{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T02:02:57Z","timestamp":1772935377688,"version":"3.50.1"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["2103829,2348391"],"award-info":[{"award-number":["2103829,2348391"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,8]]},"DOI":"10.1109\/bigdata66926.2025.11402072","type":"proceedings-article","created":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T20:57:57Z","timestamp":1772830677000},"page":"838-845","source":"Crossref","is-referenced-by-count":0,"title":["BadSAD: Clean-Label Backdoor Attacks Against Deep Semi-Supervised Anomaly Detection"],"prefix":"10.1109","author":[{"given":"He","family":"Cheng","sequence":"first","affiliation":[{"name":"Utah State University,Logan,UT,USA"}]},{"given":"Depeng","family":"Xu","sequence":"additional","affiliation":[{"name":"University of North Carolina at Charlotte,Charlotte,NC,USA"}]},{"given":"Shuhan","family":"Yuan","sequence":"additional","affiliation":[{"name":"Utah State University,Logan,UT,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01392"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.01681"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-16452-1_4"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-43898-1_23"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00803"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.02347"},{"key":"ref7","article-title":"A survey on visual anomaly detection: Challenge, approach, and prospect","author":"Cao","year":"2024","journal-title":"arXiv preprint arXiv"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s11633-023-1459-z"},{"key":"ref9","article-title":"Backdoor attacks and countermeasures on deep learning: A comprehensive review","author":"Gao","year":"2020","journal-title":"arXiv preprint arXiv"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3182979"},{"key":"ref11","article-title":"Deep semi-supervised anomaly detection","volume-title":"International Conference on Learning Representations","author":"Ruff","year":"2020"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2021.3052449"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3439950"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-20893-6_39"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.106878"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00356"},{"key":"ref17","first-page":"4393","article-title":"Deep one-class classification","volume-title":"International conference on machine learning. PMLR","author":"Ruff","year":"2018"},{"key":"ref18","article-title":"Badnets: Identifying vulnerabilities in the machine learning model supply chain","author":"Gu","year":"2017","journal-title":"arXiv preprint arXiv"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23291"},{"key":"ref20","article-title":"Targeted backdoor attacks on deep learning systems using data poisoning","author":"Chen","year":"2017","journal-title":"arXiv preprint arXiv"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01615"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2022.3201472"},{"key":"ref23","volume-title":"Clean-label backdoor attacks","author":"Turner","year":"2018"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616617"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i3.28019"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58607-2_11"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-97-2259-4_20"},{"key":"ref28","volume-title":"The mnist database of handwritten digits","author":"LeCun","year":"1998"},{"key":"ref29","article-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky","year":"2009","journal-title":"Citeseer, Tech. Rep."},{"key":"ref30","article-title":"Fashion-mnist: A novel image dataset for benchmarking machine learning algorithms","author":"Xiao","year":"2017","journal-title":"arXiv preprint arXiv"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909068"},{"key":"ref32","article-title":"Wanet-imperceptible warping-based backdoor attack","author":"Nguyen","year":"2021","journal-title":"arXiv preprint arXiv"}],"event":{"name":"2025 IEEE International Conference on Big Data (BigData)","location":"Macau, China","start":{"date-parts":[[2025,12,8]]},"end":{"date-parts":[[2025,12,11]]}},"container-title":["2025 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11400704\/11400712\/11402072.pdf?arnumber=11402072","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T07:31:16Z","timestamp":1772868676000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11402072\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/bigdata66926.2025.11402072","relation":{},"subject":[],"published":{"date-parts":[[2025,12,8]]}}}