{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,18]],"date-time":"2025-01-18T05:07:21Z","timestamp":1737176841284,"version":"3.33.0"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,15]]},"DOI":"10.1109\/bigdata62323.2024.10825788","type":"proceedings-article","created":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T18:31:23Z","timestamp":1737052283000},"page":"6313-6319","source":"Crossref","is-referenced-by-count":0,"title":["Partially training, isolating and unlearning, mitigating backdoor attack"],"prefix":"10.1109","author":[{"given":"Yong","family":"Li","sequence":"first","affiliation":[{"name":"Changchun University of Technology AI Research Institute, Changchun University of Technology,School of Computer Science and Engineering"}]},{"given":"Han","family":"Gao","sequence":"additional","affiliation":[{"name":"Changchun University of Technology AI Research Institute, Changchun University of Technology,School of Computer Science and Engineering"}]},{"given":"Hao","family":"Chen","sequence":"additional","affiliation":[{"name":"Changchun University of Technology AI Research Institute, Changchun University of Technology,School of Computer Science and Engineering"}]},{"given":"Yiming","family":"Wang","sequence":"additional","affiliation":[{"name":"Changchun University of Technology AI Research Institute, Changchun University of Technology,School of Computer Science and Engineering"}]},{"given":"Chun","family":"Yu","sequence":"additional","affiliation":[{"name":"Non-Commissioned Officer School of Army Academy of Armored Forces,Changchun,China,130051"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638947"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.5555\/2999134.2999257"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9081188"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3043716"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.neuroimage.2019.116137"},{"key":"ref7","article-title":"Sequence to sequence learning with neural networks","volume":"27","author":"Sutskever","year":"2014","journal-title":"Advances in neural information processing systems"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2019.8802997"},{"article-title":"Wanet\u2013imperceptible warping-based backdoor attack","year":"2021","author":"Nguyen","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01175"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00412"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_13"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01300"},{"journal-title":"Defending against back-door attack on deep neural networks","year":"2020","author":"Xu","key":"ref14"},{"article-title":"Neural attention distillation: Erasing backdoor triggers from deep neural networks","year":"2021","author":"Li","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3411508.3421375"},{"key":"ref17","first-page":"14 900","article-title":"Anti-backdoor learning:Training clean models on poisoned data","volume":"34","author":"Li","year":"2021","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3453108"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9414862"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.2299\/jsp.24.141"},{"article-title":"Badnets: Identifying vulnerabilities in the machine learning model supply chain","year":"2019","author":"Gu","key":"ref21"},{"key":"ref22","article-title":"Spectral signatures in backdoor attacks","volume":"31","author":"Tran","year":"2018","journal-title":"Advances in neural information processing systems"},{"key":"ref23","first-page":"3454","article-title":"Input-aware dynamic backdoor attack","volume":"33","author":"Nguyen","year":"2020","journal-title":"Advances in Neural Information Processing Systems"},{"article-title":"Targeted backdoor attacks on deep learning systems using data poisoning","year":"2017","author":"Chen","key":"ref24"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58607-2_11"},{"key":"ref26","first-page":"7614","article-title":"Transferable clean-label poisoning attacks on deep neural nets","volume-title":"International Conference on Machine Learning","author":"Zhu"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423362"},{"article-title":"Label-consistent backdoor at-tacks","year":"2019","author":"Turner","key":"ref28"},{"article-title":"Detecting backdoor attacks on deep neural networks by activation clustering","year":"2018","author":"Chen","key":"ref29"},{"article-title":"Bridging mode connectivity in loss landscapes and adversarial robustness","year":"2020","author":"Zhao","key":"ref30"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/647"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00031"},{"key":"ref33","article-title":"Defending neural backdoors via generative distribution modeling","volume":"32","author":"Qiao","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413546"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58592-1_14"},{"article-title":"Learning multiple layers of features from tiny images","year":"2009","author":"Krizhevsky","key":"ref36"},{"key":"ref37","article-title":"Nist special database 19-hand-printed forms and characters database","author":"Grother","year":"1995","journal-title":"Technical Report, National Institute of Standards and Technology"}],"event":{"name":"2024 IEEE International Conference on Big Data (BigData)","start":{"date-parts":[[2024,12,15]]},"location":"Washington, DC, USA","end":{"date-parts":[[2024,12,18]]}},"container-title":["2024 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10824975\/10824942\/10825788.pdf?arnumber=10825788","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T07:48:27Z","timestamp":1737100107000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10825788\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,15]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/bigdata62323.2024.10825788","relation":{},"subject":[],"published":{"date-parts":[[2024,12,15]]}}}