no code implementations • IEEE Transactions on Dependable and Secure Computing 2022 • Mingfu Xue, Can He, Jian Wang, and Weiqiang Liu
In this article, for the first time, we propose two advanced backdoor attacks, the multi-target backdoor attacks and multi-trigger backdoor attacks: 1) One-to-N attack, where the attacker can trigger multiple backdoor targets by controlling the different intensities of the same backdoor; 2) N-to-One attack, where such attack is triggered only when all the N backdoors are satisfied.