{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T01:10:23Z","timestamp":1743383423782,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":50,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819626403","type":"print"},{"value":"9789819626410","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-2641-0_21","type":"book-chapter","created":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:57:08Z","timestamp":1743382628000},"page":"308-323","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Mitigating Backdoor Attacks Using Activation-Guided Model Editing"],"prefix":"10.1007","author":[{"given":"Felix","family":"Hsieh","sequence":"first","affiliation":[]},{"given":"Huy H.","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"AprilPyone","family":"MaungMaung","sequence":"additional","affiliation":[]},{"given":"Dmitrii","family":"Usynin","sequence":"additional","affiliation":[]},{"given":"Isao","family":"Echizen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,29]]},"reference":[{"key":"21_CR1","unstructured":"Bagdasaryan, E., Veit, A., Hua, Y., Estrin, D., Shmatikov, V.: How to backdoor federated learning. In: International Conference on Artificial Intelligence and Statistics, pp. 2938\u20132948. PMLR (2020)"},{"issue":"9","key":"21_CR2","doi-asserted-by":"crossref","first-page":"3203","DOI":"10.1007\/s10994-022-06178-9","volume":"111","author":"T Baumhauer","year":"2022","unstructured":"Baumhauer, T., Sch\u00f6ttle, P., Zeppelzauer, M.: Machine unlearning: Linear filtration for logit-based classifiers. Mach. Learn. 111(9), 3203\u20133226 (2022)","journal-title":"Mach. Learn."},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"Bourtoule, L., et al.: Machine unlearning (2020)","DOI":"10.1109\/SP40001.2021.00019"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Cao, Y., Yang, J.: Towards making systems forget with machine unlearning. In: 2015 IEEE Symposium on Security and Privacy, pp. 463\u2013480. IEEE (2015)","DOI":"10.1109\/SP.2015.35"},{"key":"21_CR5","unstructured":"Chen, B., et al.: Detecting backdoor attacks on deep neural networks by activation clustering (2018)"},{"key":"21_CR6","unstructured":"Darlow, L.N., Crowley, E.J., Antoniou, A., Storkey, A.J.: CINIC-10 is not ImageNet or CIFAR-10. arXiv preprint arXiv:1810.03505 (2018)"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Doan, B.G., Abbasnejad, E., Ranasinghe, D.C.: Februus: Input purification defense against trojan attacks on deep neural network systems. In: Proceedings of the 36th Annual Computer Security Applications Conference, pp. 897\u2013912 (2020)","DOI":"10.1145\/3427228.3427264"},{"key":"21_CR8","unstructured":"Dosovitskiy, A., et al.: An image is worth 16x16 words: transformers for image recognition at scale (2021)"},{"key":"21_CR9","unstructured":"Du, M., Jia, R., Song, D.: Robust anomaly detection and backdoor attack detection via differential privacy. arXiv preprint arXiv:1911.07116 (2019)"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Gao, Y., Xu, C., Wang, D., Chen, S., Ranasinghe, D.C., Nepal, S.: STRIP: a defence against trojan attacks on deep neural networks (2020)","DOI":"10.1145\/3359789.3359790"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Golatkar, A., Achille, A., Soatto, S.: Eternal sunshine of the spotless net: selective forgetting in deep networks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 9304\u20139312 (2020)","DOI":"10.1109\/CVPR42600.2020.00932"},{"key":"21_CR12","unstructured":"Goodfellow, I.J., Bengio, Y., Courville, A.: Deep Learning. MIT Press, Cambridge, MA, USA (2016). http:\/\/www.deeplearningbook.org"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Graves, L., Nagisetty, V., Ganesh, V.: Amnesiac machine learning (2020)","DOI":"10.1609\/aaai.v35i13.17371"},{"key":"21_CR14","unstructured":"Gu, T., Dolan-Gavitt, B., Garg, S.: BadNets: identifying vulnerabilities in the machine learning model supply chain (2019)"},{"key":"21_CR15","doi-asserted-by":"crossref","first-page":"47230","DOI":"10.1109\/ACCESS.2019.2909068","volume":"7","author":"T Gu","year":"2019","unstructured":"Gu, T., Liu, K., Dolan-Gavitt, B., Garg, S.: BadNets: evaluating backdooring attacks on deep neural networks. IEEE Access 7, 47230\u201347244 (2019)","journal-title":"IEEE Access"},{"key":"21_CR16","unstructured":"Guo, C., Goldstein, T., Hannun, A., Van Der\u00a0Maaten, L.: Certified data removal from machine learning models. arXiv preprint arXiv:1911.03030 (2019)"},{"key":"21_CR17","first-page":"16319","volume":"34","author":"V Gupta","year":"2021","unstructured":"Gupta, V., Jung, C., Neel, S., Roth, A., Sharifi-Malvajerdi, S., Waites, C.: Adaptive machine unlearning. Adv. Neural. Inf. Process. Syst. 34, 16319\u201316330 (2021)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"21_CR18","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition (2015)","DOI":"10.1109\/CVPR.2016.90"},{"key":"21_CR19","unstructured":"Hong, S., Chandrasekaran, V., Kaya, Y., Dumitra\u015f, T., Papernot, N.: On the effectiveness of mitigating data poisoning attacks with gradient shaping. arXiv preprint arXiv:2002.11497 (2020)"},{"key":"21_CR20","doi-asserted-by":"crossref","unstructured":"Howard, A., et al.: Searching for MobileNetV3 (2019)","DOI":"10.1109\/ICCV.2019.00140"},{"key":"21_CR21","unstructured":"Ilharco, G., et al.: Editing models with task arithmetic (2023)"},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"Kolouri, S., Saha, A., Pirsiavash, H., Hoffmann, H.: Universal litmus patterns: revealing backdoor attacks in CNNs (2020)","DOI":"10.1109\/CVPR42600.2020.00038"},{"key":"21_CR23","unstructured":"Krizhevsky, A., Hinton, G., et\u00a0al.: Learning multiple layers of features from tiny images, Master\u2019s thesis, University of Tront (2009)"},{"key":"21_CR24","doi-asserted-by":"crossref","unstructured":"Kumar, R.S.S., et al.: Adversarial machine learning-industry perspectives. In: 2020 IEEE Security and Privacy Workshops (SPW), pp. 69\u201375. IEEE (2020)","DOI":"10.1109\/SPW50608.2020.00028"},{"key":"21_CR25","unstructured":"Le, Y., Yang, X.: Tiny ImageNet visual recognition challenge. CS 231N 7(7), 3 (2015)"},{"issue":"11","key":"21_CR26","doi-asserted-by":"crossref","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y LeCun","year":"1998","unstructured":"LeCun, Y., Bottou, L., Bengio, Y., Haffner, P.: Gradient-based learning applied to document recognition. Proc. IEEE 86(11), 2278\u20132324 (1998)","journal-title":"Proc. IEEE"},{"key":"21_CR27","doi-asserted-by":"crossref","unstructured":"Li, S., Xue, M., Zhao, B.Z.H., Zhu, H., Zhang, X.: Invisible backdoor attacks on deep neural networks via steganography and regularization (2020)","DOI":"10.1109\/TDSC.2020.3021407"},{"key":"21_CR28","unstructured":"Li, Y., Lyu, X., Koren, N., Lyu, L., Li, B., Ma, X.: Neural attention distillation: erasing backdoor triggers from deep neural networks (2021)"},{"key":"21_CR29","unstructured":"Li, Y., Jiang, Y., Li, Z., Xia, S.T.: Backdoor learning: a survey (2022)"},{"key":"21_CR30","doi-asserted-by":"crossref","unstructured":"Li, Y., Li, Y., Wu, B., Li, L., He, R., Lyu, S.: Invisible backdoor attack with sample-specific triggers. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 16463\u201316472 (2021)","DOI":"10.1109\/ICCV48922.2021.01615"},{"key":"21_CR31","doi-asserted-by":"crossref","unstructured":"Lin, J., Xu, L., Liu, Y., Zhang, X.: Composite backdoor attack for deep neural network by mixing existing benign features. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 113\u2013131 (2020)","DOI":"10.1145\/3372297.3423362"},{"key":"21_CR32","doi-asserted-by":"crossref","unstructured":"Liu, K., Dolan-Gavitt, B., Garg, S.: Fine-pruning: defending against backdooring attacks on deep neural networks (2018)","DOI":"10.1007\/978-3-030-00470-5_13"},{"key":"21_CR33","doi-asserted-by":"crossref","unstructured":"Liu, Y., et al.: Backdoor defense with machine unlearning (2022)","DOI":"10.1109\/INFOCOM48880.2022.9796974"},{"key":"21_CR34","doi-asserted-by":"crossref","unstructured":"Liu, Y., et al.: Trojaning attack on neural networks. In: Network and Distributed System Security Symposium (2018). https:\/\/api.semanticscholar.org\/CorpusID:31806516","DOI":"10.14722\/ndss.2018.23291"},{"key":"21_CR35","doi-asserted-by":"crossref","unstructured":"Liu, Y., Xie, Y., Srivastava, A.: Neural trojans (2017)","DOI":"10.1109\/ICCD.2017.16"},{"key":"21_CR36","first-page":"3454","volume":"33","author":"TA Nguyen","year":"2020","unstructured":"Nguyen, T.A., Tran, A.: Input-aware dynamic backdoor attack. Adv. Neural. Inf. Process. Syst. 33, 3454\u20133464 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"21_CR37","unstructured":"Qiao, X., Yang, Y., Li, H.: Defending neural backdoors via generative distribution modeling (2019)"},{"key":"21_CR38","doi-asserted-by":"crossref","unstructured":"Schelter, S., Grafberger, S., Dunning, T.: HedgeCut: maintaining randomised trees for low-latency machine unlearning. In: Proceedings of the 2021 International Conference on Management of Data, pp. 1545\u20131557 (2021)","DOI":"10.1145\/3448016.3457239"},{"key":"21_CR39","first-page":"4","volume":"3","author":"T Shibata","year":"2021","unstructured":"Shibata, T., Irie, G., Ikami, D., Mitsuzumi, Y.: Learning with selective forgetting. IJCAI 3, 4 (2021)","journal-title":"IJCAI"},{"key":"21_CR40","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition (2015)"},{"key":"21_CR41","unstructured":"Tan, M., Le, Q.V.: EfficientNetV2: smaller models and faster training (2021)"},{"key":"21_CR42","doi-asserted-by":"crossref","unstructured":"Tarun, A.K., Chundawat, V.S., Mandal, M., Kankanhalli, M.: Fast yet effective machine unlearning. IEEE Trans. Neural Netw. Learn. Syst. (2023)","DOI":"10.1109\/TIFS.2023.3265506"},{"key":"21_CR43","unstructured":"Tolstikhin, I., et al.: MLP-mixer: an all-MLP architecture for vision (2021)"},{"key":"21_CR44","unstructured":"Tran, B., Li, J., Madry, A.: Spectral signatures in backdoor attacks (2018)"},{"key":"21_CR45","doi-asserted-by":"crossref","unstructured":"Wang, B., et al.: Neural cleanse: identifying and mitigating backdoor attacks in neural networks. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 707\u2013723. IEEE (2019)","DOI":"10.1109\/SP.2019.00031"},{"key":"21_CR46","doi-asserted-by":"crossref","unstructured":"Wang, J., Guo, S., Xie, X., Qi, H.: Federated unlearning via class-discriminative pruning. In: Proceedings of the ACM Web Conference 2022, pp. 622\u2013632 (2022)","DOI":"10.1145\/3485447.3512222"},{"key":"21_CR47","unstructured":"Wu, Y., Dobriban, E., Davidson, S.B.: DeltaGrad: rapid retraining of machine learning models (2020)"},{"key":"21_CR48","doi-asserted-by":"crossref","unstructured":"Xu, H., Zhu, T., Zhang, L., Zhou, W., Yu, P.S.: Machine unlearning: a survey (2023)","DOI":"10.1145\/3603620"},{"key":"21_CR49","doi-asserted-by":"crossref","unstructured":"Xu, X., Wang, Q., Li, H., Borisov, N., Gunter, C.A., Li, B.: Detecting ai trojans using meta neural analysis (2020)","DOI":"10.1109\/SP40001.2021.00034"},{"key":"21_CR50","doi-asserted-by":"crossref","unstructured":"Zeng, Y., Pan, M., Just, H.A., Lyu, L., Qiu, M., Jia, R.: Narcissus: a practical clean-label backdoor attack with limited information. In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, pp. 771\u2013785 (2023)","DOI":"10.1145\/3576915.3616617"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ACCV 2024 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-2641-0_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:57:43Z","timestamp":1743382663000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-2641-0_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819626403","9789819626410"],"references-count":50,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-2641-0_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"29 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asian Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hanoi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"accv2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}