{"id":"https:\/\/openalex.org\/W4417521645","doi":"https:\/\/doi.org\/10.48550\/arxiv.2504.21052","title":"SFIBA: Spatial-based Full-target Invisible Backdoor Attacks","display_name":"SFIBA: Spatial-based Full-target Invisible Backdoor Attacks","publication_year":2025,"publication_date":"2025-04-29","ids":{"openalex":"https:\/\/openalex.org\/W4417521645","doi":"https:\/\/doi.org\/10.48550\/arxiv.2504.21052"},"language":"en","primary_location":{"id":"pmh:oai:arXiv.org:2504.21052","is_oa":true,"landing_page_url":"http:\/\/arxiv.org\/abs\/2504.21052","pdf_url":"https:\/\/arxiv.org\/pdf\/2504.21052","source":{"id":"https:\/\/openalex.org\/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https:\/\/openalex.org\/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https:\/\/openalex.org\/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"type":"preprint","indexed_in":["arxiv","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https:\/\/arxiv.org\/pdf\/2504.21052","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Yin, Yangxu","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Yin, Yangxu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https:\/\/openalex.org\/A5005165463","display_name":"Honglong Chen","orcid":"https:\/\/orcid.org\/0000-0003-0739-6338"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chen, Honglong","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https:\/\/openalex.org\/A5101218044","display_name":"Yudong Gao","orcid":"https:\/\/orcid.org\/0000-0003-0264-6545"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gao, Yudong","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https:\/\/openalex.org\/A5101404136","display_name":"Peng Sun","orcid":"https:\/\/orcid.org\/0000-0003-4715-5926"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sun, Peng","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https:\/\/openalex.org\/A5030816801","display_name":"Zhishuai Li","orcid":"https:\/\/orcid.org\/0000-0003-3408-6300"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Li, Zhishuai","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https:\/\/openalex.org\/A5100444156","display_name":"Weifeng Liu","orcid":"https:\/\/orcid.org\/0000-0002-5388-9080"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Liu, Weifeng","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https:\/\/openalex.org\/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9901999831199646,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1702","display_name":"Artificial Intelligence"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},"topics":[{"id":"https:\/\/openalex.org\/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9901999831199646,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1702","display_name":"Artificial Intelligence"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},{"id":"https:\/\/openalex.org\/T11241","display_name":"Advanced Malware Detection Techniques","score":0.0012000000569969416,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1711","display_name":"Signal Processing"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},{"id":"https:\/\/openalex.org\/T10036","display_name":"Advanced Neural Network Applications","score":0.0010999999940395355,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https:\/\/openalex.org\/keywords\/backdoor","display_name":"Backdoor","score":0.9925000071525574},{"id":"https:\/\/openalex.org\/keywords\/filter","display_name":"Filter (signal processing)","score":0.36039999127388},{"id":"https:\/\/openalex.org\/keywords\/limiting","display_name":"Limiting","score":0.35499998927116394},{"id":"https:\/\/openalex.org\/keywords\/pixel","display_name":"Pixel","score":0.33239999413490295},{"id":"https:\/\/openalex.org\/keywords\/artificial-neural-network","display_name":"Artificial neural network","score":0.3199999928474426},{"id":"https:\/\/openalex.org\/keywords\/wavelet","display_name":"Wavelet","score":0.31790000200271606},{"id":"https:\/\/openalex.org\/keywords\/key","display_name":"Key (lock)","score":0.31450000405311584}],"concepts":[{"id":"https:\/\/openalex.org\/C2781045450","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q254569","display_name":"Backdoor","level":2,"score":0.9925000071525574},{"id":"https:\/\/openalex.org\/C41008148","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q21198","display_name":"Computer science","level":0,"score":0.628600001335144},{"id":"https:\/\/openalex.org\/C154945302","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q11660","display_name":"Artificial intelligence","level":1,"score":0.46560001373291016},{"id":"https:\/\/openalex.org\/C106131492","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q3072260","display_name":"Filter (signal processing)","level":2,"score":0.36039999127388},{"id":"https:\/\/openalex.org\/C11413529","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q8366","display_name":"Algorithm","level":1,"score":0.35530000925064087},{"id":"https:\/\/openalex.org\/C188198153","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q1613840","display_name":"Limiting","level":2,"score":0.35499998927116394},{"id":"https:\/\/openalex.org\/C38652104","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q3510521","display_name":"Computer security","level":1,"score":0.34470000863075256},{"id":"https:\/\/openalex.org\/C31972630","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q844240","display_name":"Computer vision","level":1,"score":0.3402999937534332},{"id":"https:\/\/openalex.org\/C160633673","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q355198","display_name":"Pixel","level":2,"score":0.33239999413490295},{"id":"https:\/\/openalex.org\/C50644808","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q192776","display_name":"Artificial neural network","level":2,"score":0.3199999928474426},{"id":"https:\/\/openalex.org\/C47432892","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q831390","display_name":"Wavelet","level":2,"score":0.31790000200271606},{"id":"https:\/\/openalex.org\/C26517878","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q228039","display_name":"Key (lock)","level":2,"score":0.31450000405311584},{"id":"https:\/\/openalex.org\/C153180895","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3138999938964844},{"id":"https:\/\/openalex.org\/C35525427","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q745881","display_name":"Intrusion detection system","level":2,"score":0.2921999990940094},{"id":"https:\/\/openalex.org\/C739882","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q3560506","display_name":"Anomaly detection","level":2,"score":0.29190000891685486},{"id":"https:\/\/openalex.org\/C115961682","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q860623","display_name":"Image (mathematics)","level":2,"score":0.28859999775886536},{"id":"https:\/\/openalex.org\/C79403827","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q3988","display_name":"Real-time computing","level":1,"score":0.27570000290870667},{"id":"https:\/\/openalex.org\/C2778355321","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q17079427","display_name":"Identity (music)","level":2,"score":0.27320000529289246},{"id":"https:\/\/openalex.org\/C2777212361","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.26339998841285706},{"id":"https:\/\/openalex.org\/C57733114","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q1006032","display_name":"Discrete Fourier transform (general)","level":5,"score":0.25049999356269836}],"mesh":[],"locations_count":3,"locations":[{"id":"pmh:oai:arXiv.org:2504.21052","is_oa":true,"landing_page_url":"http:\/\/arxiv.org\/abs\/2504.21052","pdf_url":"https:\/\/arxiv.org\/pdf\/2504.21052","source":{"id":"https:\/\/openalex.org\/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https:\/\/openalex.org\/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https:\/\/openalex.org\/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:doi:10.48550\/arxiv.2504.21052","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https:\/\/openalex.org\/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"publisher-specific-oa","license_id":"https:\/\/openalex.org\/licenses\/publisher-specific-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},{"id":"doi:10.48550\/arxiv.2504.21052","is_oa":true,"landing_page_url":"https:\/\/doi.org\/10.48550\/arxiv.2504.21052","pdf_url":null,"source":{"id":"https:\/\/openalex.org\/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https:\/\/openalex.org\/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https:\/\/openalex.org\/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2504.21052","is_oa":true,"landing_page_url":"http:\/\/arxiv.org\/abs\/2504.21052","pdf_url":"https:\/\/arxiv.org\/pdf\/2504.21052","source":{"id":"https:\/\/openalex.org\/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https:\/\/openalex.org\/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https:\/\/openalex.org\/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https:\/\/content.openalex.org\/works\/W4417521645.pdf","grobid_xml":"https:\/\/content.openalex.org\/works\/W4417521645.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Multi-target":[0],"backdoor":[1,21,50,55,256],"attacks":[2,56],"pose":[3],"significant":[4],"security":[5],"threats":[6],"to":[7,26,30,58,76,106,128,139,149,164,182,195,210],"deep":[8],"neural":[9],"networks,":[10],"as":[11],"they":[12,73],"can":[13,85,236,252],"preset":[14],"multiple":[15,227],"target":[16,39,78],"classes":[17,80,127],"through":[18],"a":[19,114,144],"single":[20],"injection.":[22],"This":[23],"allows":[24],"attackers":[25],"control":[27],"the":[28,96,136,166,184,187,197,205,245],"model":[29],"misclassify":[31],"poisoned":[32,103],"samples":[33,104,171],"with":[34,48],"triggers":[35,97,124],"into":[36],"any":[37],"desired":[38],"class":[40],"during":[41],"inference,":[42],"exhibiting":[43],"superior":[44],"attack":[45,93,239],"performance":[46,240,247],"compared":[47],"conventional":[49],"attacks.":[51],"However,":[52],"existing":[53,255],"multi-target":[54],"fail":[57],"guarantee":[59,150],"trigger":[60,146,206,212],"specificity":[61],"and":[62,133,190,215,229,241,251],"stealthiness":[63],"in":[64,68,91,135,172,207],"black-box":[65],"settings,":[66],"resulting":[67],"two":[69],"main":[70],"issues.":[71],"First,":[72],"are":[74],"unable":[75],"simultaneously":[77],"all":[79],"when":[81],"only":[82],"training":[83],"data":[84],"be":[86],"manipulated,":[87],"limiting":[88],"their":[89],"effectiveness":[90],"realistic":[92],"scenarios.":[94],"Second,":[95],"often":[98],"lack":[99],"visual":[100,221],"imperceptibility,":[101],"making":[102],"easy":[105],"detect.":[107],"To":[108],"address":[109],"these":[110],"problems,":[111],"we":[112,158,177,200],"propose":[113],"Spatial-based":[115],"Full-target":[116],"Invisible":[117],"Backdoor":[118],"Attack,":[119],"called":[120],"SFIBA.":[121],"It":[122],"restricts":[123],"for":[125,153],"different":[126],"specific":[129],"local":[130,173],"spatial":[131,174],"regions":[132],"morphologies":[134],"pixel":[137,208],"space":[138,209],"ensure":[140],"specificity,":[141],"while":[142,243],"employing":[143],"frequency-domain-based":[145],"injection":[147,154,217],"method":[148],"stealthiness.":[151],"Specifically,":[152],"of":[155,169,204],"each":[156],"trigger,":[157],"first":[159],"apply":[160],"fast":[161],"fourier":[162],"transform":[163,181],"obtain":[165],"amplitude":[167,188],"spectrum":[168,189],"clean":[170],"regions.":[175],"Then,":[176],"employ":[178],"discrete":[179],"wavelet":[180],"extract":[183],"features":[185],"from":[186],"use":[191],"singular":[192],"value":[193],"decomposition":[194],"integrate":[196],"trigger.":[198],"Subsequently,":[199],"selectively":[201],"filter":[202],"parts":[203],"implement":[211],"morphology":[213],"constraints":[214],"adjust":[216],"coefficients":[218],"based":[219],"on":[220,226,248],"effects.":[222],"We":[223],"conduct":[224],"experiments":[225],"datasets":[228],"models.":[230],"The":[231],"results":[232],"demonstrate":[233],"that":[234],"SFIBA":[235],"achieve":[237],"excellent":[238],"stealthiness,":[242],"preserving":[244],"model's":[246],"benign":[249],"samples,":[250],"also":[253],"bypass":[254],"defenses.":[257]},"counts_by_year":[],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2025-10-10T00:00:00"}