{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T03:22:49Z","timestamp":1770693769011,"version":"3.49.0"},"reference-count":28,"publisher":"World Scientific Pub Co Pte Ltd","issue":"02","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62402451"],"award-info":[{"award-number":["62402451"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Model. Simul. Sci. Comput."],"published-print":{"date-parts":[[2025,4]]},"abstract":"<jats:p> In the realm of safety-critical domains, the security of Deep Neural Networks (DNNs) is constantly challenged by the insidious threat of backdoor attacks. These attacks, which manipulate model outputs through malicious triggers, impede the development of DNNs in mission-critical applications. Despite the progress made by existing defense mechanisms, it remains unclear how to remove backdoor-related neurons from DNNs effectively. To address this challenge, we propose a novel eraser-based framework called Neural Perturbation-based Attention Distillation (NPAD). NPAD utilizes the ideas of neural perturbation and neural attention distillation. Initially, the teacher network perturbs the backdoor neurons to reveal their presence, followed by the targeted pruning operations. Subsequently, attention distillation is performed on the student network under the guidance of the adapted teacher network, thus maintaining its resilience against backdoor attacks and enhancing defense performance. During the knowledge transfer process, we introduce a weighted attention alignment mechanism to accelerate convergence during training, thereby achieving the resultant student network with heightened robustness. The experimental results clearly demonstrate that NPAD consistently outperforms a variety of existing state-of-the-art methods in mitigating the effects of backdoor attacks, where NPAD outperforms Neural Attention Distillation (NAD) (the best of the four defense methods) by 9.75% in the average reduction on the attack success rate of 10 backdoor attacks. Furthermore, the results also show that NPAD effectively eliminates backdoor triggers by utilizing a mere 1% of clean training data while simultaneously preventing any significant decline in performance on clean data. <\/jats:p>","DOI":"10.1142\/s1793962325500369","type":"journal-article","created":{"date-parts":[[2025,3,22]],"date-time":"2025-03-22T04:29:35Z","timestamp":1742617775000},"source":"Crossref","is-referenced-by-count":1,"title":["Erasing backdoor of deep neural networks using neural perturbation-based attention distillation"],"prefix":"10.1142","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-6188-0115","authenticated-orcid":false,"given":"Jiaxing","family":"Chen","sequence":"first","affiliation":[{"name":"College of Cyberspace Security, Zhengzhou University, Zhengzhou, P. R. China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-9715-2890","authenticated-orcid":false,"given":"Han","family":"Yan","sequence":"additional","affiliation":[{"name":"Power China Hubei Electric Engineering CO. LTD, Wuhan, P. R. China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8908-0777","authenticated-orcid":false,"given":"Bo","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computer and Artificial Intelligence, College of Cyberspace Security, Zhengzhou University, Zhengzhou, P. R. China"},{"name":"Wuhan National Laboratory for Optoelectronics, Huazhong University of Science and Technology, Wuhan, P. R. China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-2712-4753","authenticated-orcid":false,"given":"Shaofeng","family":"Zhao","sequence":"additional","affiliation":[{"name":"Henan University of Economics and Law, Zhengzhou, P. R. China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-2009-7803","authenticated-orcid":false,"given":"Xiang","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Cyberspace Security, Zhengzhou University, Zhengzhou, P. R. China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-3899-5245","authenticated-orcid":false,"given":"Zhanbo","family":"Li","sequence":"additional","affiliation":[{"name":"College of Cyberspace Security, Zhengzhou University, Zhengzhou, P. R. China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5526-2986","authenticated-orcid":false,"given":"Hui","family":"Xu","sequence":"additional","affiliation":[{"name":"China Academy of Industrial Internet, Beijing, P. R. China"}]}],"member":"219","published-online":{"date-parts":[[2025,4,22]]},"reference":[{"key":"S1793962325500369BIB001","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3140238"},{"key":"S1793962325500369BIB002","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2023.3321923"},{"key":"S1793962325500369BIB003","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2023.9010004"},{"key":"S1793962325500369BIB004","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909068"},{"key":"S1793962325500369BIB006","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3364528"},{"key":"S1793962325500369BIB007","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58607-2_11"},{"key":"S1793962325500369BIB008","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01615"},{"key":"S1793962325500369BIB009","first-page":"16913","volume":"34","author":"Wu D.","year":"2021","journal-title":"Adv. Neural Inform. Process. Syst."},{"key":"S1793962325500369BIB010","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_13"},{"key":"S1793962325500369BIB011","volume-title":"Int. Conf. Learning Representations","author":"Li Y.","year":"2021"},{"key":"S1793962325500369BIB012","volume-title":"Int. Conf. Learning Representations","author":"Zeng Y.","year":"2022"},{"key":"S1793962325500369BIB014","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23291"},{"key":"S1793962325500369BIB015","first-page":"6106","volume":"31","author":"Shafahi A.","year":"2018","journal-title":"Adv. Neural Inform. Process. Syst."},{"key":"S1793962325500369BIB016","first-page":"8011","volume":"31","author":"Tran B.","year":"2018","journal-title":"Adv. Neural Inform. Process. Syst."},{"key":"S1793962325500369BIB017","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2019.8802997"},{"key":"S1793962325500369BIB018","first-page":"703","volume-title":"IEEE European Symp. Security and Privacy","author":"Salem A.","year":"2020"},{"key":"S1793962325500369BIB019","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6871"},{"key":"S1793962325500369BIB020","first-page":"3454","volume-title":"Advances in Neural Information Processing Systems","author":"Nguyen T. A.","year":"2020"},{"key":"S1793962325500369BIB021","first-page":"18944","volume-title":"Advances in Neural Information Processing Systems","author":"Doan K.","year":"2021"},{"key":"S1793962325500369BIB022","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i1.27780"},{"key":"S1793962325500369BIB023","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-96530-3"},{"key":"S1793962325500369BIB024","first-page":"19837","volume-title":"Int. Conf. Machine Learning","author":"Li Y.","year":"2023"},{"key":"S1793962325500369BIB026","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/206"},{"key":"S1793962325500369BIB027","volume-title":"3rd Int. Conf. Learning Representations","author":"Goodfellow I. J.","year":"2015"},{"key":"S1793962325500369BIB028","volume-title":"5th Int. Conf. Learning Representations","author":"Zagoruyko S.","year":"2017"},{"key":"S1793962325500369BIB029","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i2.16201"},{"key":"S1793962325500369BIB030","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01175"},{"key":"S1793962325500369BIB031","volume-title":"Int. Conf. Learning Representations","author":"Qi X.","year":"2023"}],"container-title":["International Journal of Modeling, Simulation, and Scientific Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S1793962325500369","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T03:34:21Z","timestamp":1745984061000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S1793962325500369"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4]]},"references-count":28,"journal-issue":{"issue":"02","published-print":{"date-parts":[[2025,4]]}},"alternative-id":["10.1142\/S1793962325500369"],"URL":"https:\/\/doi.org\/10.1142\/s1793962325500369","relation":{},"ISSN":["1793-9623","1793-9615"],"issn-type":[{"value":"1793-9623","type":"print"},{"value":"1793-9615","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4]]},"article-number":"2550036"}}