{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:39:16Z","timestamp":1771612756688,"version":"3.50.1"},"reference-count":0,"publisher":"IOS Press","isbn-type":[{"value":"9781643684369","type":"print"},{"value":"9781643684376","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,9,28]],"date-time":"2023-09-28T00:00:00Z","timestamp":1695859200000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,28]]},"abstract":"<jats:p>Backdoor attacks have become a significant threat to deep neural networks (DNNs), whereby poisoned models perform well on benign samples but produce incorrect outputs when given specific inputs with a trigger. These attacks are usually implemented through data poisoning by injecting poisoned samples (samples patched with a trigger and mislabelled to the target label) into the dataset, and the models trained with that dataset will be infected with the backdoor. However, most current backdoor attacks lack stealthiness and robustness because of the fixed trigger patterns and mislabelling, which humans or some backdoor defense approach can easily detect. To address this issue, we propose a frequency-domain-based backdoor attack method that implements backdoor implantation without mislabeling the poisoned samples or accessing the training process. We evaluated our approach on four benchmark datasets and two popular scenarios: no-label self-supervised and clean-label supervised learning. The experimental results demonstrate that our approach achieved a high attack success rate (above 90%) on all tasks without significant performance degradation on main tasks and robust against mainstream defense approaches.<\/jats:p>","DOI":"10.3233\/faia230610","type":"book-chapter","created":{"date-parts":[[2023,9,29]],"date-time":"2023-09-29T09:21:04Z","timestamp":1695979264000},"source":"Crossref","is-referenced-by-count":10,"title":["Invisible Backdoor Attacks Using Data Poisoning in Frequency Domain"],"prefix":"10.3233","author":[{"given":"Chang","family":"Yue","sequence":"first","affiliation":[{"name":"SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, China"},{"name":"School of Cyber Security, University of Chinese Academy of Sciences, China {yuechang@iie.ac.cn, lvpeizhuo@iie.ac.cn, liangruigang@iie.ac.cn, chenkai@iie.ac.cn}"}]},{"given":"Peizhuo","family":"Lv","sequence":"additional","affiliation":[{"name":"SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, China"},{"name":"School of Cyber Security, University of Chinese Academy of Sciences, China {yuechang@iie.ac.cn, lvpeizhuo@iie.ac.cn, liangruigang@iie.ac.cn, chenkai@iie.ac.cn}"}]},{"given":"Ruigang","family":"Liang","sequence":"additional","affiliation":[{"name":"SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, China"},{"name":"School of Cyber Security, University of Chinese Academy of Sciences, China {yuechang@iie.ac.cn, lvpeizhuo@iie.ac.cn, liangruigang@iie.ac.cn, chenkai@iie.ac.cn}"}]},{"given":"Kai","family":"Chen","sequence":"additional","affiliation":[{"name":"SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, China"},{"name":"School of Cyber Security, University of Chinese Academy of Sciences, China {yuechang@iie.ac.cn, lvpeizhuo@iie.ac.cn, liangruigang@iie.ac.cn, chenkai@iie.ac.cn}"}]}],"member":"7437","container-title":["Frontiers in Artificial Intelligence and Applications","ECAI 2023"],"original-title":[],"link":[{"URL":"https:\/\/ebooks.iospress.nl\/pdf\/doi\/10.3233\/FAIA230610","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,29]],"date-time":"2023-09-29T09:21:05Z","timestamp":1695979265000},"score":1,"resource":{"primary":{"URL":"https:\/\/ebooks.iospress.nl\/doi\/10.3233\/FAIA230610"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,28]]},"ISBN":["9781643684369","9781643684376"],"references-count":0,"URL":"https:\/\/doi.org\/10.3233\/faia230610","relation":{},"ISSN":["0922-6389","1879-8314"],"issn-type":[{"value":"0922-6389","type":"print"},{"value":"1879-8314","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,28]]}}}