Picture for David J. Miller

David J. Miller

On Trojans in Refined Language Models

Add code
Jun 12, 2024
Viaarxiv icon

Universal Post-Training Reverse-Engineering Defense Against Backdoors in Deep Neural Networks

Add code
Feb 03, 2024
Figure 1 for Universal Post-Training Reverse-Engineering Defense Against Backdoors in Deep Neural Networks
Figure 2 for Universal Post-Training Reverse-Engineering Defense Against Backdoors in Deep Neural Networks
Figure 3 for Universal Post-Training Reverse-Engineering Defense Against Backdoors in Deep Neural Networks
Figure 4 for Universal Post-Training Reverse-Engineering Defense Against Backdoors in Deep Neural Networks
Viaarxiv icon

Post-Training Overfitting Mitigation in DNN Classifiers

Add code
Sep 28, 2023
Viaarxiv icon

Backdoor Mitigation by Correcting the Distribution of Neural Activations

Add code
Aug 18, 2023
Figure 1 for Backdoor Mitigation by Correcting the Distribution of Neural Activations
Figure 2 for Backdoor Mitigation by Correcting the Distribution of Neural Activations
Figure 3 for Backdoor Mitigation by Correcting the Distribution of Neural Activations
Figure 4 for Backdoor Mitigation by Correcting the Distribution of Neural Activations
Viaarxiv icon

Improved Activation Clipping for Universal Backdoor Mitigation and Test-Time Detection

Add code
Aug 08, 2023
Figure 1 for Improved Activation Clipping for Universal Backdoor Mitigation and Test-Time Detection
Figure 2 for Improved Activation Clipping for Universal Backdoor Mitigation and Test-Time Detection
Figure 3 for Improved Activation Clipping for Universal Backdoor Mitigation and Test-Time Detection
Figure 4 for Improved Activation Clipping for Universal Backdoor Mitigation and Test-Time Detection
Viaarxiv icon

Universal Post-Training Backdoor Detection

Add code
May 13, 2022
Figure 1 for Universal Post-Training Backdoor Detection
Figure 2 for Universal Post-Training Backdoor Detection
Figure 3 for Universal Post-Training Backdoor Detection
Figure 4 for Universal Post-Training Backdoor Detection
Viaarxiv icon

Post-Training Detection of Backdoor Attacks for Two-Class and Multi-Attack Scenarios

Add code
Jan 20, 2022
Figure 1 for Post-Training Detection of Backdoor Attacks for Two-Class and Multi-Attack Scenarios
Figure 2 for Post-Training Detection of Backdoor Attacks for Two-Class and Multi-Attack Scenarios
Figure 3 for Post-Training Detection of Backdoor Attacks for Two-Class and Multi-Attack Scenarios
Figure 4 for Post-Training Detection of Backdoor Attacks for Two-Class and Multi-Attack Scenarios
Viaarxiv icon

Test-Time Detection of Backdoor Triggers for Poisoned Deep Neural Networks

Add code
Dec 06, 2021
Figure 1 for Test-Time Detection of Backdoor Triggers for Poisoned Deep Neural Networks
Figure 2 for Test-Time Detection of Backdoor Triggers for Poisoned Deep Neural Networks
Figure 3 for Test-Time Detection of Backdoor Triggers for Poisoned Deep Neural Networks
Figure 4 for Test-Time Detection of Backdoor Triggers for Poisoned Deep Neural Networks
Viaarxiv icon

Detecting Backdoor Attacks Against Point Cloud Classifiers

Add code
Oct 20, 2021
Figure 1 for Detecting Backdoor Attacks Against Point Cloud Classifiers
Figure 2 for Detecting Backdoor Attacks Against Point Cloud Classifiers
Figure 3 for Detecting Backdoor Attacks Against Point Cloud Classifiers
Viaarxiv icon

Backdoor Attack and Defense for Deep Regression

Add code
Sep 06, 2021
Figure 1 for Backdoor Attack and Defense for Deep Regression
Figure 2 for Backdoor Attack and Defense for Deep Regression
Figure 3 for Backdoor Attack and Defense for Deep Regression
Figure 4 for Backdoor Attack and Defense for Deep Regression
Viaarxiv icon