Open Access
| Issue |
ITM Web Conf.
Volume 78, 2025
International Conference on Computer Science and Electronic Information Technology (CSEIT 2025)
|
|
|---|---|---|
| Article Number | 02009 | |
| Number of page(s) | 6 | |
| Section | Machine Learning Applications in Vision, Security, and Healthcare | |
| DOI | https://doi.org/10.1051/itmconf/20257802009 | |
| Published online | 08 September 2025 | |
- Chen, L., Li, S., Bai, Q., et al.: “Review of Image Classification Algorithms Based on Convolutional Neural Networks”. Remote Sensing, 13(22), 4712, 2021. [CrossRef] [Google Scholar]
- Mehbodniya, A. Narayanasami, S., Webber, J., et al. “Medical Images Analysis for Segmentation and Classification Using DNN”. In: ICICSE 2022, Saini, H.S., Sayal, R., Govardhan, A., Buyya, R. (eds) Innovations in Computer Science and Engineering. Lecture Notes in Networks and Systems, vol 565. pp. 525–534, 2022. [Google Scholar]
- Gulhane, M., Kumar, S., Kumar, M., et al.: “Advancing Facial Recognition: Enhanced Model with Improved Deepface Algorithm for Robust Adaptability in Diverse Scenarios”. In: 10th IEEE Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON), Gautam Buddha Nagar, India. pp. 1384–1389, 2023. [Google Scholar]
- Gu, T., Dolan-Gavitt, Brendan, et al.: “Badnets: Identifying vulnerabilities in the machine learning model supply chain”, 2017. [Google Scholar]
- Gu, T., Liu K., Dolan-Gavitt B., et al.: "BadNets: Evaluating Backdooring Attacks on Deep Neural Networks," in IEEE Access, vol. 7, pp. 47230–47244, 2019. [CrossRef] [Google Scholar]
- Salem, A., Wen, R., Backes, M., et al.: “Dynamic Backdoor Attacks Against Machine Learning Models,” In: IEEE 7th European Symposium on Security and Privacy (EuroS&P), Genoa, Italy, pp. 703–718, 2022. [Google Scholar]
- Li, Yuezun, Li, Yiming, Wu, B., et al.: “Invisible Backdoor Attack with Sample-Specific Triggers”. In: IEEE International Conference on Computer Vision (ICCV). pp. 16463–16472, 2021. [Google Scholar]
- Zhong H., Liao C., Anna C., et al.: “Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation”. In Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy (CODASPY '20). Association for Computing Machinery, New York, NY, USA, pp. 97–108, 2022. [Google Scholar]
- Mascarenhas S., Agarwal M.: “A comparison between VGG16, VGG19 and ResNet50 architecture frameworks for Image Classification”, In: International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON), Bengaluru, India. pp. 96–99, 2021 [Google Scholar]
- Nguyen, A., Tran, A.: “Input-Aware Dynamic Backdoor Attack”. Advances in Neural Information Processing Systems, 33, pp. 3454–3464, 2020. [Google Scholar]
- Wang, T., Yao, Y., Xu, F., et al.: “An Invisible Black-Box Backdoor Attack Through Frequency Domain” In: Avidan, S., Brostow, G., Cissé, M., Farinella, G.M., Hassner, T. (eds) Computer Vision - ECCV 2022. ECCV 2022. Lecture Notes in Computer Science, vol 13673. pp. 396–413, 2022 [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.

