Shang Wang

Papers in Database (2)

defense arXiv Aug 6, 2025 · Aug 2025

Isolate Trigger: Detecting and Eliminating Adaptive Backdoor Attacks

Chengrui Sun, Hua Zhang, Haoran Gao et al. · Beijing University of Posts and Telecommunications · China Mobile Research Institute +2 more

Defends against adaptive backdoor attacks by isolating hidden triggers from benign features and applying unlearning-based model repair

Model Poisoning vision
PDF
attack arXiv Mar 1, 2026 · 5w ago

Turning Black Box into White Box: Dataset Distillation Leaks

Huajie Chen, Tianqing Zhu, Yuchen Zhong et al. · City University of Macau · CISPA Helmholtz Center for Information Security +2 more

Reveals that dataset distillation leaks training data via three-stage attack: architecture inference, membership inference, and model inversion

Model Inversion Attack Membership Inference Attack vision
PDF