Search Results for author: Gorka Abad

Found 5 papers, 1 papers with code

Time-Distributed Backdoor Attacks on Federated Spiking Learning

no code implementations5 Feb 2024 Gorka Abad, Stjepan Picek, Aitor Urbieta

Then, we evaluate the transferability of known FL attack methods to SNNs, finding that these lead to suboptimal attack performance.

Federated Learning SSIM

Tabdoor: Backdoor Vulnerabilities in Transformer-based Neural Networks for Tabular Data

no code implementations13 Nov 2023 Bart Pleiter, Behrad Tajalli, Stefanos Koffas, Gorka Abad, Jing Xu, Martha Larson, Stjepan Picek

Our findings highlight the urgency of addressing such vulnerabilities and provide insights into potential countermeasures for securing DNN models against backdoors in tabular data.

Backdoor Attack

Rethinking the Trigger-injecting Position in Graph Backdoor Attack

no code implementations5 Apr 2023 Jing Xu, Gorka Abad, Stjepan Picek

There is no work analyzing and explaining the backdoor attack performance when injecting triggers into the most important or least important area in the sample, which we refer to as trigger-injecting strategies MIAS and LIAS, respectively.

Backdoor Attack Position

SoK: A Systematic Evaluation of Backdoor Trigger Characteristics in Image Classification

no code implementations3 Feb 2023 Gorka Abad, Jing Xu, Stefanos Koffas, Behrad Tajalli, Stjepan Picek, Mauro Conti

Nevertheless, it is vulnerable to backdoor attacks that modify the training set to embed a secret functionality in the trained model.

Image Classification Transfer Learning

Cannot find the paper you are looking for? You can Submit a new open access paper.