Open Access
| Issue |
ITM Web Conf.
Volume 84, 2026
2026 International Conference on Advent Trends in Computational Intelligence and Data Science (ATCIDS 2026)
|
|
|---|---|---|
| Article Number | 04002 | |
| Number of page(s) | 10 | |
| Section | Computer Vision, Robotic Systems, and Intelligent Control | |
| DOI | https://doi.org/10.1051/itmconf/20268404002 | |
| Published online | 06 April 2026 | |
- M. K. Bohmrah and K. Harjot. Advanced Hybridization and Optimization of DNNs for Medical Imaging: A Survey on Disease Detection Techniques. Artificial Intelligence Review 58.4: 122 (2025) [Google Scholar]
- B. Y. Wu, et al. Backdoorbench: A comprehensive benchmark of backdoor learning. Advances in Neural Information Processing Systems 35: 10546–10559. (2022) [Google Scholar]
- Y. Bai, et al. Backdoor attack and defense on deep learning: A survey. IEEE Transactions on Computational Social Systems (2024) [Google Scholar]
- Y. M. Li, et al. Backdoor learning: A survey. IEEE transactions on neural networks and learning systems 35.1: 5–22. (2022) [Google Scholar]
- W. B. Jiang, et al. Rethinking the Design of Backdoor Triggers and Adversarial Perturbations: A Color Space Perspective. IEEE Transactions on Dependable and Secure Computing (2024) [Google Scholar]
- Y. L. Wang, et al. Dispersed pixel perturbation-based imperceptible backdoor trigger for image classifier models. IEEE Transactions on Information Forensics and Security 17: 3091–3106. (2022) [Google Scholar]
- J. Zhang, et al. Poison ink: Robust and invisible backdoor attack. IEEE Transactions on Image Processing 31: 5691–5705. (2022) [Google Scholar]
- J. Wang, et al. Improved Distributed Backdoor Attacks in Federated Learning by Density-Adaptive Data Poisoning and Projection-Based Gradient Updating. IEEE Access (2025) [Google Scholar]
- H. F. Xia, et al. CBPF: A Novel Method For Filtering Poisoned Data Based on Composite Backdoor Attacks. IEEE Internet of Things Journal (2025) [Google Scholar]
- H. K. Surendrababu, and N. Nithin. A novel backdoor detection approach using entropy-based measures. IEEE Access (2024) [Google Scholar]
- M. Liu, Alberto Sangiovanni-Vincentelli, and Xiangyu Yue. Beating backdoor attack at its own game. Proceedings of the IEEE/CVF International Conference on Computer Vision. (2023) [Google Scholar]
- B. Li, et al. A4FL: Federated Adversarial Defense via Adversarial Training and Pruning Against Backdoor Attack. IEEE Access (2025) [Google Scholar]
- B. L. Wang, et al. Neural cleanse: Identifying and mitigating backdoor attacks in neural networks. 2019 IEEE symposium on security and privacy (SP). IEEE, (2019) [Google Scholar]
- Z. M. Yao, et al. Reverse backdoor distillation: Towards online backdoor attack detection for deep neural network models. IEEE Transactions on Dependable and Secure Computing 21.6: 5098–5111. (2024) [Google Scholar]
- D. Vršnak, S. Marko and L. Sven. Efficient Method for Robust Backdoor Detection and Removal in Feature Space Using Clean Data. IEEE access (2025) [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.

