{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T01:25:24Z","timestamp":1742952324710,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031781094"},{"type":"electronic","value":"9783031781100"}],"license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-78110-0_18","type":"book-chapter","created":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T21:52:49Z","timestamp":1733089969000},"page":"276-290","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Composite Concept Extraction Through Backdooring"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7306-9402","authenticated-orcid":false,"given":"Banibrata","family":"Ghosh","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9918-381X","authenticated-orcid":false,"given":"Haripriya","family":"Harikumar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1610-8206","authenticated-orcid":false,"given":"Khoa D.","family":"Doan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8675-6631","authenticated-orcid":false,"given":"Svetha","family":"Venkatesh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2247-850X","authenticated-orcid":false,"given":"Santu","family":"Rana","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,2]]},"reference":[{"key":"18_CR1","unstructured":"Adi, Y., Baum, C., Cisse, M., Pinkas, B.,Keshet, J.: Turning your weakness into a strength: Watermarking deep neural networks by backdooring. In: 27th USENIX Security Symposium (USENIX Security 18), pp. 1615\u20131631 (2018)"},{"key":"18_CR2","unstructured":"Chen, X., Liu, C., Li, B., Lu, K., Song, D.: Targeted backdoor attacks on deep learning systems using data poisoning. arXiv preprint arXiv:1712.05526 (2017)"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Do, K., et al.: Towards effective and robust neural trojan defenses via input filtering. In: European Conference on Computer Vision, pp. 283\u2013300. Springer, Heidelberg (2022)","DOI":"10.1007\/978-3-031-20065-6_17"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Doan, B.G., Abbasnejad, E., Ranasinghe, D.C.: Februus: input purification defense against trojan attacks on deep neural network systems. In: Annual Computer Security Applications Conference, pp. 897\u2013912 (2020)","DOI":"10.1145\/3427228.3427264"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Doan, K., Lao, Y., Zhao, W., Li, P.: Lira: learnable, imperceptible and robust backdoor attacks. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 11966\u201311976 (2021)","DOI":"10.1109\/ICCV48922.2021.01175"},{"key":"18_CR6","unstructured":"Fu, C., et al.: Freeeagle: detecting complex neural trojans in data-free cases. In: 32nd USENIX Security Symposium, pp. 6399\u20136416 (2023)"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Gao, Y., et al.: Strip: a defence against trojan attacks on deep neural networks. In: Proceedings of the 35th Annual Computer Security Applications Conference, pp. 113\u2013125 (2019)","DOI":"10.1145\/3359789.3359790"},{"key":"18_CR8","unstructured":"Garipov, T., Izmailov, P., Podoprikhin, D., Vetrov, D.P., Wilson, A.G.: Loss surfaces, mode connectivity, and fast ensembling of dnns. Adv. Neural Inf. Process. Syst. 31 (2018)"},{"key":"18_CR9","unstructured":"Gu, T., Dolan-Gavitt, B., Garg, S.: Badnets: identifying vulnerabilities in the machine learning model supply chain. arXiv preprint arXiv:1708.06733 (2017)"},{"key":"18_CR10","doi-asserted-by":"publisher","first-page":"47230","DOI":"10.1109\/ACCESS.2019.2909068","volume":"7","author":"G Tianyu","year":"2019","unstructured":"Tianyu, G., Liu, K., Dolan-Gavitt, B., Garg, S.: Badnets: evaluating backdooring attacks on deep neural networks. IEEE Access 7, 47230\u201347244 (2019)","journal-title":"IEEE Access"},{"key":"18_CR11","unstructured":"Han, C., Mao, J., Gan, C., Tenenbaum, J., Wu, J.: Visual concept-metaconcept learning. Adv. Neural Inf. Process. Syst. 32 (2019)"},{"key":"18_CR12","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/978-3-030-67661-2_18","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"H Harikumar","year":"2021","unstructured":"Harikumar, H., Le, V., Rana, S., Bhattacharya, S., Gupta, S., Venkatesh, S.: Scalable backdoor detection in neural networks. In: Hutter, F., Kersting, K., Lijffijt, J., Valera, I. (eds.) ECML PKDD 2020. LNCS (LNAI), vol. 12458, pp. 289\u2013304. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-67661-2_18"},{"key":"18_CR13","unstructured":"Harikumar, H., Do, K., Rana, S., Gupta, S., Venkatesh, S.: Semantic host-free trojan attack. arXiv preprint arXiv:2110.13414 (2021)"},{"key":"18_CR14","unstructured":"Harikumar, H., et al.: Defense against multi-target trojan attacks. arXiv preprint arXiv:2207.03895 (2022)"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Hu, H., Salcic, Z., Dobbie, G., Chen, J., Sun, L., Zhang, X.: Membership inference via backdooring. arXiv preprint arXiv:2206.04823 (2022)","DOI":"10.24963\/ijcai.2022\/532"},{"key":"18_CR16","first-page":"71029","volume":"36","author":"R Jha","year":"2023","unstructured":"Jha, R., Hayase, J., Sewoong, O.: Label poisoning is all you need. Adv. Neural. Inf. Process. Syst. 36, 71029\u201371052 (2023)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Li, X., Yang, X., Wei, K., Deng, C., Yang, M.: Siamese contrastive embedding network for compositional zero-shot learning. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 9326\u20139335 (2022)","DOI":"10.1109\/CVPR52688.2022.00911"},{"key":"18_CR18","unstructured":"Li, Y., Lyu, X., Koren, N., Lyu, L., Li, B., Ma, X.: Neural attention distillation: erasing backdoor triggers from deep neural networks. In: International Conference on Learning Representations (2021)"},{"key":"18_CR19","unstructured":"Li, Y., Lyu, X., Ma, X., Koren, N., Lyu, L., Li, B., Jiang, Y.G.: Reconstructive neuron pruning for backdoor defense. In: International Conference on Machine Learning, pp. 19837\u201319854. PMLR (2023)"},{"key":"18_CR20","first-page":"13238","volume":"35","author":"Y Li","year":"2022","unstructured":"Li, Y., Bai, Y., Jiang, Y., Yang, Y., Xia, S.-T., Li, B.: Untargeted backdoor watermark: towards harmless and stealthy dataset copyright protection. Adv. Neural. Inf. Process. Syst. 35, 13238\u201313250 (2022)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"18_CR21","doi-asserted-by":"publisher","first-page":"2318","DOI":"10.1109\/TIFS.2023.3265535","volume":"18","author":"Y Li","year":"2023","unstructured":"Li, Y., Zhu, M., Yang, X., Jiang, Y., Wei, T., Xia, S.T.: Black-box dataset ownership verification via backdoor watermarking. IEEE Trans. Inf. Forensics Secur. 18, 2318\u20132332 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"18_CR22","doi-asserted-by":"crossref","unstructured":"Liu, Y., Lee, W.C., Tao, G., Ma, S., Aafer, Y., Zhang, X.: ABS: scanning neural networks for back-doors by artificial brain stimulation. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 1265\u20131282 (2019)","DOI":"10.1145\/3319535.3363216"},{"key":"18_CR23","doi-asserted-by":"crossref","unstructured":"Malinowski, M., Rohrbach, M., Fritz, M.: Ask your neurons: a neural-based approach to answering questions about images. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 1\u20139 (2015)","DOI":"10.1109\/ICCV.2015.9"},{"key":"18_CR24","doi-asserted-by":"crossref","unstructured":"Mancini, M., Naeem, M.F., Xian, Y., Akata, Z.: Open world compositional zero-shot learning. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 5222\u20135230 (2021)","DOI":"10.1109\/CVPR46437.2021.00518"},{"key":"18_CR25","unstructured":"Mei, L., Mao, J., Wang, Z., Gan, C., Tenenbaum, J.B.: Falcon: fast visual concept learning by integrating images, linguistic descriptions, and conceptual relations. arXiv preprint arXiv:2203.16639 (2022)"},{"key":"18_CR26","doi-asserted-by":"crossref","unstructured":"Misra, I., Gupta, A., Hebert, M.: From red wine to red tomato: composition with context. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1792\u20131801 (2017)","DOI":"10.1109\/CVPR.2017.129"},{"key":"18_CR27","first-page":"3454","volume":"33","author":"Tuan Anh Nguyen and Anh Tran","year":"2020","unstructured":"Tuan Anh Nguyen and Anh Tran: Input-aware dynamic backdoor attack. Adv. Neural. Inf. Process. Syst. 33, 3454\u20133464 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"18_CR28","unstructured":"Radford, A., et\u00a0al.: Learning transferable visual models from natural language supervision. In: International Conference on Machine Learning (2021)"},{"key":"18_CR29","doi-asserted-by":"crossref","unstructured":"Saha, A., Subramanya, A., Pirsiavash, H.: Hidden trigger backdoor attacks. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 34, pp. 11957\u201311965 (2020)","DOI":"10.1609\/aaai.v34i07.6871"},{"key":"18_CR30","doi-asserted-by":"crossref","unstructured":"Selvaraju, R.R., Cogswell, M., Das, A., Vedantam, R., Parikh, D., Batra, D.: Grad-cam: visual explanations from deep networks via gradient-based localization. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 618\u2013626 (2017)","DOI":"10.1109\/ICCV.2017.74"},{"key":"18_CR31","doi-asserted-by":"crossref","unstructured":"Shan, S., Wenger, E., Wang, B., Li, B., Zheng, H., Zhao, B.Y.: Gotta catch\u2019em all: Using honeypots to catch adversarial attacks on neural networks. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 67\u201383 (2020)","DOI":"10.1145\/3372297.3417231"},{"key":"18_CR32","unstructured":"Sommer, D.M., Song, L., Wagh, S., Mittal, P.: Towards probabilistic verification of machine unlearning. arXiv preprint arXiv:2003.04247 (2020)"},{"key":"18_CR33","doi-asserted-by":"crossref","unstructured":"Wang, B., et al.: Neural cleanse: identifying and mitigating backdoor attacks in neural networks. In: IEEE Symposium on Security and Privacy, pp. 707\u2013723. IEEE (2019)","DOI":"10.1109\/SP.2019.00031"},{"key":"18_CR34","doi-asserted-by":"crossref","unstructured":"Wenger, E., et al.: Backdoor attacks against deep learning systems in the physical world. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 6206\u20136215 (2021)","DOI":"10.1109\/CVPR46437.2021.00614"},{"key":"18_CR35","first-page":"16913","volume":"34","author":"W Dongxian","year":"2021","unstructured":"Dongxian, W., Wang, Y.: Adversarial neuron pruning purifies backdoored deep models. Adv. Neural. Inf. Process. Syst. 34, 16913\u201316925 (2021)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"18_CR36","doi-asserted-by":"crossref","unstructured":"Yang, J., Lu, J., Lee, S., Batra, D., Parikh, D.: Graph R-CNN for scene graph generation. In: Proceedings of the European Conference on Computer Vision (2018)","DOI":"10.1007\/978-3-030-01246-5_41"},{"key":"18_CR37","first-page":"18667","volume":"35","author":"R Zheng","year":"2022","unstructured":"Zheng, R., Tang, R., Li, J., Liu, L.: Pre-activation distributions expose backdoor neurons. Adv. Neural. Inf. Process. Syst. 35, 18667\u201318680 (2022)","journal-title":"Adv. Neural. Inf. Process. Syst."}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-78110-0_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T23:34:02Z","timestamp":1733096042000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-78110-0_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"ISBN":["9783031781094","9783031781100"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-78110-0_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICPR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Pattern Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kolkata","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icpr2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icpr2024.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}