder_award_id":"02402","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8088107578","display_name":null,"funder_award_id":"92270123","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8632164231","display_name":null,"funder_award_id":"62372122","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7138478736.pdf","grobid_xml":"https://content.openalex.org/works/W7138478736.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Contrastive":[0],"learning":[1,6],"(CL)":[2],"is":[3,23,84],"a":[4,56,81,94,108,180],"popular":[5],"paradigm":[7],"that":[8,21,74,214],"excels":[9],"in":[10,34,51,115,141],"extracting":[11],"meaningful":[12],"representations":[13],"from":[14,80],"unlabeled":[15],"data.":[16],"Recent":[17],"studies":[18],"have":[19],"shown":[20],"CL":[22,35,206],"highly":[24],"vulnerable":[25],"to":[26,67,111,146,159],"backdoor":[27,32,76,114,187,209],"attacks.":[28],"Current":[29],"defenses":[30,63],"against":[31,208],"attacks":[33],"are":[36,49,64,157,168],"primarily":[37],"reactive":[38,197],"and":[39,45,71,78,106,120,149,163,189],"post-training.":[40],"That":[41],"is,":[42],"the":[43,52,75,99,102,113,130,142,153,161,164,173,176,185,190],"detection":[44,77],"elimination":[46,79],"of":[47,55],"backdoors":[48,148],"executed":[50],"deployment":[53],"phase":[54,133],"given":[57],"well-trained":[58],"model.":[59],"However,":[60],"these":[61],"post-training":[62,198],"usually":[65],"prone":[66],"degrading":[68],"model":[69,83,151,174],"utility":[70],"resource-intensive,":[72],"causing":[73],"fully-trained":[82],"quite":[85],"challenging.":[86],"To":[87],"address":[88],"this":[89],"issue,":[90],"we":[91],"argue":[92],"for":[93],"fundamental":[95],"perspective,":[96],"i.e.,":[97],"integrating":[98],"defense":[100,219],"into":[101,171],"model's":[103,223],"training":[104,132,172],"phase,":[105],"propose":[107],"novel":[109],"framework":[110],"mitigate":[112],"CL,":[116],"namely":[117],"Density-Based":[118],"Identification":[119],"Fine-Tuning":[121],"(DIFT).":[122],"Specifically,":[123],"DIFT":[124,203],"identifies":[125],"potential":[126],"poisoned":[127,155],"samples":[128,156,167],"during":[129],"early":[131],"via":[134],"detecting":[135],"embeddings":[136],"with":[137,195],"abnormal":[138],"poisoning":[139],"characteristic":[140],"feature":[143],"space.":[144],"Then,":[145],"remove":[147],"preserve":[150],"utility,":[152],"detected":[154],"leveraged":[158],"fine-tune":[160],"model,":[162],"remaining":[165],"clean":[166,224],"further":[169],"involved":[170],"after":[175],"fine-tuning.":[177],"DIFT,":[178],"as":[179],"proactive":[181],"training-time":[182],"defense,":[183],"avoids":[184],"problematic":[186],"removal":[188],"high":[191],"computational":[192],"cost":[193],"associated":[194],"those":[196],"methods.":[199],"We":[200],"empirically":[201],"evaluate":[202],"on":[204],"various":[205],"algorithms":[207],"attack.":[210],"Experimental":[211],"results":[212],"demonstrate":[213],"our":[215],"method":[216],"exhibits":[217],"promising":[218],"effectiveness":[220],"while":[221],"maintaining":[222],"data":[225],"accuracy.":[226]},"counts_by_year":[],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2026-03-18T00:00:00"}
