{"id":"https://openalex.org/W4412692162","doi":"https://doi.org/10.32604/cmc.2025.068201","title":"Proactive Disentangled Modeling of Trigger\u2013Object Pairings for Backdoor Defense","display_name":"Proactive Disentangled Modeling of Trigger\u2013Object Pairings for Backdoor Defense","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4412692162","doi":"https://doi.org/10.32604/cmc.2025.068201"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.068201","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.068201","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.068201","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113283941","display_name":"K. Stein","orcid":"https://orcid.org/0009-0005-4706-5797"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Kyle Stein","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114387768","display_name":"Andrew A. Mahyari","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Andrew A. Mahyari","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090770741","display_name":"Guillermo Francia","orcid":"https://orcid.org/0000-0001-8088-2653"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Guillermo Francia III","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5109335795","display_name":"Eman El-Sheikh","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Eman El-Sheikh","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5113283941"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.36120619,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"85","issue":"1","first_page":"1001","last_page":"1018"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10481","display_name":"Computer Graphics and Visualization Techniques","score":0.9024999737739563,"subfield":{"id":"https://openalex.org/subfields/1704","display_name":"Computer Graphics and Computer-Aided Design"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10481","display_name":"Computer Graphics and Visualization Techniques","score":0.9024999737739563,"subfield":{"id":"https://openalex.org/subfields/1704","display_name":"Computer Graphics and Computer-Aided Design"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.972790002822876},{"id":"https://openalex.org/keywords/object","display_name":"Object (grammar)","score":0.6229860782623291},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.48569735884666443},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.36131107807159424},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21427559852600098}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.972790002822876},{"id":"https://openalex.org/C2781238097","wikidata":"https://www.wikidata.org/wiki/Q175026","display_name":"Object (grammar)","level":2,"score":0.6229860782623291},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.48569735884666443},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.36131107807159424},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21427559852600098}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.32604/cmc.2025.068201","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.068201","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:2508.01932","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2508.01932","pdf_url":"https://arxiv.org/pdf/2508.01932","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.068201","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.068201","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.6299999952316284,"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4320031223","https://openalex.org/W4200629851","https://openalex.org/W4281902577","https://openalex.org/W4309417370","https://openalex.org/W4292107232","https://openalex.org/W3009072493","https://openalex.org/W4386080799"],"abstract_inverted_index":{"Deep":[0],"neural":[1],"networks":[2],"(DNNs)":[3],"and":[4,69,73,90,129,139,147,160,168,180,219],"generative":[5],"AI":[6],"(GenAI)":[7],"are":[8,141],"increasingly":[9],"vulnerable":[10],"to":[11,20,23,67,198,229],"backdoor":[12,75],"attacks,":[13],"where":[14],"adversaries":[15],"embed":[16],"triggers":[17,37,89,138],"into":[18,120,211],"inputs":[19],"cause":[21],"models":[22],"misclassify":[24],"or":[25],"misinterpret":[26],"target":[27],"labels.":[28],"Beyond":[29],"traditional":[30],"single-trigger":[31],"scenarios,":[32],"attackers":[33],"may":[34],"inject":[35],"multiple":[36],"across":[38],"various":[39],"object":[40,148,169],"classes,":[41],"forming":[42],"unseen":[43,74,204],"backdoor-object":[44],"configurations":[45],"that":[46,63,134,163,202,222],"evade":[47],"standard":[48],"detection":[49],"pipelines.":[50,239],"In":[51],"this":[52],"paper,":[53],"we":[54,155],"introduce":[55,156],"DBOM":[56,82,194,223],"(Disentangled":[57],"Backdoor-Object":[58],"Modeling),":[59],"a":[60,124,190],"proactive":[61],"framework":[62],"leverages":[64],"structured":[65],"disentanglement":[66],"identify":[68],"neutralize":[70],"both":[71],"seen":[72],"threats":[76],"at":[77],"the":[78,96,100,108,117,135,151,157,234],"dataset":[79],"level.":[80],"Specifically,":[81],"factorizes":[83],"input":[84],"image":[85,175],"representations":[86,119,149],"by":[87,173],"modeling":[88],"objects":[91,140],"as":[92,182,184],"independent":[93],"primitives":[94],"in":[95,150,165,189],"embedding":[97],"space":[98],"through":[99,123],"use":[101],"of":[102,112,236],"Vision-Language":[103],"Models":[104],"(VLMs).":[105],"By":[106],"leveraging":[107],"frozen,":[109],"pre-trained":[110],"encoders":[111],"VLMs,":[113],"our":[114],"approach":[115],"decomposes":[116],"latent":[118],"distinct":[121],"components":[122],"learnable":[125],"visual":[126,152,170],"prompt":[127,130,153,187],"repository":[128],"prefix":[131],"tuning,":[132],"ensuring":[133],"relationships":[136],"between":[137],"explicitly":[142],"captured.":[143],"To":[144],"separate":[145],"trigger":[146,167],"repository,":[154],"trigger\u2013object":[158],"separation":[159],"diversity":[161],"losses":[162],"aids":[164],"disentangling":[166],"features.":[171],"Next,":[172],"aligning":[174],"features":[176],"with":[177],"feature":[178],"decomposition":[179],"fusion,":[181],"well":[183],"learned":[185],"contextual":[186],"tokens":[188],"shared":[191],"multimodal":[192],"space,":[193],"enables":[195],"zero-shot":[196],"generalization":[197],"novel":[199],"trigger-object":[200],"pairings":[201],"were":[203],"during":[205],"training,":[206,231],"thereby":[207],"offering":[208],"deeper":[209],"insights":[210],"adversarial":[212],"attack":[213],"patterns.":[214],"Experimental":[215],"results":[216],"on":[217],"CIFAR-10":[218],"GTSRB":[220],"demonstrate":[221],"robustly":[224],"detects":[225],"poisoned":[226],"images":[227],"prior":[228],"downstream":[230],"significantly":[232],"enhancing":[233],"security":[235],"DNN":[237],"training":[238]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
