Alert button
Picture for Stefanos Koffas

Stefanos Koffas

Alert button

The SpongeNet Attack: Sponge Weight Poisoning of Deep Neural Networks

Add code
Bookmark button
Alert button
Feb 09, 2024
Jona te Lintelo, Stefanos Koffas, Stjepan Picek

Viaarxiv icon

Dr. Jekyll and Mr. Hyde: Two Faces of LLMs

Add code
Bookmark button
Alert button
Dec 06, 2023
Matteo Gioele Collu, Tom Janssen-Groesbeek, Stefanos Koffas, Mauro Conti, Stjepan Picek

Viaarxiv icon

Tabdoor: Backdoor Vulnerabilities in Transformer-based Neural Networks for Tabular Data

Add code
Bookmark button
Alert button
Nov 13, 2023
Bart Pleiter, Behrad Tajalli, Stefanos Koffas, Gorka Abad, Jing Xu, Martha Larson, Stjepan Picek

Viaarxiv icon

Invisible Threats: Backdoor Attack in OCR Systems

Add code
Bookmark button
Alert button
Oct 12, 2023
Mauro Conti, Nicola Farronato, Stefanos Koffas, Luca Pajola, Stjepan Picek

Figure 1 for Invisible Threats: Backdoor Attack in OCR Systems
Figure 2 for Invisible Threats: Backdoor Attack in OCR Systems
Figure 3 for Invisible Threats: Backdoor Attack in OCR Systems
Figure 4 for Invisible Threats: Backdoor Attack in OCR Systems
Viaarxiv icon

BlindSage: Label Inference Attacks against Node-level Vertical Federated Graph Neural Networks

Add code
Bookmark button
Alert button
Aug 04, 2023
Marco Arazzi, Mauro Conti, Stefanos Koffas, Marina Krcek, Antonino Nocera, Stjepan Picek, Jing Xu

Figure 1 for BlindSage: Label Inference Attacks against Node-level Vertical Federated Graph Neural Networks
Figure 2 for BlindSage: Label Inference Attacks against Node-level Vertical Federated Graph Neural Networks
Figure 3 for BlindSage: Label Inference Attacks against Node-level Vertical Federated Graph Neural Networks
Figure 4 for BlindSage: Label Inference Attacks against Node-level Vertical Federated Graph Neural Networks
Viaarxiv icon

Towards Stealthy Backdoor Attacks against Speech Recognition via Elements of Sound

Add code
Bookmark button
Alert button
Jul 17, 2023
Hanbo Cai, Pengcheng Zhang, Hai Dong, Yan Xiao, Stefanos Koffas, Yiming Li

Figure 1 for Towards Stealthy Backdoor Attacks against Speech Recognition via Elements of Sound
Figure 2 for Towards Stealthy Backdoor Attacks against Speech Recognition via Elements of Sound
Figure 3 for Towards Stealthy Backdoor Attacks against Speech Recognition via Elements of Sound
Figure 4 for Towards Stealthy Backdoor Attacks against Speech Recognition via Elements of Sound
Viaarxiv icon

A Systematic Evaluation of Backdoor Trigger Characteristics in Image Classification

Add code
Bookmark button
Alert button
Feb 03, 2023
Gorka Abad, Jing Xu, Stefanos Koffas, Behrad Tajalli, Stjepan Picek

Figure 1 for A Systematic Evaluation of Backdoor Trigger Characteristics in Image Classification
Figure 2 for A Systematic Evaluation of Backdoor Trigger Characteristics in Image Classification
Figure 3 for A Systematic Evaluation of Backdoor Trigger Characteristics in Image Classification
Figure 4 for A Systematic Evaluation of Backdoor Trigger Characteristics in Image Classification
Viaarxiv icon

Going In Style: Audio Backdoors Through Stylistic Transformations

Add code
Bookmark button
Alert button
Nov 11, 2022
Stefanos Koffas, Luca Pajola, Stjepan Picek, Mauro Conti

Figure 1 for Going In Style: Audio Backdoors Through Stylistic Transformations
Figure 2 for Going In Style: Audio Backdoors Through Stylistic Transformations
Figure 3 for Going In Style: Audio Backdoors Through Stylistic Transformations
Viaarxiv icon

Dynamic Backdoors with Global Average Pooling

Add code
Bookmark button
Alert button
Mar 04, 2022
Stefanos Koffas, Stjepan Picek, Mauro Conti

Figure 1 for Dynamic Backdoors with Global Average Pooling
Figure 2 for Dynamic Backdoors with Global Average Pooling
Figure 3 for Dynamic Backdoors with Global Average Pooling
Figure 4 for Dynamic Backdoors with Global Average Pooling
Viaarxiv icon