{"id":"https://openalex.org/W4205468507","doi":"https://doi.org/10.23919/eusipco54536.2021.9616118","title":"Pixdoor: A Pixel-space Backdoor Attack on Deep Learning Models","display_name":"Pixdoor: A Pixel-space Backdoor Attack on Deep Learning Models","publication_year":2021,"publication_date":"2021-08-23","ids":{"openalex":"https://openalex.org/W4205468507","doi":"https://doi.org/10.23919/eusipco54536.2021.9616118"},"language":"en","primary_location":{"id":"doi:10.23919/eusipco54536.2021.9616118","is_oa":false,"landing_page_url":"https://doi.org/10.23919/eusipco54536.2021.9616118","pdf_url":null,"source":{"id":"https://openalex.org/S4363607854","display_name":"2021 29th European Signal Processing Conference (EUSIPCO)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 29th European Signal Processing Conference (EUSIPCO)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001642577","display_name":"Iram Arshad","orcid":"https://orcid.org/0000-0003-0755-5896"},"institutions":[{"id":"https://openalex.org/I151939572","display_name":"Athlone Institute of Technology","ror":"https://ror.org/02dyxwz31","country_code":"IE","type":"education","lineage":["https://openalex.org/I151939572"]}],"countries":["IE"],"is_corresponding":true,"raw_author_name":"Iram Arshad","raw_affiliation_strings":["Software Research Institute, Athlone Institute of Technology, Athlone, Ireland"],"affiliations":[{"raw_affiliation_string":"Software Research Institute, Athlone Institute of Technology, Athlone, Ireland","institution_ids":["https://openalex.org/I151939572"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059411842","display_name":"Mamoona Naveed Asghar","orcid":"https://orcid.org/0000-0001-7460-266X"},"institutions":[{"id":"https://openalex.org/I151939572","display_name":"Athlone Institute of Technology","ror":"https://ror.org/02dyxwz31","country_code":"IE","type":"education","lineage":["https://openalex.org/I151939572"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Mamoona Naveed Asghar","raw_affiliation_strings":["Software Research Institute, Athlone Institute of Technology, Athlone, Ireland"],"affiliations":[{"raw_affiliation_string":"Software Research Institute, Athlone Institute of Technology, Athlone, Ireland","institution_ids":["https://openalex.org/I151939572"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029716141","display_name":"Yuansong Qiao","orcid":"https://orcid.org/0000-0002-1543-1589"},"institutions":[{"id":"https://openalex.org/I151939572","display_name":"Athlone Institute of Technology","ror":"https://ror.org/02dyxwz31","country_code":"IE","type":"education","lineage":["https://openalex.org/I151939572"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Yuansong Qiao","raw_affiliation_strings":["Software Research Institute, Athlone Institute of Technology, Athlone, Ireland"],"affiliations":[{"raw_affiliation_string":"Software Research Institute, Athlone Institute of Technology, Athlone, Ireland","institution_ids":["https://openalex.org/I151939572"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100371443","display_name":"Brian Lee","orcid":"https://orcid.org/0000-0002-8475-4074"},"institutions":[{"id":"https://openalex.org/I151939572","display_name":"Athlone Institute of Technology","ror":"https://ror.org/02dyxwz31","country_code":"IE","type":"education","lineage":["https://openalex.org/I151939572"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Brian Lee","raw_affiliation_strings":["Software Research Institute, Athlone Institute of Technology, Athlone, Ireland"],"affiliations":[{"raw_affiliation_string":"Software Research Institute, Athlone Institute of Technology, Athlone, Ireland","institution_ids":["https://openalex.org/I151939572"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017865903","display_name":"Yuhang Ye","orcid":"https://orcid.org/0000-0003-4608-1451"},"institutions":[{"id":"https://openalex.org/I151939572","display_name":"Athlone Institute of Technology","ror":"https://ror.org/02dyxwz31","country_code":"IE","type":"education","lineage":["https://openalex.org/I151939572"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Yuhang Ye","raw_affiliation_strings":["Software Research Institute, Athlone Institute of Technology, Athlone, Ireland"],"affiliations":[{"raw_affiliation_string":"Software Research Institute, Athlone Institute of Technology, Athlone, Ireland","institution_ids":["https://openalex.org/I151939572"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5001642577"],"corresponding_institution_ids":["https://openalex.org/I151939572"],"apc_list":null,"apc_paid":null,"fwci":0.6283,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.71340437,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"681","last_page":"685"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9664000272750854,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9323999881744385,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.9779362678527832},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7748175859451294},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.7748116254806519},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6924563646316528},{"id":"https://openalex.org/keywords/transfer-of-learning","display_name":"Transfer of learning","score":0.5805563926696777},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.5515824556350708},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4895206689834595},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.4196268320083618},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1664695143699646}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.9779362678527832},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7748175859451294},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.7748116254806519},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6924563646316528},{"id":"https://openalex.org/C150899416","wikidata":"https://www.wikidata.org/wiki/Q1820378","display_name":"Transfer of learning","level":2,"score":0.5805563926696777},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.5515824556350708},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4895206689834595},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.4196268320083618},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1664695143699646},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/eusipco54536.2021.9616118","is_oa":false,"landing_page_url":"https://doi.org/10.23919/eusipco54536.2021.9616118","pdf_url":null,"source":{"id":"https://openalex.org/S4363607854","display_name":"2021 29th European Signal Processing Conference (EUSIPCO)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 29th European Signal Processing Conference (EUSIPCO)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320323047","display_name":"Athlone Institute of Technology","ror":"https://ror.org/02dyxwz31"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1673923490","https://openalex.org/W2147800946","https://openalex.org/W2180612164","https://openalex.org/W2753783305","https://openalex.org/W2774423163","https://openalex.org/W2785405530","https://openalex.org/W2888369530","https://openalex.org/W2942091739","https://openalex.org/W2964043980","https://openalex.org/W2969596189","https://openalex.org/W3012113073","https://openalex.org/W3016493309","https://openalex.org/W3034148572","https://openalex.org/W6637162671","https://openalex.org/W6746897123","https://openalex.org/W6748526662","https://openalex.org/W6754453320","https://openalex.org/W6774608743"],"related_works":["https://openalex.org/W4206357785","https://openalex.org/W4281381188","https://openalex.org/W3192840557","https://openalex.org/W2951211570","https://openalex.org/W4375928479","https://openalex.org/W3167935049","https://openalex.org/W3023427754","https://openalex.org/W3131673289","https://openalex.org/W3198847674","https://openalex.org/W3096913503"],"abstract_inverted_index":{"Deep":[0],"learning":[1,6,28,61,118],"algorithms":[2],"outperform":[3],"the":[4,56,65,68,77,86,92,97,107,135],"machine":[5],"techniques":[7],"in":[8,76,127],"various":[9],"fields":[10],"and":[11,17,41],"are":[12],"widely":[13],"deployed":[14],"for":[15,73],"recognition":[16],"classification":[18],"tasks.":[19],"However,":[20],"recent":[21],"research":[22],"focuses":[23],"on":[24],"exploring":[25],"these":[26,32],"deep":[27,60,117],"models'":[29],"weaknesses":[30],"as":[31],"can":[33,113],"be":[34],"vulnerable":[35],"due":[36],"to":[37,95],"outsourced":[38],"training":[39,57,81,99],"data":[40,111],"transfer":[42],"learning.":[43],"This":[44],"paper":[45],"proposed":[46],"a":[47,116,121,131],"rudimentary,":[48],"stealthy":[49],"Pixel-space":[50],"based":[51],"Backdoor":[52],"attack":[53],"(Pixdoor)":[54],"during":[55],"phase":[58],"of":[59,80,85,110,124,134],"models.":[62],"For":[63],"generating":[64],"poisoned":[66,87],"dataset,":[67],"bit-inversion":[69],"technique":[70],"is":[71,89],"used":[72],"injecting":[74],"errors":[75],"pixel":[78],"bits":[79],"images.":[82],"Then":[83],"3%":[84],"dataset":[88,94],"mixed":[90],"with":[91,120],"clean":[93],"corrupt":[96],"complete":[98],"images":[100],"dataset.":[101],"The":[102],"experimental":[103],"results":[104],"show":[105],"that":[106],"minimal":[108],"percent":[109],"poisoning":[112],"effectively":[114],"fool":[115],"model":[119,136],"high":[122],"degree":[123],"accuracy.":[125],"Likewise,":[126],"experiments,":[128],"we":[129],"witness":[130],"marginal":[132],"degradation":[133],"accuracy":[137],"by":[138],"0.02%.":[139]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
