{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T07:38:42Z","timestamp":1773301122530,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":29,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819784899","type":"print"},{"value":"9789819784905","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T00:00:00Z","timestamp":1730937600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T00:00:00Z","timestamp":1730937600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-97-8490-5_13","type":"book-chapter","created":{"date-parts":[[2024,11,6]],"date-time":"2024-11-06T09:09:07Z","timestamp":1730884147000},"page":"174-188","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Invisible Backdoor Attack Through Singular Value Decomposition"],"prefix":"10.1007","author":[{"given":"Wenmin","family":"Chen","sequence":"first","affiliation":[]},{"given":"Xiaowei","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Xiaodong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zewen","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yangming","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,7]]},"reference":[{"key":"13_CR1","unstructured":"Abai, Z., Rajmalwar, N.: Densenet models for tiny imagenet classification (2020). https:\/\/arxiv.org\/abs\/1904.10429"},{"key":"13_CR2","unstructured":"Alex, K.: Learning multiple layers of features from tiny images (2009). https:\/\/www.cs.toronto.edu\/kriz\/learning-features-2009-TR.pdf"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Barni, M., Kallas, K., Tondi, B.: A new backdoor attack in cnns by training set corruption without label poisoning. In: 2019 IEEE International Conference on Image Processing (ICIP), pp. 101\u2013105. IEEE (2019)","DOI":"10.1109\/ICIP.2019.8802997"},{"key":"13_CR4","unstructured":"Chen, X., Liu, C., Li, B., Lu, K., Song, D.: Targeted backdoor attacks on deep learning systems using data poisoning (2017). https:\/\/arxiv.org\/abs\/1712.05526"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Deng, J., Dong, W., Socher, R., Li, L.J., Li, K., Fei-Fei, L.: Imagenet: a large-scale hierarchical image database. In: 2009 IEEE conference on computer vision and pattern recognition, pp. 248\u2013255. IEEE (2009)","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Dr\u00e4ger, N., Xu, Y., Ghamisi, P.: Backdoor attacks for remote sensing data with wavelet transform. IEEE Trans. Geosci. Remote Sens. (2023)","DOI":"10.1109\/TGRS.2023.3289307"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Feng, Y., Ma, B., Zhang, J., Zhao, S., Xia, Y., Tao, D.: Fiba: Frequency-injection based backdoor attack in medical image analysis. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 20876\u201320885 (2022)","DOI":"10.1109\/CVPR52688.2022.02021"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Gao, Y., Xu, C., Wang, D., Chen, S., Ranasinghe, D.C., Nepal, S.: Strip: a defence against trojan attacks on deep neural networks. In: Proceedings of the 35th Annual Computer Security Applications Conference, pp. 113\u2013125 (2019)","DOI":"10.1145\/3359789.3359790"},{"key":"13_CR9","doi-asserted-by":"publisher","first-page":"47230","DOI":"10.1109\/ACCESS.2019.2909068","volume":"7","author":"T Gu","year":"2019","unstructured":"Gu, T., Liu, K., Dolan-Gavitt, B., Garg, S.: Badnets: evaluating backdooring attacks on deep neural networks. IEEE Access 7, 47230\u201347244 (2019)","journal-title":"IEEE Access"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Hore, A., Ziou, D.: Image quality metrics: Psnr vs. ssim. In: 2010 20th International Conference on Pattern Recognition, pp. 2366\u20132369. IEEE (2010)","DOI":"10.1109\/ICPR.2010.579"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Huang, S., Peng, W., Jia, Z., Tu, Z.: One-pixel signature: Characterizing cnn models for backdoor detection. In: Computer Vision\u2013ECCV 2020: 16th European Conference, Glasgow, UK, 23\u201328 Aug 2020, Proceedings, Part XXVII 16, pp. 326\u2013341. Springer (2020)","DOI":"10.1007\/978-3-030-58583-9_20"},{"issue":"1","key":"13_CR13","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1080\/07468342.1996.11973744","volume":"27","author":"D Kalman","year":"1996","unstructured":"Kalman, D.: A singularly valuable decomposition: the svd of a matrix. Coll. Math. J. 27(1), 2\u201323 (1996)","journal-title":"Coll. Math. J."},{"issue":"5","key":"13_CR14","first-page":"2088","volume":"18","author":"S Li","year":"2020","unstructured":"Li, S., Xue, M., Zhao, B.Z.H., Zhu, H., Zhang, X.: Invisible backdoor attacks on deep neural networks via steganography and regularization. IEEE Trans. Dependable Secure Comput. 18(5), 2088\u20132105 (2020)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Li, Y., Li, Y., Wu, B., Li, L., He, R., Lyu, S.: Invisible backdoor attack with sample-specific triggers. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 16463\u201316472 (2021)","DOI":"10.1109\/ICCV48922.2021.01615"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Liu, K., Dolan-Gavitt, B., Garg, S.: Fine-pruning: defending against backdooring attacks on deep neural networks. In: International Symposium on Research in Attacks, Intrusions, and Defenses, pp. 273\u2013294. Springer (2018)","DOI":"10.1007\/978-3-030-00470-5_13"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Liu, Y., Ma, X., Bailey, J., Lu, F.: Reflection backdoor: a natural backdoor attack on deep neural networks. In: Computer Vision\u2013ECCV 2020: 16th European Conference, Glasgow, UK, 23\u201328 Aug 2020, Proceedings, Part X 16, pp. 182\u2013199. Springer (2020)","DOI":"10.1007\/978-3-030-58607-2_11"},{"key":"13_CR18","unstructured":"Nguyen, T.A., Tran, A.T.: Wanet-imperceptible warping-based backdoor attack. In: International Conference on Learning Representations (2020)"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Peng, Z., et al.: Conformer: Local features coupling global representations for visual recognition. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 367\u2013376 (2021)","DOI":"10.1109\/ICCV48922.2021.00042"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Selvaraju, R.R., Cogswell, M., Das, A., Vedantam, R., Parikh, D., Batra, D.: Grad-cam: visual explanations from deep networks via gradient-based localization. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 618\u2013626 (2017)","DOI":"10.1109\/ICCV.2017.74"},{"key":"13_CR21","unstructured":"Shafahi, A., et al.: Poison frogs! targeted clean-label poisoning attacks on neural networks. Adv. Neural Inf. Process. Syst. 31 (2018)"},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"Stallkamp, J., Schlipsing, M., Salmen, J., Igel, C.: Man vs. computer: benchmarking machine learning algorithms for traffic sign recognition. Neural Netw. 32, 323\u2013332 (2012)","DOI":"10.1016\/j.neunet.2012.02.016"},{"key":"13_CR23","unstructured":"Turner, A., Tsipras, D., Madry, A.: Label-consistent backdoor attacks (2019). https:\/\/arxiv.org\/abs\/1912.02771"},{"key":"13_CR24","doi-asserted-by":"crossref","unstructured":"Wang, B., et al.: Neural cleanse: identifying and mitigating backdoor attacks in neural networks. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 707\u2013723. IEEE (2019)","DOI":"10.1109\/SP.2019.00031"},{"issue":"5","key":"13_CR25","doi-asserted-by":"publisher","first-page":"2941","DOI":"10.1109\/TGRS.2017.2656380","volume":"55","author":"Y Ye","year":"2017","unstructured":"Ye, Y., Shan, J., Bruzzone, L., Shen, L.: Robust registration of multimodal remote sensing images based on structural similarity. IEEE Trans. Geosci. Remote Sens. 55(5), 2941\u20132958 (2017)","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"key":"13_CR26","doi-asserted-by":"crossref","unstructured":"Zeng, Y., Park, W., Mao, Z.M., Jia, R.: Rethinking the backdoor attacks\u2019 triggers: a frequency perspective. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 16473\u201316481 (2021)","DOI":"10.1109\/ICCV48922.2021.01616"},{"key":"13_CR27","doi-asserted-by":"publisher","first-page":"5691","DOI":"10.1109\/TIP.2022.3201472","volume":"31","author":"J Zhang","year":"2022","unstructured":"Zhang, J., Dongdong, C., Huang, Q., Liao, J., Zhang, W., Feng, H., Hua, G., Yu, N.: Poison ink: Robust and invisible backdoor attack. IEEE Trans. Image Process. 31, 5691\u20135705 (2022)","journal-title":"IEEE Trans. Image Process."},{"key":"13_CR28","doi-asserted-by":"crossref","unstructured":"Zhang, R., Isola, P., Efros, A.A., Shechtman, E., Wang, O.: The unreasonable effectiveness of deep features as a perceptual metric. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 586\u2013595 (2018)","DOI":"10.1109\/CVPR.2018.00068"},{"key":"13_CR29","doi-asserted-by":"publisher","unstructured":"Zhou, H., Xu, X., Wang, X., Bullock, L.B.: Satba: an invisible backdoor attack based on spatial attention. In: 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 937\u2013945 (2023). https:\/\/doi.org\/10.1109\/TrustCom60117.2023.00133","DOI":"10.1109\/TrustCom60117.2023.00133"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition and Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-8490-5_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,6]],"date-time":"2024-11-06T09:13:20Z","timestamp":1730884400000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-8490-5_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,7]]},"ISBN":["9789819784899","9789819784905"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-8490-5_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,7]]},"assertion":[{"value":"7 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PRCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chinese Conference on Pattern Recognition and Computer Vision  (PRCV)","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Urumqi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ccprcv2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2024.prcv.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}