{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T07:14:05Z","timestamp":1743059645748,"version":"3.40.3"},"publisher-location":"Cham","reference-count":45,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031723582"},{"type":"electronic","value":"9783031723599"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-72359-9_18","type":"book-chapter","created":{"date-parts":[[2024,9,18]],"date-time":"2024-09-18T12:28:54Z","timestamp":1726662534000},"page":"241-256","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Unlearnable Examples Detection via\u00a0Iterative Filtering"],"prefix":"10.1007","author":[{"given":"Yi","family":"Yu","sequence":"first","affiliation":[]},{"given":"Qichen","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Siyuan","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Wenhan","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Shijian","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Yap-Peng","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Kwok-Yan","family":"Lam","sequence":"additional","affiliation":[]},{"given":"Alex","family":"Kot","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,18]]},"reference":[{"key":"18_CR1","unstructured":"Biggio, B., Nelson, B., Laskov, P.: Poisoning attacks against support vector machines. In: Proceedings\u00a0International Conference\u00a0Machine Learning (2012)"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Brickley, D., Burgess, M., Noy, N.: Google dataset search: building a search engine for datasets in an open web ecosystem. In: The World Wide Web Conference (2019)","DOI":"10.1145\/3308558.3313685"},{"key":"18_CR3","unstructured":"Chen, B., et al.: Detecting backdoor attacks on deep neural networks by activation clustering. arXiv preprint arXiv:1811.03728 (2018)"},{"key":"18_CR4","unstructured":"Chen, S., et al.: Self-ensemble protection: Training checkpoints are good data protectors. In: Proceedings International Conference Learning Representations (2023)"},{"key":"18_CR5","unstructured":"Chen, X., Liu, C., Li, B., Lu, K., Song, D.: Targeted backdoor attacks on deep learning systems using data poisoning. arXiv preprint arXiv:1712.05526 (2017)"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Deng, J., Dong, W., Socher, R., Li, L.J., Li, K., Fei-Fei, L.: ImageNet: a large-scale hierarchical image database. In: Proceedings\u00a0IEEE International Conference\u00a0Computer Vision and Pattern Recognition, pp. 248\u2013255 (2009)","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Doan, K., Lao, Y., Zhao, W., Li, P.: LIRA: learnable, imperceptible and robust backdoor attacks. In: Proceedings\u00a0IEEE International Conference\u00a0Computer Vision, pp. 11966\u201311976 (2021)","DOI":"10.1109\/ICCV48922.2021.01175"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Dolatabadi, H.M., Erfani, S., Leckie, C.: The Devil\u2019s advocate: shattering the illusion of unexploitable data using diffusion models. arXiv preprint arXiv:2303.08500 (2023)","DOI":"10.1109\/SaTML59370.2024.00025"},{"key":"18_CR9","unstructured":"Fowl, L., Goldblum, M., Chiang, P.Y., Geiping, J., Czaja, W., Goldstein, T.: Adversarial examples make strong poisons. In: Proceedings\u00a0Annual Conference\u00a0Neural Information Processing Systems, vol.\u00a034, pp. 30339\u201330351 (2021)"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Fr\u00e9nay, B., Verleysen, M.: Classification in the presence of label noise: a survey. IEEE Trans. Neural Netw. Learn. Syst. 25(5), 845\u2013869 (2013)","DOI":"10.1109\/TNNLS.2013.2292894"},{"key":"18_CR11","unstructured":"Fu, S., He, F., Liu, Y., Shen, L., Tao, D.: Robust unlearnable examples: protecting data privacy against adversarial learning. In: Proceedings\u00a0International Conference\u00a0Learning Representations (2022)"},{"key":"18_CR12","doi-asserted-by":"crossref","first-page":"47230","DOI":"10.1109\/ACCESS.2019.2909068","volume":"7","author":"T Gu","year":"2019","unstructured":"Gu, T., Liu, K., Dolan-Gavitt, B., Garg, S.: BadNets: evaluating backdooring attacks on deep neural networks. IEEE Access 7, 47230\u201347244 (2019)","journal-title":"IEEE Access"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings\u00a0IEEE International Conference\u00a0Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"18_CR14","unstructured":"Ho, J., Jain, A., Abbeel, P.: Denoising diffusion probabilistic models. In: Proceedings\u00a0Annual Conference\u00a0Neural Information Processing Systems, pp. 6840\u20136851 (2020)"},{"key":"18_CR15","unstructured":"Hong, S., Chandrasekaran, V., Kaya, Y., Dumitra\u015f, T., Papernot, N.: On the effectiveness of mitigating data poisoning attacks with gradient shaping. arXiv preprint arXiv:2002.11497 (2020)"},{"key":"18_CR16","unstructured":"Huang, H., Ma, X., Erfani, S.M., Bailey, J., Wang, Y.: Unlearnable examples: making personal data unexploitable. In: Proceedings\u00a0International Conference\u00a0Learning Representations (2021)"},{"key":"18_CR17","unstructured":"Huang, W.R., Geiping, J., Fowl, L., Taylor, G., Goldstein, T.: Metapoison: Practical general-purpose clean-label data poisoning. In: Proceedings\u00a0Annual Conference\u00a0Neural Information Processing Systems, vol.\u00a033, pp. 12080\u201312091 (2020)"},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Koh, P.W., Steinhardt, J., Liang, P.: Stronger data poisoning attacks break data sanitization defenses. Mach. Learn., 1\u201347 (2022)","DOI":"10.1007\/s10994-021-06119-y"},{"key":"18_CR19","unstructured":"Krizhevsky, A., Hinton, G., et\u00a0al.: Learning multiple layers of features from tiny images (2009)"},{"key":"18_CR20","unstructured":"Lin, X., et\u00a0al.: Safeguarding medical image segmentation datasets against unauthorized training via contour-and texture-aware perturbations. arXiv preprint arXiv:2403.14250 (2024)"},{"key":"18_CR21","doi-asserted-by":"crossref","unstructured":"Liu, X., et al.: Detecting backdoors during the inference stage based on corruption robustness consistency. In: Proceedings\u00a0IEEE International Conference\u00a0Computer Vision and Pattern Recognition, pp. 16363\u201316372 (2023)","DOI":"10.1109\/CVPR52729.2023.01570"},{"key":"18_CR22","doi-asserted-by":"crossref","unstructured":"Liu, Y., Ma, X., Bailey, J., Lu, F.: Reflection backdoor: a natural backdoor attack on deep neural networks. In: Proceedings\u00a0IEEE European Conference\u00a0Computer Vision, pp. 182\u2013199 (2020)","DOI":"10.1007\/978-3-030-58607-2_11"},{"key":"18_CR23","unstructured":"Liu, Z., Zhao, Z., Larson, M.: Image shortcut squeezing: countering perturbative availability poisons with compression. In: Proceedings\u00a0International Conference\u00a0Machine Learning (2023)"},{"key":"18_CR24","unstructured":"Van\u00a0der Maaten, L., Hinton, G.: Visualizing data using t-SNE. J. Mach. Learn. Res. 9(11) (2008)"},{"key":"18_CR25","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. In: Proceedings\u00a0International Conference\u00a0Learning Representations (2018)"},{"key":"18_CR26","unstructured":"Marcellin, M.W., Gormish, M.J., Bilgin, A., Boliek, M.P.: An overview of JPEG-2000. In: Proceedings DCC 2000. Data Compression Conference, pp. 523\u2013541. IEEE (2000)"},{"key":"18_CR27","doi-asserted-by":"crossref","unstructured":"Meng, R., Yi, C., Yu, Y., Yang, S., Shen, B., Kot, A.C.: Semantic deep hiding for robust unlearnable examples. IEEE Trans. Inf. Forensics Secur. (2024)","DOI":"10.1109\/TIFS.2024.3421273"},{"key":"18_CR28","unstructured":"Nguyen, A., Tran, A.: WaNet\u2013imperceptible warping-based backdoor attack. In: Proceedings\u00a0International Conference\u00a0Learning Representations (2021)"},{"key":"18_CR29","doi-asserted-by":"crossref","unstructured":"Peri, N., et al.: Deep K-NN defense against clean-label data poisoning attacks. In: Proceedings\u00a0IEEE European Conference\u00a0Computer Vision, pp. 55\u201370 (2020)","DOI":"10.1007\/978-3-030-66415-2_4"},{"key":"18_CR30","unstructured":"Qin, T., Gao, X., Zhao, J., Ye, K., Xu, C.Z.: Learning the unlearnable: adversarial augmentations suppress unlearnable example attacks. arXiv preprint arXiv:2303.15127 (2023)"},{"key":"18_CR31","unstructured":"Sandoval-Segura, P., Singla, V., Geiping, J., Goldblum, M., Goldstein, T., Jacobs, D.: Autoregressive perturbations for data poisoning. In: Proceedings\u00a0Annual Conference\u00a0Neural Information Processing Systems, vol.\u00a035, pp. 27374\u201327386 (2022)"},{"key":"18_CR32","unstructured":"Shafahi, A., et al.: Poison Frogs! Targeted clean-label poisoning attacks on neural networks. In: Proceedings\u00a0Annual Conference\u00a0Neural Information Processing Systems (2018)"},{"key":"18_CR33","unstructured":"Steinhardt, J., Koh, P.W.W., Liang, P.S.: Certified defenses for data poisoning attacks. In: Proceedings\u00a0Annual Conference\u00a0Neural Information Processing Systems, vol.\u00a030 (2017)"},{"key":"18_CR34","series-title":"Advances in Computer Vision and Pattern Recognition","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-319-58347-1_2","volume-title":"Domain Adaptation in Computer Vision Applications","author":"T Tommasi","year":"2017","unstructured":"Tommasi, T., Patricia, N., Caputo, B., Tuytelaars, T.: A deeper look at dataset bias. In: Csurka, G. (ed.) Domain Adaptation in Computer Vision Applications. ACVPR, pp. 37\u201355. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-58347-1_2"},{"key":"18_CR35","unstructured":"Tran, B., Li, J., Madry, A.: Spectral signatures in backdoor attacks. In: Proceedings\u00a0Annual Conference\u00a0Neural Information Processing Systems, vol.\u00a031 (2018)"},{"key":"18_CR36","doi-asserted-by":"crossref","unstructured":"Wang, B., et al.: Neural cleanse: identifying and mitigating backdoor attacks in neural networks. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 707\u2013723. IEEE (2019)","DOI":"10.1109\/SP.2019.00031"},{"key":"18_CR37","doi-asserted-by":"crossref","unstructured":"Wang, C., Yu, Y., Guo, L., Wen, B.: Benchmarking adversarial robustness of image shadow removal with shadow-adaptive attacks. In: Proceedings\u00a0IEEE International Conference\u00a0Acoustics, Speech, and Signal Processing, pp. 13126\u201313130. IEEE (2024)","DOI":"10.1109\/ICASSP48485.2024.10446953"},{"key":"18_CR38","doi-asserted-by":"crossref","unstructured":"Whang, S.E., Roh, Y., Song, H., Lee, J.G.: Data collection and quality challenges in deep learning: a data-centric AI perspective. VLDB J. (2023)","DOI":"10.1007\/s00778-022-00775-9"},{"key":"18_CR39","unstructured":"Wu, S., Chen, S., Xie, C., Huang, X.: One-pixel shortcut: on the learning preference of deep neural networks. In: Proceedings\u00a0International Conference\u00a0Learning Representations (2023)"},{"key":"18_CR40","unstructured":"Xia, S., Yu, Y., Jiang, X., Ding, H.: Mitigating the curse of dimensionality for certified robustness via dual randomized smoothing. In: The Twelfth International Conference on Learning Representations (2024)"},{"key":"18_CR41","doi-asserted-by":"crossref","unstructured":"Yu, D., Zhang, H., Chen, W., Yin, J., Liu, T.Y.: Availability attacks create shortcuts. In: Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, pp. 2367\u20132376 (2022)","DOI":"10.1145\/3534678.3539241"},{"key":"18_CR42","unstructured":"Yu, Y., et al.: Purify unlearnable examples via rate-constrained variational autoencoders. In: International Conference on Machine Learning, ICML 2024. Proceedings of Machine Learning Research (2024)"},{"key":"18_CR43","doi-asserted-by":"crossref","unstructured":"Yu, Y., Wang, Y., Yang, W., Lu, S., Tan, Y.P., Kot, A.C.: Backdoor attacks against deep image compression via adaptive frequency trigger. In: Proceedings\u00a0IEEE International Conference\u00a0Computer Vision and Pattern Recognition, pp. 12250\u201312259, June 2023","DOI":"10.1109\/CVPR52729.2023.01179"},{"key":"18_CR44","doi-asserted-by":"crossref","unstructured":"Yu, Y., Yang, W., Tan, Y.P., Kot, A.C.: Towards robust rain removal against adversarial attacks: a comprehensive benchmark analysis and beyond. In: Proceedings\u00a0IEEE International Conference\u00a0Computer Vision and Pattern Recognition, pp. 6013\u20136022, June 2022","DOI":"10.1109\/CVPR52688.2022.00592"},{"key":"18_CR45","unstructured":"Zha, D., et al.: Data-centric artificial intelligence: a survey. arXiv preprint arXiv:2303.10158 (2023)"}],"container-title":["Lecture Notes in Computer Science","Artificial Neural Networks and Machine Learning \u2013 ICANN 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-72359-9_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,18]],"date-time":"2024-09-18T12:36:29Z","timestamp":1726662989000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-72359-9_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031723582","9783031723599"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-72359-9_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"18 September 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICANN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Neural Networks","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lugano","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Switzerland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"33","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icann2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}