{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T19:09:03Z","timestamp":1763147343435,"version":"3.45.0"},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Shandong Provincial Taishan Scholar Program, China","award":["tsqn202312133"],"award-info":[{"award-number":["tsqn202312133"]}]},{"name":"Shandong Provincial Natural Science Foundation, China","award":["ZR2022YQ61"],"award-info":[{"award-number":["ZR2022YQ61"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772551","62111530052","62472158","62102337"],"award-info":[{"award-number":["61772551","62111530052","62472158","62102337"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shandong Provincial Natural Science Foundation, China","award":["ZR2023ZD32"],"award-info":[{"award-number":["ZR2023ZD32"]}]},{"name":"Science and Technology Innovation Program of Hunan Province, China","award":["2024RC3102"],"award-info":[{"award-number":["2024RC3102"]}]},{"DOI":"10.13039\/501100004761","name":"Natural Science Foundation of Hainan Province","doi-asserted-by":"publisher","award":["2023JJ40174"],"award-info":[{"award-number":["2023JJ40174"]}],"id":[{"id":"10.13039\/501100004761","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key R&amp;D Program of Zhejiang","award":["2024C01164"],"award-info":[{"award-number":["2024C01164"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1109\/tdsc.2025.3600427","type":"journal-article","created":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T18:18:29Z","timestamp":1755627509000},"page":"7746-7758","source":"Crossref","is-referenced-by-count":0,"title":["A Triple Stealthy Backdoor: Hidden in Spatial, Frequency, and Feature Domains"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0264-6545","authenticated-orcid":false,"given":"Yudong","family":"Gao","sequence":"first","affiliation":[{"name":"Qingdao Key Laboratory of Intelligent Sensing Technology for Extreme Environment, College of Control Science and Engineering, China University of Petroleum (East China), Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0739-6338","authenticated-orcid":false,"given":"Honglong","family":"Chen","sequence":"additional","affiliation":[{"name":"Qingdao Key Laboratory of Intelligent Sensing Technology for Extreme Environment, College of Control Science and Engineering, China University of Petroleum (East China), Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6221-8142","authenticated-orcid":false,"given":"Peng","family":"Sun","sequence":"additional","affiliation":[{"name":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5319-517X","authenticated-orcid":false,"given":"Junjian","family":"Li","sequence":"additional","affiliation":[{"name":"Qingdao Key Laboratory of Intelligent Sensing Technology for Extreme Environment, College of Control Science and Engineering, China University of Petroleum (East China), Qingdao, China"}]},{"given":"Yangxu","family":"Yin","sequence":"additional","affiliation":[{"name":"Qingdao Key Laboratory of Intelligent Sensing Technology for Extreme Environment, College of Control Science and Engineering, China University of Petroleum (East China), Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5804-3279","authenticated-orcid":false,"given":"Zhibo","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5388-9080","authenticated-orcid":false,"given":"Weifeng","family":"Liu","sequence":"additional","affiliation":[{"name":"Qingdao Key Laboratory of Intelligent Sensing Technology for Extreme Environment, College of Control Science and Engineering, China University of Petroleum (East China), Qingdao, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i3.27954"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00042"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.02021"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2023.3327017"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909068"},{"article-title":"Targeted backdoor attacks on deep learning systems using data poisoning","year":"2017","author":"Chen","key":"ref7"},{"article-title":"WaNet: Imperceptible warping-based backdoor attack","year":"2021","author":"Nguyen","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01615"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3427432"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3233519"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00533"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.123.023901"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01616"},{"key":"ref15","first-page":"1","article-title":"Revisiting the assumption of latent separability for backdoor defenses","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Qi"},{"key":"ref16","first-page":"3520","article-title":"Certified defenses for data poisoning attacks","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Jacob"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01175"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3161477"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2011.2163394"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19778-9_23"},{"key":"ref21","first-page":"1","article-title":"Neural attention distillation: Erasing backdoor triggers from deep neural networks","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Li"},{"article-title":"Defending against backdoor attack on deep neural networks","year":"2020","author":"Xu","key":"ref22"},{"key":"ref23","first-page":"121236","article-title":"SampDetox: Black-box backdoor defense via perturbation-based sample detoxification","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Yang"},{"key":"ref24","first-page":"1","article-title":"Energy-based backdoor defense without task-specific samples and model retraining","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Gao"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SPW50608.2020.00025"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3581719"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.74"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3194642"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00038"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_13"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00031"},{"key":"ref32","first-page":"1","article-title":"UNICORN: A unified backdoor trigger inversion framework","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Wang"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01177"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58583-9_20"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359790"},{"key":"ref36","first-page":"12228","article-title":"SCALE-UP: An efficient black-box input-level backdoor detection via analyzing scaled prediction consistency","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Guo"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/242"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2008.5213922"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00414"},{"key":"ref40","first-page":"8580","article-title":"Neural tangent kernel: Convergence and generalization in neural networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Jacot"},{"key":"ref41","first-page":"1","article-title":"SCALE-UP: An efficient black-box input-level backdoor detection via analyzing scaled prediction consistency","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Guo"},{"article-title":"Learning multiple layers of features from tiny images","year":"2009","author":"Krizhevsky","key":"ref42"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2012.02.016"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-42051-1_16"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01352"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00068"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8858\/11242243\/11130377.pdf?arnumber=11130377","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T18:52:39Z","timestamp":1763146359000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11130377\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11]]},"references-count":47,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2025.3600427","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"type":"print","value":"1545-5971"},{"type":"electronic","value":"1941-0018"},{"type":"electronic","value":"2160-9209"}],"subject":[],"published":{"date-parts":[[2025,11]]}}}