Picture for Gorka Abad

Gorka Abad

Flashy Backdoor: Real-world Environment Backdoor Attack on SNNs with DVS Cameras

Add code
Nov 05, 2024
Viaarxiv icon

Membership Privacy Evaluation in Deep Spiking Neural Networks

Add code
Sep 28, 2024
Figure 1 for Membership Privacy Evaluation in Deep Spiking Neural Networks
Figure 2 for Membership Privacy Evaluation in Deep Spiking Neural Networks
Figure 3 for Membership Privacy Evaluation in Deep Spiking Neural Networks
Figure 4 for Membership Privacy Evaluation in Deep Spiking Neural Networks
Viaarxiv icon

Context is the Key: Backdoor Attacks for In-Context Learning with Vision Transformers

Add code
Sep 06, 2024
Figure 1 for Context is the Key: Backdoor Attacks for In-Context Learning with Vision Transformers
Figure 2 for Context is the Key: Backdoor Attacks for In-Context Learning with Vision Transformers
Figure 3 for Context is the Key: Backdoor Attacks for In-Context Learning with Vision Transformers
Figure 4 for Context is the Key: Backdoor Attacks for In-Context Learning with Vision Transformers
Viaarxiv icon

Time-Distributed Backdoor Attacks on Federated Spiking Learning

Add code
Feb 05, 2024
Viaarxiv icon

Tabdoor: Backdoor Vulnerabilities in Transformer-based Neural Networks for Tabular Data

Add code
Nov 13, 2023
Viaarxiv icon

Rethinking the Trigger-injecting Position in Graph Backdoor Attack

Add code
Apr 18, 2023
Viaarxiv icon

Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data

Add code
Feb 13, 2023
Figure 1 for Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data
Figure 2 for Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data
Figure 3 for Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data
Figure 4 for Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data
Viaarxiv icon

A Systematic Evaluation of Backdoor Trigger Characteristics in Image Classification

Add code
Feb 03, 2023
Figure 1 for A Systematic Evaluation of Backdoor Trigger Characteristics in Image Classification
Figure 2 for A Systematic Evaluation of Backdoor Trigger Characteristics in Image Classification
Figure 3 for A Systematic Evaluation of Backdoor Trigger Characteristics in Image Classification
Figure 4 for A Systematic Evaluation of Backdoor Trigger Characteristics in Image Classification
Viaarxiv icon