{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T16:41:32Z","timestamp":1777653692314,"version":"3.51.4"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031730207","type":"print"},{"value":"9783031730214","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,11,21]],"date-time":"2024-11-21T00:00:00Z","timestamp":1732147200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,21]],"date-time":"2024-11-21T00:00:00Z","timestamp":1732147200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-73021-4_24","type":"book-chapter","created":{"date-parts":[[2024,11,20]],"date-time":"2024-11-20T09:13:52Z","timestamp":1732094032000},"page":"405-421","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["SSL-Cleanse: Trojan Detection and\u00a0Mitigation in\u00a0Self-Supervised Learning"],"prefix":"10.1007","author":[{"given":"Mengxin","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Jiaqi","family":"Xue","sequence":"additional","affiliation":[]},{"given":"Zihao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xun","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Qian","family":"Lou","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Xiaofeng","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,21]]},"reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"Al\u00a0Ghanim, M., Santriaji, M., Lou, Q., Solihin, Y.: Trojbits: a hardware aware inference-time attack on transformer-based language models. In: ECAI 2023, pp. 60\u201368. IOS Press (2023)","DOI":"10.3233\/FAIA230254"},{"issue":"1","key":"24_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2733381","volume":"10","author":"RJ Campello","year":"2015","unstructured":"Campello, R.J., Moulavi, D., Zimek, A., Sander, J.: Hierarchical density estimates for data clustering, visualization, and outlier detection. ACM Trans. Knowl. Discov. Data (TKDD) 10(1), 1\u201351 (2015)","journal-title":"ACM Trans. Knowl. Discov. Data (TKDD)"},{"key":"24_CR3","unstructured":"Chen, T., Kornblith, S., Norouzi, M., Hinton, G.: A simple framework for contrastive learning of visual representations. In: International Conference on Machine Learning, pp. 1597\u20131607. PMLR (2020)"},{"key":"24_CR4","unstructured":"Chen, X., Fan, H., Girshick, R., He, K.: Improved baselines with momentum contrastive learning. arXiv preprint arXiv:2003.04297 (2020)"},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"Chen, X., He, K.: Exploring simple siamese representation learning. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 15750\u201315758 (2021)","DOI":"10.1109\/CVPR46437.2021.01549"},{"key":"24_CR6","unstructured":"Coates, A., Ng, A., Lee, H.: An analysis of single-layer networks in unsupervised feature learning. In: Proceedings of the Fourteenth International Conference on Artificial Intelligence and Statistics, pp. 215\u2013223. JMLR Workshop and Conference Proceedings (2011)"},{"key":"24_CR7","doi-asserted-by":"publisher","unstructured":"Deng, J., Dong, W., Socher, R., Li, L., Li, K., Fei-Fei, L.: Imagenet: a large-scale hierarchical image database. In: 2009 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2009), 20\u201325 June 2009, Miami, Florida, USA, pp. 248\u2013255. IEEE Computer Society (2009). https:\/\/doi.org\/10.1109\/CVPR.2009.5206848","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"Feng, S., et al.: Detecting backdoors in pre-trained encoders. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 16352\u201316362 (2023)","DOI":"10.1109\/CVPR52729.2023.01569"},{"key":"24_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jmva.2014.11.009","volume":"135","author":"YA Ghassabeh","year":"2015","unstructured":"Ghassabeh, Y.A.: A sufficient condition for the convergence of the mean shift algorithm with gaussian kernel. J. Multivar. Anal. 135, 1\u201310 (2015)","journal-title":"J. Multivar. Anal."},{"key":"24_CR10","first-page":"21271","volume":"33","author":"JB Grill","year":"2020","unstructured":"Grill, J.B., et al.: Bootstrap your own latent-a new approach to self-supervised learning. Adv. Neural. Inf. Process. Syst. 33, 21271\u201321284 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"He, K., Fan, H., Wu, Y., Xie, S., Girshick, R.: Momentum contrast for unsupervised visual representation learning. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 9729\u20139738 (2020)","DOI":"10.1109\/CVPR42600.2020.00975"},{"key":"24_CR12","doi-asserted-by":"publisher","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016, Las Vegas, NV, USA, 27\u201330 June 2016, pp. 770\u2013778. IEEE Computer Society (2016). https:\/\/doi.org\/10.1109\/CVPR.2016.90","DOI":"10.1109\/CVPR.2016.90"},{"issue":"1","key":"24_CR13","doi-asserted-by":"publisher","first-page":"2","DOI":"10.3390\/technologies9010002","volume":"9","author":"A Jaiswal","year":"2020","unstructured":"Jaiswal, A., Babu, A.R., Zadeh, M.Z., Banerjee, D., Makedon, F.: A survey on contrastive self-supervised learning. Technologies 9(1), 2 (2020)","journal-title":"Technologies"},{"key":"24_CR14","doi-asserted-by":"crossref","unstructured":"Jia, J., Liu, Y., Gong, N.Z.: Badencoder: backdoor attacks to pre-trained encoders in self-supervised learning. arXiv preprint arXiv:2108.00352 (2021)","DOI":"10.1109\/SP46214.2022.9833644"},{"key":"24_CR15","doi-asserted-by":"crossref","unstructured":"Kolouri, S., Saha, A., Pirsiavash, H., Hoffmann, H.: Universal litmus patterns: revealing backdoor attacks in CNNs. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 301\u2013310 (2020)","DOI":"10.1109\/CVPR42600.2020.00038"},{"key":"24_CR16","doi-asserted-by":"crossref","unstructured":"Krishnan, R., Rajpurkar, P., Topol, E.J.: Self-supervised learning in medicine and healthcare. Nat. Biomed. Eng. 1\u20137 (2022)","DOI":"10.1038\/s41551-022-00914-1"},{"key":"24_CR17","unstructured":"Krizhevsky, A.: Learning multiple layers of features from tiny images. Technical report, University of Toronto (2009)"},{"key":"24_CR18","unstructured":"Lan, Z., Chen, M., Goodman, S., Gimpel, K., Sharma, P., Soricut, R.: Albert: a lite bert for self-supervised learning of language representations. arXiv preprint arXiv:1909.11942 (2019)"},{"key":"24_CR19","unstructured":"Li, C., et al.: Demystifying self-supervised trojan attacks. arXiv preprint arXiv:2210.07346 (2022)"},{"key":"24_CR20","unstructured":"Liu, H., Jia, J., Gong, N.Z.: Poisonedencoder: poisoning the unlabeled pre-training data in contrastive learning. arXiv preprint arXiv:2205.06401 (2022)"},{"key":"24_CR21","doi-asserted-by":"crossref","unstructured":"Liu, Y., Lee, W.C., Tao, G., Ma, S., Aafer, Y., Zhang, X.: ABS: scanning neural networks for back-doors by artificial brain stimulation. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 1265\u20131282 (2019)","DOI":"10.1145\/3319535.3363216"},{"key":"24_CR22","doi-asserted-by":"crossref","unstructured":"Liu, Y., et al.: Graph self-supervised learning: a survey. IEEE Trans. Knowl. Data Eng. (2022)","DOI":"10.1109\/TKDE.2022.3172903"},{"key":"24_CR23","unstructured":"Lou, Q., Liu, Y., Feng, B.: Trojtext: test-time invisible textual trojan insertion. In: The Eleventh International Conference on Learning Representations (2023)"},{"key":"24_CR24","unstructured":"Pan, M., Zeng, Y., Lyu, L., Lin, X., Jia, R.: Asset: robust backdoor data detection across a multiplicity of deep learning paradigms. arXiv preprint arXiv:2302.11408 (2023)"},{"key":"24_CR25","doi-asserted-by":"crossref","unstructured":"Saha, A., Tejankar, A., Koohpayegani, S.A., Pirsiavash, H.: Backdoor attacks on self-supervised learning. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 13337\u201313346 (2022)","DOI":"10.1109\/CVPR52688.2022.01298"},{"key":"24_CR26","doi-asserted-by":"publisher","unstructured":"Satopaa, V., Albrecht, J.R., Irwin, D.E., Raghavan, B.: Finding a \u201ckneedle\u201d in a haystack: detecting knee points in system behavior. In: 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 20\u201324 June 2011, Minneapolis, Minnesota, USA, pp. 166\u2013171. IEEE Computer Society (2011). https:\/\/doi.org\/10.1109\/ICDCSW.2011.20","DOI":"10.1109\/ICDCSW.2011.20"},{"key":"24_CR27","doi-asserted-by":"publisher","first-page":"80716","DOI":"10.1109\/ACCESS.2020.2988796","volume":"8","author":"KP Sinaga","year":"2020","unstructured":"Sinaga, K.P., Yang, M.S.: Unsupervised k-means clustering algorithm. IEEE Access 8, 80716\u201380727 (2020)","journal-title":"IEEE Access"},{"key":"24_CR28","doi-asserted-by":"crossref","unstructured":"Stallkamp, J., Schlipsing, M., Salmen, J., Igel, C.: The German traffic sign recognition benchmark: a multi-class classification competition. In: The 2011 International Joint Conference on Neural Networks, pp. 1453\u20131460. IEEE (2011)","DOI":"10.1109\/IJCNN.2011.6033395"},{"key":"24_CR29","doi-asserted-by":"crossref","unstructured":"Tejankar, A., Sanjabi, M., Wang, Q., Wang, S., Firooz, H., Pirsiavash, H., Tan, L.: Defending against patch-based backdoor attacks on self-supervised learning. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 12239\u201312249 (2023)","DOI":"10.1109\/CVPR52729.2023.01178"},{"key":"24_CR30","doi-asserted-by":"crossref","unstructured":"Wang, B., et al.: Neural cleanse: identifying and mitigating backdoor attacks in neural networks. In: Proceedings of the IEEE Symposium on Security and Privacy (IEEE S &P), San Francisco, CA (2019)","DOI":"10.1109\/SP.2019.00031"},{"key":"24_CR31","doi-asserted-by":"crossref","unstructured":"Wu, J., Zhang, T., Zha, Z.J., Luo, J., Zhang, Y., Wu, F.: Self-supervised domain-aware generative network for generalized zero-shot learning. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 12767\u201312776 (2020)","DOI":"10.1109\/CVPR42600.2020.01278"},{"key":"24_CR32","unstructured":"Xue, J., Lou, Q.: Estas: effective and stable trojan attacks in self-supervised encoders with one target unlabelled sample. arXiv preprint arXiv:2211.10908 (2022)"},{"key":"24_CR33","unstructured":"Yaman, B., Hosseini, S.A.H., Ak\u00e7akaya, M.: Zero-shot self-supervised learning for mri reconstruction. arXiv preprint arXiv:2102.07737 (2021)"},{"key":"24_CR34","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1007\/978-981-99-9785-5_32","volume-title":"AIS &P 2023","author":"H Yang","year":"2023","unstructured":"Yang, H., et al.: SSL-ABD: an adversarial defense method against backdoor attacks in self-supervised learning. In: Vaidya, J., Gabbouj, M., Li, J. (eds.) AIS &P 2023. LNCS, vol. 14509, pp. 456\u2013467. Springer, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-99-9785-5_32"},{"key":"24_CR35","unstructured":"Zhang, J., Liu, H., Jia, J., Gong, N.Z.: Corruptencoder: data poisoning based backdoor attacks to contrastive learning. arXiv preprint arXiv:2211.08229 (2022)"},{"key":"24_CR36","doi-asserted-by":"crossref","unstructured":"Zheng, M., Lou, Q., Jiang, L.: Trojvit: trojan insertion in vision transformers. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4025\u20134034 (2023)","DOI":"10.1109\/CVPR52729.2023.00392"},{"key":"24_CR37","unstructured":"Zheng, M., Xue, J., Sheng, Y., Yang, L., Lou, Q., Jiang, L.: Trojfair: trojan fairness attacks. arXiv preprint arXiv:2312.10508 (2023)"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-73021-4_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,20]],"date-time":"2024-11-20T09:47:43Z","timestamp":1732096063000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-73021-4_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,21]]},"ISBN":["9783031730207","9783031730214"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-73021-4_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,21]]},"assertion":[{"value":"21 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Milan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2024.ecva.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}