{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T10:08:58Z","timestamp":1764842938278,"version":"3.40.3"},"publisher-location":"Cham","reference-count":45,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031729690"},{"type":"electronic","value":"9783031729706"}],"license":[{"start":{"date-parts":[[2024,11,23]],"date-time":"2024-11-23T00:00:00Z","timestamp":1732320000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,23]],"date-time":"2024-11-23T00:00:00Z","timestamp":1732320000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-72970-6_6","type":"book-chapter","created":{"date-parts":[[2024,11,22]],"date-time":"2024-11-22T10:48:52Z","timestamp":1732272532000},"page":"90-106","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["CatchBackdoor: Backdoor Detection via\u00a0Critical Trojan Neural Path Fuzzing"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7244-7659","authenticated-orcid":false,"given":"Haibo","family":"Jin","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2626-5448","authenticated-orcid":false,"given":"Ruoxi","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jinyin","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Haibin","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1826-4069","authenticated-orcid":false,"given":"Haohan","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,23]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Aghakhani, H., Meng, D., Wang, Y.X., Kruegel, C., Vigna, G.: Bullseye polytope: a scalable clean-label poisoning attack with improved transferability. In: 2021 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 159\u2013178. IEEE (2021)","DOI":"10.1109\/EuroSP51992.2021.00021"},{"key":"6_CR2","unstructured":"et\u00a0al., B.: A new backdoor attack in CNNs by training set corruption without label poisoning (2019)"},{"key":"6_CR3","unstructured":"Chen, B., et al.: Detecting backdoor attacks on deep neural networks by activation clustering. In: Workshop on Artificial Intelligence Safety 2019 co-located with the Thirty-Third AAAI Conference on Artificial Intelligence 2019 (AAAI-19), Honolulu, Hawaii, 27 January 2019, vol.\u00a02301 (2019)"},{"key":"6_CR4","unstructured":"Cheng, S., Liu, Y., Ma, S., Zhang, X.: Deep feature space trojan attack of neural networks by controlled detoxification. arXiv preprint arXiv:2012.11212 (2020)"},{"key":"6_CR5","unstructured":"Dosovitskiy, A., et\u00a0al.: An image is worth 16$$\\times $$16 words: transformers for image recognition at scale. arXiv preprint arXiv:2010.11929 (2020)"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Gao, Y., Xu, C., Wang, D., Chen, S., Ranasinghe, D.C., Nepal, S.: STRIP: a defence against trojan attacks on deep neural networks. In: Proceedings of the 35th Annual Computer Security Applications Conference, pp. 113\u2013125 (2019)","DOI":"10.1145\/3359789.3359790"},{"key":"6_CR7","unstructured":"Gu, T., Dolan-Gavitt, B., Garg, S.: BadNets: identifying vulnerabilities in the machine learning model supply chain. arXiv preprint arXiv:1708.06733 (2017)"},{"key":"6_CR8","unstructured":"Guo, W., Wang, L., Xing, X., Du, M., Song, D.: TABOR: a highly accurate approach to inspecting and restoring trojan backdoors in AI systems. arXiv preprint arXiv:1908.01763 (2019)"},{"key":"6_CR9","unstructured":"Hayase, J., Kong, W.: SPECTRE: defending against backdoor attacks using robust covariance estimation. In: International Conference on Machine Learning (2020)"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"6_CR11","unstructured":"He, Y., Meng, G., Chen, K., Hu, X., He, J.: Towards security threats of deep learning systems: a survey. IEEE Trans. Softw. Eng. (2020)"},{"key":"6_CR12","unstructured":"Hu, X., Lin, X., Cogswell, M., Yao, Y., Jha, S., Chen, C.: Trigger hunting with a topological prior for trojan detection. arXiv preprint arXiv:2110.08335 (2021)"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Kolouri, S., Saha, A., Pirsiavash, H., Hoffmann, H.: Universal litmus patterns: Revealing backdoor attacks in CNNs. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 301\u2013310 (2020)","DOI":"10.1109\/CVPR42600.2020.00038"},{"key":"6_CR14","unstructured":"Krizhevsky, A., Hinton, G., et\u00a0al.: Learning multiple layers of features from tiny images (2009)"},{"issue":"6","key":"6_CR15","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/3065386","volume":"60","author":"A Krizhevsky","year":"2017","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. Commun. ACM 60(6), 84\u201390 (2017)","journal-title":"Commun. ACM"},{"key":"6_CR16","unstructured":"LeCun, Y., et\u00a0al.: LeNet-5, convolutional neural networks. 20(5), 14 (2015). http:\/\/yann.lecun.com\/exdb\/lenet"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Li, Y., Hua, J., Wang, H., Chen, C., Liu, Y.: DeepPayload: black-box backdoor attack on deep learning models through neural payload injection. In: 2021 IEEE\/ACM 43rd International Conference on Software Engineering (ICSE), pp. 263\u2013274. IEEE (2021)","DOI":"10.1109\/ICSE43902.2021.00035"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Lin, J., Xu, L., Liu, Y., Zhang, X.: Composite backdoor attack for deep neural network by mixing existing benign features. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 113\u2013131 (2020)","DOI":"10.1145\/3372297.3423362"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Liu, Y., Lee, W.C., Tao, G., Ma, S., Aafer, Y., Zhang, X.: ABS: scanning neural networks for back-doors by artificial brain stimulation. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 1265\u20131282 (2019)","DOI":"10.1145\/3319535.3363216"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Liu, Y., et al.: Trojaning attack on neural networks. In: 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, 18\u201321 February 2018. The Internet Society (2018)","DOI":"10.14722\/ndss.2018.23291"},{"key":"6_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/978-3-030-58607-2_11","volume-title":"Computer Vision \u2013 ECCV 2020","author":"Y Liu","year":"2020","unstructured":"Liu, Y., Ma, X., Bailey, J., Lu, F.: Reflection backdoor: a natural backdoor attack on deep neural networks. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12355, pp. 182\u2013199. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58607-2_11"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Ma, W., Wang, D., Sun, R., Xue, M., Wen, S., Xiang, Y.: The \u201cbeatrix\u201d resurrections: robust backdoor detection via gram matrices. arXiv preprint arXiv:2209.11715 (2022)","DOI":"10.14722\/ndss.2023.23069"},{"key":"6_CR23","unstructured":"Nguyen, A., Tran, A.: WaNet\u2013imperceptible warping-based backdoor attack. arXiv preprint arXiv:2102.10369 (2021)"},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Pang, R., et al.: A tale of evil twins: adversarial inputs versus poisoned models. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 85\u201399 (2020)","DOI":"10.1145\/3372297.3417253"},{"issue":"3","key":"6_CR25","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s11263-015-0816-y","volume":"115","author":"O Russakovsky","year":"2015","unstructured":"Russakovsky, O., et al.: ImageNet large scale visual recognition challenge. Int. J. Comput. Vision 115(3), 211\u2013252 (2015)","journal-title":"Int. J. Comput. Vision"},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Saha, A., Subramanya, A., Pirsiavash, H.: Hidden trigger backdoor attacks. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a034, pp. 11957\u201311965 (2020)","DOI":"10.1609\/aaai.v34i07.6871"},{"key":"6_CR27","doi-asserted-by":"crossref","unstructured":"Salem, A., Wen, R., Backes, M., Ma, S., Zhang, Y.: Dynamic backdoor attacks against machine learning models. In: 7th IEEE European Symposium on Security and Privacy, EuroS &P 2022, Genoa, Italy, June 6-10, 2022, pp. 703\u2013718. IEEE (2022)","DOI":"10.1109\/EuroSP53844.2022.00049"},{"key":"6_CR28","unstructured":"Shafahi, A., et al.: Poison frogs! Targeted clean-label poisoning attacks on neural networks. In: Advances in Neural Information Processing Systems, pp. 6103\u20136113 (2018)"},{"key":"6_CR29","unstructured":"Shen, G., et al.: Backdoor scanning for deep neural networks through k-arm optimization. In: International Conference on Machine Learning, pp. 9525\u20139536. PMLR (2021)"},{"key":"6_CR30","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. In: 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, 7\u20139 May 2015. Conference Track Proceedings (2015)"},{"key":"6_CR31","unstructured":"Souri, H., Goldblum, M., Fowl, L., Chellappa, R., Goldstein, T.: Sleeper agent: scalable hidden trigger backdoors for neural networks trained from scratch. arXiv preprint arXiv:2106.08970 (2021)"},{"key":"6_CR32","doi-asserted-by":"crossref","unstructured":"Tan, T.J.L., Shokri, R.: Bypassing backdoor detection algorithms in deep learning. In: IEEE European Symposium on Security and Privacy, EuroS &P 2020, Genoa, Italy, 7\u201311 September 2020, pp. 175\u2013183. IEEE (2020)","DOI":"10.1109\/EuroSP48549.2020.00019"},{"key":"6_CR33","unstructured":"Tang, D., Wang, X., Tang, H., Zhang, K.: Demon in the variant: Statistical analysis of DNNs for robust backdoor contamination detection. In: 30th USENIX Security Symposium (USENIX Security 2021), pp. 1541\u20131558 (2021)"},{"key":"6_CR34","unstructured":"Touvron, H., Cord, M., Douze, M., Massa, F., Sablayrolles, A., J\u00e9gou, H.: Training data-efficient image transformers & distillation through attention. In: International Conference on Machine Learning, pp. 10347\u201310357. PMLR (2021)"},{"key":"6_CR35","unstructured":"Tran, B., Li, J., Madry, A.: Spectral signatures in backdoor attacks. In: Advances in Neural Information Processing Systems, vol. 31 (2018)"},{"key":"6_CR36","unstructured":"Turner, A., Tsipras, D., Madry, A.: Clean-label backdoor attacks (2018)"},{"key":"6_CR37","doi-asserted-by":"crossref","unstructured":"Udeshi, S., Peng, S., Woo, G., Loh, L., Rawshan, L., Chattopadhyay, S.: Model agnostic defence against backdoor attacks in machine learning. IEEE Trans. Reliab. (2022)","DOI":"10.1109\/TR.2022.3159784"},{"key":"6_CR38","unstructured":"Vision, B., (BVLC), L.C.: Caffe model zoo (2017). https:\/\/github.com\/BVLC\/caffe\/wiki\/Model-Zoo"},{"key":"6_CR39","doi-asserted-by":"crossref","unstructured":"Wang, B., et al.: Neural cleanse: Identifying and mitigating backdoor attacks in neural networks. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 707\u2013723. IEEE (2019)","DOI":"10.1109\/SP.2019.00031"},{"key":"6_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/978-3-030-58592-1_14","volume-title":"Computer Vision \u2013 ECCV 2020","author":"R Wang","year":"2020","unstructured":"Wang, R., Zhang, G., Liu, S., Chen, P.-Y., Xiong, J., Wang, M.: Practical detection of trojan neural networks: data-limited and data-free cases. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12368, pp. 222\u2013238. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58592-1_14"},{"key":"6_CR41","unstructured":"Wang, Z., Mei, K., Zhai, J., Ma, S.: Unicorn: a unified backdoor trigger inversion framework. arXiv preprint arXiv:2304.02786 (2023)"},{"key":"6_CR42","unstructured":"Wu, D., Wang, Y.: Adversarial neuron pruning purifies backdoored deep models. Advances in Neural Information Processing Systems, vol. 34, pp. 16913\u201316925 (2021)"},{"key":"6_CR43","unstructured":"Xu, X., Wang, Q., Li, H., Borisov, N., Gunter, C.A., Li, B.: Detecting AI trojans using meta neural analysis. CoRR abs\/1910.03137 (2019)"},{"key":"6_CR44","doi-asserted-by":"crossref","unstructured":"Yu, Y., Wang, Y., Yang, W., Lu, S., Tan, Y.P., Kot, A.C.: Backdoor attacks against deep image compression via adaptive frequency trigger. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 12250\u201312259 (2023)","DOI":"10.1109\/CVPR52729.2023.01179"},{"key":"6_CR45","doi-asserted-by":"crossref","unstructured":"Zeng, Y., Pan, M., Just, H.A., Lyu, L., Qiu, M., Jia, R.: Narcissus: a practical clean-label backdoor attack with limited information. In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, pp. 771\u2013785 (2023)","DOI":"10.1145\/3576915.3616617"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-72970-6_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,22]],"date-time":"2024-11-22T11:11:19Z","timestamp":1732273879000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-72970-6_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,23]]},"ISBN":["9783031729690","9783031729706"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-72970-6_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,11,23]]},"assertion":[{"value":"23 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Milan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2024.ecva.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}