{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,26]],"date-time":"2025-04-26T05:07:31Z","timestamp":1745644051003,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031800191"},{"type":"electronic","value":"9783031800207"}],"license":[{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-80020-7_24","type":"book-chapter","created":{"date-parts":[[2024,12,14]],"date-time":"2024-12-14T08:02:29Z","timestamp":1734163349000},"page":"422-440","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Patch Based Backdoor Attack on\u00a0Deep Neural Networks"],"prefix":"10.1007","author":[{"given":"Debasmita","family":"Manna","sequence":"first","affiliation":[]},{"given":"Somanath","family":"Tripathy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,15]]},"reference":[{"key":"24_CR1","unstructured":"Ancona, M., Ceolini, E., Cengiz \u00d6ztireli, A., Gross, M.H.: A unified view of gradient-based attribution methods for deep neural networks. CoRR, abs\/1711.06104 (2017)"},{"key":"24_CR2","unstructured":"Brown, T.B., Man\u00e9, D., Roy, A., Abadi, M., Gilmer, J.: Adversarial patch (2018)"},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"Chindaudom, A., Siritanawan, P., Sumongkayothin, K., Kotani, K.: AdversarialQR: an adversarial patch in QR code format. In: 2020 Joint 9th International Conference on Informatics, Electronics & Vision (ICIEV) and 2020 4th International Conference on Imaging, Vision & Pattern Recognition (icIVPR), pp. 1\u20136 (2020)","DOI":"10.1109\/ICIEVicIVPR48672.2020.9306675"},{"key":"24_CR4","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples (2015)"},{"key":"24_CR5","doi-asserted-by":"publisher","first-page":"47230","DOI":"10.1109\/ACCESS.2019.2909068","volume":"7","author":"G Tianyu","year":"2019","unstructured":"Tianyu, G., Liu, K., Dolan-Gavitt, B., Garg, S.: Badnets: evaluating backdooring attacks on deep neural networks. IEEE Access 7, 47230\u201347244 (2019)","journal-title":"IEEE Access"},{"issue":"7777","key":"24_CR6","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1038\/d41586-019-03013-5","volume":"574","author":"D Heaven","year":"2019","unstructured":"Heaven, D.: Why deep-learning AIS are so easy to fool. Nature 574(7777), 163\u2013166 (2019)","journal-title":"Nature"},{"key":"24_CR7","volume-title":"Explainable AI Methods - A Brief Overview","author":"A Holzinger","year":"2020","unstructured":"Holzinger, A., Saranti, A., Molnar, C., Biecek, P., Samek, W.: Explainable AI Methods - A Brief Overview. Springer, Cham (2020)"},{"key":"24_CR8","unstructured":"Karmon, D., Zoran, D., Goldberg, Y.: LaVAN: localized and visible adversarial noise. In: Dy, J., Krause, A. (eds.) Proceedings of the 35th International Conference on Machine Learning. Proceedings of Machine Learning Research, vol.\u00a080, pp. 2507\u20132515. PMLR (2018)"},{"key":"24_CR9","doi-asserted-by":"crossref","unstructured":"Kurakin, A., Goodfellow, I., Bengio, S.: Adversarial examples in the physical world (2017)","DOI":"10.1201\/9781351251389-8"},{"issue":"1","key":"24_CR10","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/TAI.2021.3107807","volume":"3","author":"X Li","year":"2022","unstructured":"Li, X., Jiang, Y., Liu, C., Liu, S., Luo, H., Yin, S.: Playing against deep-neural-network-based object detectors: a novel bidirectional adversarial attack approach. IEEE Trans. Artif. Intell. 3(1), 20\u201328 (2022)","journal-title":"IEEE Trans. Artif. Intell."},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Lin, J., Xu, L., Liu, Y., Zhang, X.: Composite backdoor attack for deep neural network by mixing existing benign features. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 113\u2013131. ACM, New York (2020)","DOI":"10.1145\/3372297.3423362"},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"Liu, Y., et al.: Trojaning attack on neural networks. In: Network and Distributed System Security Symposium (2018)","DOI":"10.14722\/ndss.2018.23291"},{"key":"24_CR13","doi-asserted-by":"crossref","unstructured":"Lu, Y., Kamath, G., Yu, Y.: Indiscriminate data poisoning attacks on neural networks (2024)","DOI":"10.1109\/SaTML59370.2024.00023"},{"key":"24_CR14","doi-asserted-by":"crossref","unstructured":"Melamud, O., Goldberger, J., Dagan, I.: context2vec: learning generic context embedding with bidirectional LSTM. In: Proceedings of the 20th SIGNLL Conference on Computational Natural Language Learning, Berlin, Germany, pp. 51\u201361. Association for Computational Linguistics (2016)","DOI":"10.18653\/v1\/K16-1006"},{"key":"24_CR15","unstructured":"Mikolov, T., Sutskever, I., Chen, K., Corrado, G.S., Dean, J.: Distributed representations of words and phrases and their compositionality. In: Advances in Neural Information Processing Systems, vol.\u00a026. Curran Associates, Inc. (2013)"},{"issue":"6","key":"24_CR16","doi-asserted-by":"publisher","first-page":"1236","DOI":"10.1093\/bib\/bbx044","volume":"19","author":"R Miotto","year":"2017","unstructured":"Miotto, R., Wang, F., Wang, S., Jiang, X., Dudley, J.T.: Deep learning for healthcare: review, opportunities and challenges. Briefings Bioinform. 19(6), 1236\u20131246 (2017)","journal-title":"Briefings Bioinform."},{"key":"24_CR17","first-page":"66","volume":"6","author":"C Mishra","year":"2017","unstructured":"Mishra, C., Gupta, D.: Deep machine learning and neural networks: an overview. IAES Int. J. Artif. Intell. (IJ-AI) 6, 66 (2017)","journal-title":"IAES Int. J. Artif. Intell. (IJ-AI)"},{"key":"24_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.dsp.2017.10.011","volume":"73","author":"G Montavon","year":"2018","unstructured":"Montavon, G., Samek, W., M\u00fcller, K.-R.: Methods for interpreting and understanding deep neural networks. Digit. Signal Process. 73, 1\u201315 (2018)","journal-title":"Digit. Signal Process."},{"issue":"10","key":"24_CR19","doi-asserted-by":"publisher","first-page":"1548","DOI":"10.1109\/LED.2020.3016119","volume":"41","author":"O Min-Hye","year":"2020","unstructured":"Min-Hye, O., Kwon, M.-W., Park, K., Park, B.-G.: Sensitivity analysis based on neural network for optimizing device characteristics. IEEE Electron Dev. Lett. 41(10), 1548\u20131551 (2020)","journal-title":"IEEE Electron Dev. Lett."},{"key":"24_CR20","doi-asserted-by":"crossref","unstructured":"Parkhi, O.M., Vedaldi, A., Zisserman, A.: Deep face recognition. In: British Machine Vision Conference (2015)","DOI":"10.5244\/C.29.41"},{"key":"24_CR21","doi-asserted-by":"crossref","unstructured":"Saha, A., Subramanya, A., Pirsiavash, H.: Hidden trigger backdoor attacks. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 34, pp. 11957\u201311965 (2020)","DOI":"10.1609\/aaai.v34i07.6871"},{"key":"24_CR22","unstructured":"Salem, A., Backes, M., Zhang, Y.: Don\u2019t trigger me! a triggerless backdoor attack against deep neural networks. CoRR, abs\/2010.03282 (2020)"},{"key":"24_CR23","unstructured":"Shafahi, A., et al.: Poison frogs! targeted clean-label poisoning attacks on neural networks. In: Advances in Neural Information Processing Systems, vol. 31 (2018)"},{"key":"24_CR24","doi-asserted-by":"crossref","unstructured":"Sun, W., et al.: Invisible backdoor attack with dynamic triggers against person re-identification (2023)","DOI":"10.1109\/TIFS.2023.3322659"},{"issue":"3","key":"24_CR25","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1016\/S0957-4174(98)00041-4","volume":"15","author":"AH Sung","year":"1998","unstructured":"Sung, A.H.: Ranking importance of input parameters of neural networks. Expert Syst. Appl. 15(3), 405\u2013411 (1998)","journal-title":"Expert Syst. Appl."},{"key":"24_CR26","doi-asserted-by":"crossref","unstructured":"Tang, R., Du, M., Liu, N., Yang, F., Hu, X.: An embarrassingly simple approach for trojan attack in deep neural networks. In: Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 218\u2013228. ACM, New York (2020)","DOI":"10.1145\/3394486.3403064"},{"key":"24_CR27","doi-asserted-by":"crossref","unstructured":"Wang, X., Zhao, Y., Pourpanah, F.: Recent advances in deep learning. Int. J. Mach. Learn. Cybern. (2020)","DOI":"10.1007\/s13042-020-01096-5"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-80020-7_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,14]],"date-time":"2024-12-14T08:06:23Z","timestamp":1734163583000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-80020-7_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,15]]},"ISBN":["9783031800191","9783031800207"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-80020-7_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,12,15]]},"assertion":[{"value":"15 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICISS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jaipur","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciss2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iciss.isrdc.in","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}