Alert button
Picture for Gorka Abad

Gorka Abad

Alert button

Time-Distributed Backdoor Attacks on Federated Spiking Learning

Add code
Bookmark button
Alert button
Feb 05, 2024
Gorka Abad, Stjepan Picek, Aitor Urbieta

Viaarxiv icon

Tabdoor: Backdoor Vulnerabilities in Transformer-based Neural Networks for Tabular Data

Add code
Bookmark button
Alert button
Nov 13, 2023
Bart Pleiter, Behrad Tajalli, Stefanos Koffas, Gorka Abad, Jing Xu, Martha Larson, Stjepan Picek

Viaarxiv icon

Rethinking the Trigger-injecting Position in Graph Backdoor Attack

Add code
Bookmark button
Alert button
Apr 18, 2023
Jing Xu, Gorka Abad, Stjepan Picek

Figure 1 for Rethinking the Trigger-injecting Position in Graph Backdoor Attack
Figure 2 for Rethinking the Trigger-injecting Position in Graph Backdoor Attack
Figure 3 for Rethinking the Trigger-injecting Position in Graph Backdoor Attack
Figure 4 for Rethinking the Trigger-injecting Position in Graph Backdoor Attack
Viaarxiv icon

Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data

Add code
Bookmark button
Alert button
Feb 13, 2023
Gorka Abad, Oguzhan Ersoy, Stjepan Picek, Aitor Urbieta

Figure 1 for Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data
Figure 2 for Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data
Figure 3 for Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data
Figure 4 for Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data
Viaarxiv icon

A Systematic Evaluation of Backdoor Trigger Characteristics in Image Classification

Add code
Bookmark button
Alert button
Feb 03, 2023
Gorka Abad, Jing Xu, Stefanos Koffas, Behrad Tajalli, Stjepan Picek

Figure 1 for A Systematic Evaluation of Backdoor Trigger Characteristics in Image Classification
Figure 2 for A Systematic Evaluation of Backdoor Trigger Characteristics in Image Classification
Figure 3 for A Systematic Evaluation of Backdoor Trigger Characteristics in Image Classification
Figure 4 for A Systematic Evaluation of Backdoor Trigger Characteristics in Image Classification
Viaarxiv icon