Cited By
View all- Yan BLan JYan Z(2024)Backdoor Attacks against Voice Recognition Systems: A SurveyACM Computing Surveys10.1145/370198557:3(1-35)Online publication date: 22-Nov-2024
- Liu SChen JRuan SSu HYin ZCai JKankanhalli MPrabhakaran BBoll SSubramanian RZheng LSingh VCesar PXie LXu D(2024)Exploring the Robustness of Decision-Level Through Adversarial Attacks on LLM-Based Embodied ModelsProceedings of the 32nd ACM International Conference on Multimedia10.1145/3664647.3680616(8120-8128)Online publication date: 28-Oct-2024
- Shao CLi GWu JZheng X(2024)Exploring Semantic Redundancy using Backdoor Triggers: A Complementary Insight into the Challenges Facing DNN-based Software Vulnerability DetectionACM Transactions on Software Engineering and Methodology10.1145/364033333:4(1-28)Online publication date: 24-Jan-2024
- Show More Cited By