{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:53:03Z","timestamp":1740102783528,"version":"3.37.3"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,4,14]],"date-time":"2024-04-14T00:00:00Z","timestamp":1713052800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,4,14]],"date-time":"2024-04-14T00:00:00Z","timestamp":1713052800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100020950","name":"National Science and Technology Council","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100020950","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,4,14]]},"DOI":"10.1109\/icassp48485.2024.10447895","type":"proceedings-article","created":{"date-parts":[[2024,3,18]],"date-time":"2024-03-18T18:56:31Z","timestamp":1710788191000},"page":"5500-5504","source":"Crossref","is-referenced-by-count":1,"title":["Defending against Clean-Image Backdoor Attack in Multi-Label Classification"],"prefix":"10.1109","author":[{"given":"Cheng-Yi","family":"Lee","sequence":"first","affiliation":[{"name":"IIS, Academia Sinica,Taiwan ROC"}]},{"given":"Cheng-Chang","family":"Tsai","sequence":"additional","affiliation":[{"name":"IIS, Academia Sinica,Taiwan ROC"}]},{"given":"Ching-Chia","family":"Kao","sequence":"additional","affiliation":[{"name":"IIS, Academia Sinica,Taiwan ROC"}]},{"given":"Chun-Shien","family":"Lu","sequence":"additional","affiliation":[{"name":"IIS, Academia Sinica,Taiwan ROC"}]},{"given":"Chia-Mu","family":"Yu","sequence":"additional","affiliation":[{"name":"National Yang Ming Chiao Tung University,Taiwan ROC"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-25056-9_26","article-title":"Baddet: Backdoor attacks on object detection","volume-title":"ECCV","author":"Chan"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.02021"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909068"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3182979"},{"article-title":"Clean-image backdoor: Attacking multi-label models with poisoned labels only","volume-title":"ICLR","author":"Chen","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00082"},{"article-title":"Dino: Detr with improved denoising anchor boxes for end-to-end object detection","volume-title":"ICLR","author":"Zhang","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00031"},{"article-title":"Neural attention distillation: Erasing backdoor triggers from deep neural networks","volume-title":"ICLR","author":"Li","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP49357.2023.10097244"},{"key":"ref11","article-title":"Input-aware dynamic backdoor attack","author":"Nguyen","year":"2020","journal-title":"NeurIPS"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01615"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19778-9_23"},{"key":"ref14","article-title":"Adversarial neuron pruning purifies backdoored deep models","author":"Wu","year":"2021","journal-title":"NeurIPS"},{"key":"ref15","article-title":"Anti-backdoor learning: Training clean models on poisoned data","author":"Li","year":"2021","journal-title":"NeurIPS"},{"article-title":"Backdoor defense via decoupling the training process","volume-title":"ICLR","author":"Huang","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00390"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/206"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179375"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01176"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00015"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-009-0275-4"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/WACV56688.2023.00012"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_13"}],"event":{"name":"ICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","start":{"date-parts":[[2024,4,14]]},"location":"Seoul, Korea, Republic of","end":{"date-parts":[[2024,4,19]]}},"container-title":["ICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10445798\/10445803\/10447895.pdf?arnumber=10447895","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,2]],"date-time":"2024-08-02T06:22:37Z","timestamp":1722579757000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10447895\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,14]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/icassp48485.2024.10447895","relation":{},"subject":[],"published":{"date-parts":[[2024,4,14]]}}}