iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1145/3503161.3548296
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:34:07Z","timestamp":1729643647172,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":78,"publisher":"ACM","funder":[{"name":"The National Natural Science Foundation of China (NSFC)","award":["61972448"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,10]]},"DOI":"10.1145\/3503161.3548296","type":"proceedings-article","created":{"date-parts":[[2022,10,10]],"date-time":"2022-10-10T15:42:46Z","timestamp":1665416566000},"page":"5351-5360","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Backdoor Attacks on Crowd Counting"],"prefix":"10.1145","author":[{"given":"Yuhua","family":"Sun","sequence":"first","affiliation":[{"name":"Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"}]},{"given":"Tailai","family":"Zhang","sequence":"additional","affiliation":[{"name":"Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"}]},{"given":"Xingjun","family":"Ma","sequence":"additional","affiliation":[{"name":"School of Computer Science, Fudan University, Shanghai, China"}]},{"given":"Pan","family":"Zhou","sequence":"additional","affiliation":[{"name":"Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"}]},{"given":"Jian","family":"Lou","sequence":"additional","affiliation":[{"name":"Guangzhou Institute of Technology & Xidian University, Xi'an, China"}]},{"given":"Zichuan","family":"Xu","sequence":"additional","affiliation":[{"name":"Dalian University of Technology, Dalian, China"}]},{"given":"Xing","family":"Di","sequence":"additional","affiliation":[{"name":"Protagolabs Inc., Vienna, VA, USA"}]},{"given":"Yu","family":"Cheng","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"given":"Lichao","family":"Sun","sequence":"additional","affiliation":[{"name":"Lehigh University, Bethlehem, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,10,10]]},"reference":[{"volume-title":"Deep Learning Based Face Mask Detection and Crowd Counting. I2CT","year":"2021","author":"Amin Prithvi N.","key":"e_1_3_2_2_1_1","unstructured":"Prithvi N. Amin , Sayali S. Moghe , Sparsh N. Prabhakar , and Charusheela Nehete . 2021. Deep Learning Based Face Mask Detection and Crowd Counting. I2CT ( 2021 ), 1--5. Prithvi N. Amin, Sayali S. Moghe, Sparsh N. Prabhakar, and Charusheela Nehete. 2021. Deep Learning Based Face Mask Detection and Crowd Counting. I2CT (2021), 1--5."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2019.8802997"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7908-2604-3_16"},{"volume-title":"Chan and Nuno Vasconcelos","year":"2009","author":"Antoni","key":"e_1_3_2_2_4_1","unstructured":"Antoni B. Chan and Nuno Vasconcelos . 2009 . Bayesian Poisson regression for crowd counting. ICCV ( 2009), 545--551. Antoni B. Chan and Nuno Vasconcelos. 2009. Bayesian Poisson regression for crowd counting. ICCV (2009), 545--551."},{"volume-title":"Detecting backdoor attacks on deep neural networks by activation clustering. arXiv preprint arXiv:1811.03728","year":"2018","author":"Chen Bryant","key":"e_1_3_2_2_5_1","unstructured":"Bryant Chen , Wilka Carvalho , Nathalie Baracaldo , Heiko Ludwig , Benjamin Edwards , Taesung Lee , Ian Molloy , and Biplav Srivastava . 2018. Detecting backdoor attacks on deep neural networks by activation clustering. arXiv preprint arXiv:1811.03728 ( 2018 ). Bryant Chen, Wilka Carvalho, Nathalie Baracaldo, Heiko Ludwig, Benjamin Edwards, Taesung Lee, Ian Molloy, and Biplav Srivastava. 2018. Detecting backdoor attacks on deep neural networks by activation clustering. arXiv preprint arXiv:1811.03728 (2018)."},{"volume-title":"Invisible Poisoning: Highly Stealthy Targeted Poisoning Attack. In ICISC.","year":"2019","author":"Chen Jinyin","key":"e_1_3_2_2_6_1","unstructured":"Jinyin Chen , Haibin Zheng , Mengmeng Su , Tianyu Du , Changting Lin , and Shouling Ji . 2019 . Invisible Poisoning: Highly Stealthy Targeted Poisoning Attack. In ICISC. Jinyin Chen, Haibin Zheng, Mengmeng Su, Tianyu Du, Changting Lin, and Shouling Ji. 2019. Invisible Poisoning: Highly Stealthy Targeted Poisoning Attack. In ICISC."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"crossref","unstructured":"Tianlong Chen Sijia Liu Shiyu Chang Yu Cheng Lisa Amini and Zhangyang Wang. 2020. Adversarial robustness: From self-supervised pre-training to finetuning. In CVPR. 699--708. Tianlong Chen Sijia Liu Shiyu Chang Yu Cheng Lisa Amini and Zhangyang Wang. 2020. Adversarial robustness: From self-supervised pre-training to finetuning. In CVPR. 699--708.","DOI":"10.1109\/CVPR42600.2020.00078"},{"volume-title":"Targeted backdoor attacks on deep learning systems using data poisoning. arXiv preprint arXiv:1712.05526","year":"2017","author":"Chen Xinyun","key":"e_1_3_2_2_8_1","unstructured":"Xinyun Chen , Chang Liu , Bo Li , Kimberly Lu , and Dawn Song . 2017. Targeted backdoor attacks on deep learning systems using data poisoning. arXiv preprint arXiv:1712.05526 ( 2017 ). Xinyun Chen, Chang Liu, Bo Li, Kimberly Lu, and Dawn Song. 2017. Targeted backdoor attacks on deep learning systems using data poisoning. arXiv preprint arXiv:1712.05526 (2017)."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"crossref","unstructured":"Siyuan Cheng Yingqi Liu Shiqing Ma and Xiangyu Zhang. 2021. Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification. In AAAI. Siyuan Cheng Yingqi Liu Shiqing Ma and Xiangyu Zhang. 2021. Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification. In AAAI.","DOI":"10.1609\/aaai.v35i2.16201"},{"volume-title":"Jeremy Bernstein, Jean Kossaifi, Aran Khanna, and Anima Anandkumar.","year":"2018","author":"Dhillon Guneet Singh","key":"e_1_3_2_2_10_1","unstructured":"Guneet Singh Dhillon , Kamyar Azizzadenesheli , Zachary Chase Lipton , Jeremy Bernstein, Jean Kossaifi, Aran Khanna, and Anima Anandkumar. 2018 . Stochastic Activation Pruning for Robust Adversarial Defense. ArXiv abs\/1803.01442 (2018). Guneet Singh Dhillon, Kamyar Azizzadenesheli, Zachary Chase Lipton, Jeremy Bernstein, Jean Kossaifi, Aran Khanna, and Anima Anandkumar. 2018. Stochastic Activation Pruning for Robust Adversarial Defense. ArXiv abs\/1803.01442 (2018)."},{"volume-title":"Robust Physical-World Attacks on Deep Learning Visual Classification. CVPR","year":"2018","author":"Eykholt Kevin","key":"e_1_3_2_2_11_1","unstructured":"Kevin Eykholt , I. Evtimov , Earlence Fernandes , Bo Li , Amir Rahmati , Chaowei Xiao , Atul Prakash , Tadayoshi Kohno , and Dawn Xiaodong Song . 2018. Robust Physical-World Attacks on Deep Learning Visual Classification. CVPR ( 2018 ), 1625--1634. Kevin Eykholt, I. Evtimov, Earlence Fernandes, Bo Li, Amir Rahmati, Chaowei Xiao, Atul Prakash, Tadayoshi Kohno, and Dawn Xiaodong Song. 2018. Robust Physical-World Attacks on Deep Learning Visual Classification. CVPR (2018), 1625--1634."},{"volume-title":"Object detection with discriminatively trained part-based models","year":"2009","author":"Felzenszwalb Pedro F","key":"e_1_3_2_2_12_1","unstructured":"Pedro F Felzenszwalb , Ross B Girshick , David McAllester , and Deva Ramanan . 2009. Object detection with discriminatively trained part-based models . IEEE transactions on pattern analysis and machine intelligence 32, 9 ( 2009 ), 1627--1645. Pedro F Felzenszwalb, Ross B Girshick, David McAllester, and Deva Ramanan. 2009. Object detection with discriminatively trained part-based models. IEEE transactions on pattern analysis and machine intelligence 32, 9 (2009), 1627--1645."},{"volume-title":"BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain. ArXiv abs\/1708.06733","year":"2017","author":"Gu Tianyu","key":"e_1_3_2_2_13_1","unstructured":"Tianyu Gu , Brendan Dolan-Gavitt , and Siddharth Garg . 2017. BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain. ArXiv abs\/1708.06733 ( 2017 ). Tianyu Gu, Brendan Dolan-Gavitt, and Siddharth Garg. 2017. BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain. ArXiv abs\/1708.06733 (2017)."},{"volume-title":"Saturnino Maldonado-Basc\u00f3n, and Daniel O\u00f1oro-Rubio.","year":"2015","author":"Guerrero-G\u00f3mez-Olmedo Ricardo","key":"e_1_3_2_2_14_1","unstructured":"Ricardo Guerrero-G\u00f3mez-Olmedo , Beatriz Torre-Jim\u00e9nez , Roberto Javier L\u00f3pez-Sastre , Saturnino Maldonado-Basc\u00f3n, and Daniel O\u00f1oro-Rubio. 2015 . Extremely Overlapping Vehicle Counting. In IbPRIA. Ricardo Guerrero-G\u00f3mez-Olmedo, Beatriz Torre-Jim\u00e9nez, Roberto Javier L\u00f3pez-Sastre, Saturnino Maldonado-Basc\u00f3n, and Daniel O\u00f1oro-Rubio. 2015. Extremely Overlapping Vehicle Counting. In IbPRIA."},{"volume-title":"Membership Inference via Backdooring. ArXiv abs\/2206.04823","year":"2022","author":"Hu Hongsheng","key":"e_1_3_2_2_15_1","unstructured":"Hongsheng Hu , Zoran A. Salcic , Gillian Dobbie , Jinjun Chen , Lichao Sun , and Xuyun Zhang . 2022. Membership Inference via Backdooring. ArXiv abs\/2206.04823 ( 2022 ). Hongsheng Hu, Zoran A. Salcic, Gillian Dobbie, Jinjun Chen, Lichao Sun, and Xuyun Zhang. 2022. Membership Inference via Backdooring. ArXiv abs\/2206.04823 (2022)."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"crossref","unstructured":"Haroon Idrees Imran Saleemi Cody Seibert and Mubarak Shah. 2013. Multisource multi-scale counting in extremely dense crowd images. In CVPR. 2547--2554. Haroon Idrees Imran Saleemi Cody Seibert and Mubarak Shah. 2013. Multisource multi-scale counting in extremely dense crowd images. In CVPR. 2547--2554.","DOI":"10.1109\/CVPR.2013.329"},{"volume-title":"Nasir M. Rajpoot, and Mubarak Shah.","year":"2018","author":"Idrees Haroon","key":"e_1_3_2_2_17_1","unstructured":"Haroon Idrees , Muhmmad Tayyab , Kishan Athrey , Dong Zhang , Somaya Ali Al-Maadeed , Nasir M. Rajpoot, and Mubarak Shah. 2018 . Composition Loss for Counting, Density Map Estimation and Localization in Dense Crowds. ArXiv abs\/1808.01050 (2018). Haroon Idrees, Muhmmad Tayyab, Kishan Athrey, Dong Zhang, Somaya Ali Al-Maadeed, Nasir M. Rajpoot, and Mubarak Shah. 2018. Composition Loss for Counting, Density Map Estimation and Localization in Dense Crowds. ArXiv abs\/1808.01050 (2018)."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"crossref","unstructured":"Xiaoheng Jiang Li Zhang Mingliang Xu Tianzhu Zhang Pei Lv Bing Zhou Xin Yang and Yanwei Pang. 2020. Attention scaling for crowd counting. In CVPR. 4706--4715. Xiaoheng Jiang Li Zhang Mingliang Xu Tianzhu Zhang Pei Lv Bing Zhou Xin Yang and Yanwei Pang. 2020. Attention scaling for crowd counting. In CVPR. 4706--4715.","DOI":"10.1109\/CVPR42600.2020.00476"},{"volume-title":"Chan","year":"2020","author":"Kang Di","key":"e_1_3_2_2_19_1","unstructured":"Di Kang , Debarun Dhar , and Antoni B . Chan . 2020 . Incorporating Side Information by Adaptive Convolution. International Journal of Computer Vision ( 2020), 1--22. Di Kang, Debarun Dhar, and Antoni B. Chan. 2020. Incorporating Side Information by Adaptive Convolution. International Journal of Computer Vision (2020), 1--22."},{"volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980","year":"2014","author":"Kingma Diederik P","key":"e_1_3_2_2_20_1","unstructured":"Diederik P Kingma and Jimmy Ba . 2014 . Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014). Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)."},{"volume-title":"Schmidt","year":"2018","author":"Laradji Issam H.","key":"e_1_3_2_2_21_1","unstructured":"Issam H. Laradji , Negar Rostamzadeh , Pedro H. O. Pinheiro , David V\u00e1zquez , and Mark W . Schmidt . 2018 . Where are the Blobs : Counting by Localization with Point Supervision. ArXiv abs\/1807.09856 (2018). Issam H. Laradji, Negar Rostamzadeh, Pedro H. O. Pinheiro, David V\u00e1zquez, and Mark W. Schmidt. 2018. Where are the Blobs: Counting by Localization with Point Supervision. ArXiv abs\/1807.09856 (2018)."},{"volume-title":"Lempitsky and Andrew Zisserman","year":"2010","author":"Victor","key":"e_1_3_2_2_22_1","unstructured":"Victor S. Lempitsky and Andrew Zisserman . 2010 . Learning To Count Objects in Images. In NIPS. Victor S. Lempitsky and Andrew Zisserman. 2010. Learning To Count Objects in Images. In NIPS."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3021407"},{"volume-title":"Haojin Zhu, and Xinpeng Zhang.","year":"2019","author":"Li Shaofeng","key":"e_1_3_2_2_24_1","unstructured":"Shaofeng Li , Minhui Xue , Benjamin Zi Hao Zhao , Haojin Zhu, and Xinpeng Zhang. 2019 . Invisible Backdoor Attacks on Deep Neural Networks via Steganography and Regularization . arXiv preprint arXiv:1909.02742 (2019). Shaofeng Li, Minhui Xue, Benjamin Zi Hao Zhao, Haojin Zhu, and Xinpeng Zhang. 2019. Invisible Backdoor Attacks on Deep Neural Networks via Steganography and Regularization. arXiv preprint arXiv:1909.02742 (2019)."},{"key":"e_1_3_2_2_25_1","unstructured":"Yuezun Li Yiming Li Baoyuan Wu Longkang Li Ran He and Siwei Lyu. 2021. Invisible Backdoor Attack With Sample-Specific Triggers. In ICCV. 16463--16472. Yuezun Li Yiming Li Baoyuan Wu Longkang Li Ran He and Siwei Lyu. 2021. Invisible Backdoor Attack With Sample-Specific Triggers. In ICCV. 16463--16472."},{"volume-title":"Anti-Backdoor Learning: Training Clean Models on Poisoned Data. NeurIPS","year":"2021","author":"Li Yige","key":"e_1_3_2_2_26_1","unstructured":"Yige Li , Xixiang Lyu , Nodens Koren , Lingjuan Lyu , Bo Li , and Xingjun Ma. 2021. Anti-Backdoor Learning: Training Clean Models on Poisoned Data. NeurIPS ( 2021 ). Yige Li, Xixiang Lyu, Nodens Koren, Lingjuan Lyu, Bo Li, and Xingjun Ma. 2021. Anti-Backdoor Learning: Training Clean Models on Poisoned Data. NeurIPS (2021)."},{"volume-title":"Backdoor Attack in the Physical World. arXiv preprint arXiv:2104.02361","year":"2021","author":"Li Yiming","key":"e_1_3_2_2_27_1","unstructured":"Yiming Li , Tongqing Zhai , Yong Jiang , Zhifeng Li , and Shu-Tao Xia . 2021. Backdoor Attack in the Physical World. arXiv preprint arXiv:2104.02361 ( 2021 ). Yiming Li, Tongqing Zhai, Yong Jiang, Zhifeng Li, and Shu-Tao Xia. 2021. Backdoor Attack in the Physical World. arXiv preprint arXiv:2104.02361 (2021)."},{"volume-title":"CSRNet: Dilated Convolutional Neural Networks for Understanding the Highly Congested Scenes. CVPR","year":"2018","author":"Li Yuhong","key":"e_1_3_2_2_28_1","unstructured":"Yuhong Li , Xiaofan Zhang , and Deming Chen . 2018. CSRNet: Dilated Convolutional Neural Networks for Understanding the Highly Congested Scenes. CVPR ( 2018 ), 1091--1100. Yuhong Li, Xiaofan Zhang, and Deming Chen. 2018. CSRNet: Dilated Convolutional Neural Networks for Understanding the Highly Congested Scenes. CVPR (2018), 1091--1100."},{"volume-title":"Few-shot backdoor attacks on visual object tracking. ICLR","year":"2022","author":"Li Yiming","key":"e_1_3_2_2_29_1","unstructured":"Yiming Li , Haoxiang Zhong , Xingjun Ma , Yong Jiang , and Shu-Tao Xia . 2022. Few-shot backdoor attacks on visual object tracking. ICLR ( 2022 ). Yiming Li, Haoxiang Zhong, Xingjun Ma, Yong Jiang, and Shu-Tao Xia. 2022. Few-shot backdoor attacks on visual object tracking. ICLR (2022)."},{"volume-title":"Backdoor embedding in convolutional neural network models via invisible perturbation. CODASPY","year":"2020","author":"Liao Cong","key":"e_1_3_2_2_30_1","unstructured":"Cong Liao , Haoti Zhong , Anna Squicciarini , Sencun Zhu , and David Miller . 2020. Backdoor embedding in convolutional neural network models via invisible perturbation. CODASPY ( 2020 ). Cong Liao, Haoti Zhong, Anna Squicciarini, Sencun Zhu, and David Miller. 2020. Backdoor embedding in convolutional neural network models via invisible perturbation. CODASPY (2020)."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2009.204"},{"volume-title":"DecideNet: Counting Varying Density Crowds Through Attention Guided Detection and Density Estimation. CVPR","year":"2018","author":"Liu Jiang","key":"e_1_3_2_2_32_1","unstructured":"Jiang Liu , Chenqiang Gao , Deyu Meng , and Alexander Hauptmann . 2018. DecideNet: Counting Varying Density Crowds Through Attention Guided Detection and Density Estimation. CVPR ( 2018 ), 5197--5206. Jiang Liu, Chenqiang Gao, Deyu Meng, and Alexander Hauptmann. 2018. DecideNet: Counting Varying Density Crowds Through Attention Guided Detection and Density Estimation. CVPR (2018), 5197--5206."},{"volume-title":"Fine-pruning: Defending against backdooring attacks on deep neural networks","year":"2018","author":"Liu Kang","key":"e_1_3_2_2_33_1","unstructured":"Kang Liu , Brendan Dolan-Gavitt , and Siddharth Garg . 2018 . Fine-pruning: Defending against backdooring attacks on deep neural networks . In RAID. Springer , 273--294. Kang Liu, Brendan Dolan-Gavitt, and Siddharth Garg. 2018. Fine-pruning: Defending against backdooring attacks on deep neural networks. In RAID. Springer, 273--294."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_13"},{"key":"e_1_3_2_2_35_1","unstructured":"Lingbo Liu Jiaqi Chen Hefeng Wu Guanbin Li Chenglong Li and Liang Lin. 2021. Cross-Modal Collaborative Representation Learning and a Large-Scale RGBT Benchmark for Crowd Counting. In CVPR. 4823--4833. Lingbo Liu Jiaqi Chen Hefeng Wu Guanbin Li Chenglong Li and Liang Lin. 2021. Cross-Modal Collaborative Representation Learning and a Large-Scale RGBT Benchmark for Crowd Counting. In CVPR. 4823--4833."},{"volume-title":"Context-Aware Crowd Counting. CVPR","year":"2019","author":"Liu Weizhe","key":"e_1_3_2_2_36_1","unstructured":"Weizhe Liu , Mathieu Salzmann , and Pascal Fua . 2019. Context-Aware Crowd Counting. CVPR ( 2019 ), 5094--5103. Weizhe Liu, Mathieu Salzmann, and Pascal Fua. 2019. Context-Aware Crowd Counting. CVPR (2019), 5094--5103."},{"key":"e_1_3_2_2_37_1","unstructured":"Weizhe Liu Mathieu Salzmann and P. Fua. 2019. Using Depth for Pixel-Wise Detection of Adversarial Attacks in Crowd Counting. ArXiv abs\/1911.11484 (2019). Weizhe Liu Mathieu Salzmann and P. Fua. 2019. Using Depth for Pixel-Wise Detection of Adversarial Attacks in Crowd Counting. ArXiv abs\/1911.11484 (2019)."},{"key":"e_1_3_2_2_38_1","unstructured":"Xinyan Liu Guorong Li Zhenjun Han Weigang Zhang Yifan Yang Qingming Huang and Nicu Sebe. 2021. Exploiting sample correlation for crowd counting with multi-expert network. In CVPR. 3215--3224. Xinyan Liu Guorong Li Zhenjun Han Weigang Zhang Yifan Yang Qingming Huang and Nicu Sebe. 2021. Exploiting sample correlation for crowd counting with multi-expert network. In CVPR. 3215--3224."},{"key":"e_1_3_2_2_39_1","unstructured":"Yingqi Liu Shiqing Ma Yousra Aafer Wen-Chuan Lee Juan Zhai WeihangWang and Xiangyu Zhang. 2017. Trojaning attack on neural networks. (2017). Yingqi Liu Shiqing Ma Yousra Aafer Wen-Chuan Lee Juan Zhai WeihangWang and Xiangyu Zhang. 2017. Trojaning attack on neural networks. (2017)."},{"volume-title":"Reflection backdoor: A natural backdoor attack on deep neural networks","author":"Liu Yunfei","key":"e_1_3_2_2_40_1","unstructured":"Yunfei Liu , Xingjun Ma , James Bailey , and Feng Lu. 2020. Reflection backdoor: A natural backdoor attack on deep neural networks . In ECCV. Springer , 182--199. Yunfei Liu, Xingjun Ma, James Bailey, and Feng Lu. 2020. Reflection backdoor: A natural backdoor attack on deep neural networks. In ECCV. Springer, 182--199."},{"key":"e_1_3_2_2_41_1","unstructured":"Zhiheng Ma Xiaopeng Hong Xing Wei Yunfeng Qiu and Yihong Gong. 2021. Towards a universal model for cross-dataset crowd counting. In CVPR. 3205--3214. Zhiheng Ma Xiaopeng Hong Xing Wei Yunfeng Qiu and Yihong Gong. 2021. Towards a universal model for cross-dataset crowd counting. In CVPR. 3205--3214."},{"key":"e_1_3_2_2_42_1","unstructured":"Zhiheng Ma Xing Wei Xiaopeng Hong and Yihong Gong. 2019. Bayesian loss for crowd count estimation with point supervision. In ICCV. 6142--6151. Zhiheng Ma Xing Wei Xiaopeng Hong and Yihong Gong. 2019. Bayesian loss for crowd count estimation with point supervision. In ICCV. 6142--6151."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"crossref","unstructured":"Yanda Meng Hongrun Zhang Yitian Zhao Xiaoyun Yang Xuesheng Qian Xiaowei Huang and Yalin Zheng. 2021. Spatial Uncertainty-Aware Semi-Supervised Crowd Counting. In CVPR. 15549--15559. Yanda Meng Hongrun Zhang Yitian Zhao Xiaoyun Yang Xuesheng Qian Xiaowei Huang and Yalin Zheng. 2021. Spatial Uncertainty-Aware Semi-Supervised Crowd Counting. In CVPR. 15549--15559.","DOI":"10.1109\/ICCV48922.2021.01526"},{"key":"e_1_3_2_2_44_1","unstructured":"Anh Nguyen and Anh Tran. 2020. Input-aware dynamic backdoor attack. In NeurIPS. Anh Nguyen and Anh Tran. 2020. Input-aware dynamic backdoor attack. In NeurIPS."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"crossref","unstructured":"Daniel O\u00f1oro-Rubio and Roberto Javier L\u00f3pez-Sastre. 2016. Towards Perspective- Free Object Counting with Deep Learning. In ECCV. Daniel O\u00f1oro-Rubio and Roberto Javier L\u00f3pez-Sastre. 2016. Towards Perspective- Free Object Counting with Deep Learning. In ECCV.","DOI":"10.1007\/978-3-319-46478-7_38"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6871"},{"volume-title":"Don't Trigger Me! A Triggerless Backdoor Attack Against Deep Neural Networks. arXiv preprint arXiv:2010.03282","year":"2020","author":"Salem Ahmed","key":"e_1_3_2_2_47_1","unstructured":"Ahmed Salem , Michael Backes , and Yang Zhang . 2020. Don't Trigger Me! A Triggerless Backdoor Attack Against Deep Neural Networks. arXiv preprint arXiv:2010.03282 ( 2020 ). Ahmed Salem, Michael Backes, and Yang Zhang. 2020. Don't Trigger Me! A Triggerless Backdoor Attack Against Deep Neural Networks. arXiv preprint arXiv:2010.03282 (2020)."},{"volume-title":"Switching Convolutional Neural Network for Crowd Counting. CVPR","year":"2017","author":"Sam Deepak Babu","key":"e_1_3_2_2_48_1","unstructured":"Deepak Babu Sam , Shiv Surya , and R. Venkatesh Babu . 2017. Switching Convolutional Neural Network for Crowd Counting. CVPR ( 2017 ), 4031--4039. Deepak Babu Sam, Shiv Surya, and R. Venkatesh Babu. 2017. Switching Convolutional Neural Network for Crowd Counting. CVPR (2017), 4031--4039."},{"key":"e_1_3_2_2_49_1","unstructured":"Ali Shafahi W Ronny Huang Mahyar Najibi Octavian Suciu Christoph Studer Tudor Dumitras and Tom Goldstein. 2018. Poison frogs! targeted clean-label poisoning attacks on neural networks. In NeurIPS. Ali Shafahi W Ronny Huang Mahyar Najibi Octavian Suciu Christoph Studer Tudor Dumitras and Tom Goldstein. 2018. Poison frogs! targeted clean-label poisoning attacks on neural networks. In NeurIPS."},{"volume-title":"Masayuki Numao, and Boonserm Kijsirikul.","year":"2021","author":"Thanasutives Pongpisit","key":"e_1_3_2_2_50_1","unstructured":"Pongpisit Thanasutives , Ken ichi Fukui , Masayuki Numao, and Boonserm Kijsirikul. 2021 . Encoder-Decoder Based Convolutional Neural Networks with Multi-Scale-Aware Modules for Crowd Counting. ICPR ( 2021), 2382--2389. Pongpisit Thanasutives, Ken ichi Fukui, Masayuki Numao, and Boonserm Kijsirikul. 2021. Encoder-Decoder Based Convolutional Neural Networks with Multi-Scale-Aware Modules for Crowd Counting. ICPR (2021), 2382--2389."},{"key":"e_1_3_2_2_51_1","unstructured":"Brandon Tran Jerry Li and Aleksander Madry. 2018. Spectral signatures in backdoor attacks. In NeurIPS. Brandon Tran Jerry Li and Aleksander Madry. 2018. Spectral signatures in backdoor attacks. In NeurIPS."},{"volume-title":"Labelconsistent backdoor attacks. arXiv preprint arXiv:1912.02771","year":"2019","author":"Turner Alexander","key":"e_1_3_2_2_52_1","unstructured":"Alexander Turner , Dimitris Tsipras , and Aleksander Madry . 2019. Labelconsistent backdoor attacks. arXiv preprint arXiv:1912.02771 ( 2019 ). Alexander Turner, Dimitris Tsipras, and Aleksander Madry. 2019. Labelconsistent backdoor attacks. arXiv preprint arXiv:1912.02771 (2019)."},{"volume-title":"Renann G. Baldovino, and Robert Kerwin C. Billones.","year":"2021","author":"Valencia Immanuel Jose C.","key":"e_1_3_2_2_53_1","unstructured":"Immanuel Jose C. Valencia , Elmer P. Dadios , Alexis M. Fillone , John Carlo V. Puno , Renann G. Baldovino, and Robert Kerwin C. Billones. 2021 . Vision-based Crowd Counting and Social Distancing Monitoring using Tiny-YOLOv4 and DeepSORT. In ISC2. IEEE , 1--7. Immanuel Jose C. Valencia, Elmer P. Dadios, Alexis M. Fillone, John Carlo V. Puno, Renann G. Baldovino, and Robert Kerwin C. Billones. 2021. Vision-based Crowd Counting and Social Distancing Monitoring using Tiny-YOLOv4 and DeepSORT. In ISC2. IEEE, 1--7."},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.3022878"},{"key":"e_1_3_2_2_55_1","first-page":"1595","article-title":"Distribution matching for crowd counting","volume":"33","author":"Liu Huidong","year":"2020","unstructured":"BoyuWang, Huidong Liu , Dimitris Samaras , and Minh Hoai Nguyen . 2020 . Distribution matching for crowd counting . Advances in Neural Information Processing Systems 33 (2020), 1595 -- 1607 . BoyuWang, Huidong Liu, Dimitris Samaras, and Minh Hoai Nguyen. 2020. Distribution matching for crowd counting. Advances in Neural Information Processing Systems 33 (2020), 1595--1607.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"crossref","unstructured":"Xin Wang Bin Wang and Liming Zhang. 2011. Airport Detection in Remote Sensing Images Based on Visual Attention. In ICONIP. Xin Wang Bin Wang and Liming Zhang. 2011. Airport Detection in Remote Sensing Images Based on Visual Attention. In ICONIP.","DOI":"10.1007\/978-3-642-24965-5_54"},{"key":"e_1_3_2_2_57_1","unstructured":"Longyin Wen Dawei Du Pengfei Zhu Qinghua Hu Qilong Wang Liefeng Bo and Siwei Lyu. 2021. Detection tracking and counting meets drones in crowds: A benchmark. In CVPR. 7812--7821. Longyin Wen Dawei Du Pengfei Zhu Qinghua Hu Qilong Wang Liefeng Bo and Siwei Lyu. 2021. Detection tracking and counting meets drones in crowds: A benchmark. In CVPR. 7812--7821."},{"volume-title":"Yuanshun Yao, Haitao Zheng, and Ben Y Zhao.","year":"2021","author":"Wenger Emily","key":"e_1_3_2_2_58_1","unstructured":"Emily Wenger , Josephine Passananti , Arjun Nitin Bhagoji , Yuanshun Yao, Haitao Zheng, and Ben Y Zhao. 2021 . Backdoor Attacks Against Deep Learning Systems in the Physical World. In CVPR. 6206--6215. Emily Wenger, Josephine Passananti, Arjun Nitin Bhagoji, Yuanshun Yao, Haitao Zheng, and Ben Y Zhao. 2021. Backdoor Attacks Against Deep Learning Systems in the Physical World. In CVPR. 6206--6215."},{"volume-title":"Backdoor attacks on facial recognition in the physical world. arXiv e-prints","year":"2020","author":"Wenger Emily","key":"e_1_3_2_2_59_1","unstructured":"Emily Wenger , Josephine Passananti , Yuanshun Yao , Haitao Zheng , and Ben Y Zhao . 2020. Backdoor attacks on facial recognition in the physical world. arXiv e-prints ( 2020 ), arXiv--2006. Emily Wenger, Josephine Passananti, Yuanshun Yao, Haitao Zheng, and Ben Y Zhao. 2020. Backdoor attacks on facial recognition in the physical world. arXiv e-prints (2020), arXiv--2006."},{"key":"e_1_3_2_2_60_1","first-page":"90","article-title":"Detection of multiple, partially occluded humans in a single image by Bayesian combination of edgelet part detectors","volume":"1","author":"Wu Bo","year":"2005","unstructured":"Bo Wu and Ramakant Nevatia . 2005 . Detection of multiple, partially occluded humans in a single image by Bayesian combination of edgelet part detectors . ICCV 1 (2005), 90 -- 97 Vol. 1. Bo Wu and Ramakant Nevatia. 2005. Detection of multiple, partially occluded humans in a single image by Bayesian combination of edgelet part detectors. ICCV 1 (2005), 90--97 Vol. 1.","journal-title":"ICCV"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-006-0027-7"},{"volume-title":"Adversarial neuron pruning purifies backdoored deep models. Advances in Neural Information Processing Systems 34","year":"2021","author":"Wu Dongxian","key":"e_1_3_2_2_62_1","unstructured":"Dongxian Wu and Yisen Wang . 2021. Adversarial neuron pruning purifies backdoored deep models. Advances in Neural Information Processing Systems 34 ( 2021 ). Dongxian Wu and Yisen Wang. 2021. Adversarial neuron pruning purifies backdoored deep models. Advances in Neural Information Processing Systems 34 (2021)."},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"crossref","unstructured":"Qiangqiang Wu Jia Wan and Antoni B Chan. 2021. Dynamic Momentum Adaptation for Zero-Shot Cross-Domain Crowd Counting. In ACM MM. 658-- 666. Qiangqiang Wu Jia Wan and Antoni B Chan. 2021. Dynamic Momentum Adaptation for Zero-Shot Cross-Domain Crowd Counting. In ACM MM. 658-- 666.","DOI":"10.1145\/3474085.3475230"},{"volume-title":"Towards Adversarial Patch Analysis and Certified Defense against Crowd Counting. ACM MM","year":"2021","author":"Wu Qiming","key":"e_1_3_2_2_64_1","unstructured":"Qiming Wu , Zhikang Zou , Pan Zhou , Xiaoqing Ye , Binghui Wang , and Ang Li. 2021. Towards Adversarial Patch Analysis and Certified Defense against Crowd Counting. ACM MM ( 2021 ). Qiming Wu, Zhikang Zou, Pan Zhou, Xiaoqing Ye, Binghui Wang, and Ang Li. 2021. Towards Adversarial Patch Analysis and Certified Defense against Crowd Counting. ACM MM (2021)."},{"volume-title":"From Open Set to Closed Set: Counting Objects by Spatial Divide and-Conquer. ICCV","year":"2019","author":"Xiong Haipeng","key":"e_1_3_2_2_65_1","unstructured":"Haipeng Xiong , Hao Lu , Chengxin Liu , Liang Liu , Zhiguo Cao , and Chunhua Shen . 2019. From Open Set to Closed Set: Counting Objects by Spatial Divide and-Conquer. ICCV ( 2019 ), 8361--8370. Haipeng Xiong, Hao Lu, Chengxin Liu, Liang Liu, Zhiguo Cao, and Chunhua Shen. 2019. From Open Set to Closed Set: Counting Objects by Spatial Divide and-Conquer. ICCV (2019), 8361--8370."},{"key":"e_1_3_2_2_66_1","unstructured":"Yanyu Xu Ziming Zhong Dongze Lian Jing Li Zhengxin Li Xinxing Xu and Shenghua Gao. 2021. Crowd Counting With Partial Annotations in an Image. In CVPR. 15570--15579. Yanyu Xu Ziming Zhong Dongze Lian Jing Li Zhengxin Li Xinxing Xu and Shenghua Gao. 2021. Crowd Counting With Partial Annotations in an Image. In CVPR. 15570--15579."},{"volume-title":"Robust Backdoor Attacks against Deep Neural Networks in Real Physical World. arXiv preprint arXiv:2104.07395","year":"2021","author":"Xue Mingfu","key":"e_1_3_2_2_67_1","unstructured":"Mingfu Xue , Can He , Shichang Sun , Jian Wang , and Weiqiang Liu . 2021. Robust Backdoor Attacks against Deep Neural Networks in Real Physical World. arXiv preprint arXiv:2104.07395 ( 2021 ). Mingfu Xue, Can He, Shichang Sun, Jian Wang, and Weiqiang Liu. 2021. Robust Backdoor Attacks against Deep Neural Networks in Real Physical World. arXiv preprint arXiv:2104.07395 (2021)."},{"key":"e_1_3_2_2_68_1","unstructured":"Yuanshun Yao Huiying Li Haitao Zheng and Ben Y Zhao. 2019. Latent backdoor attacks on deep neural networks. In SIGSAC. 2041--2055. Yuanshun Yao Huiying Li Haitao Zheng and Ben Y Zhao. 2019. Latent backdoor attacks on deep neural networks. In SIGSAC. 2041--2055."},{"volume-title":"Crossscene crowd counting via deep convolutional neural networks. CVPR","year":"2015","author":"Zhang Cong","key":"e_1_3_2_2_69_1","unstructured":"Cong Zhang , Hongsheng Li , Xiaogang Wang , and Xiaokang Yang . 2015. Crossscene crowd counting via deep convolutional neural networks. CVPR ( 2015 ), 833--841. Cong Zhang, Hongsheng Li, Xiaogang Wang, and Xiaokang Yang. 2015. Crossscene crowd counting via deep convolutional neural networks. CVPR (2015), 833--841."},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"crossref","unstructured":"Qi Zhang Wei Lin and Antoni B Chan. 2021. Cross-View Cross-Scene Multi-View Crowd Counting. In CVPR. 557--567. Qi Zhang Wei Lin and Antoni B Chan. 2021. Cross-View Cross-Scene Multi-View Crowd Counting. In CVPR. 557--567.","DOI":"10.1109\/CVPR46437.2021.00062"},{"volume-title":"Jo\u00e3o Paulo Costeira, and Jos\u00e9 M. F. Moura","year":"2017","author":"Zhang Shanghang","key":"e_1_3_2_2_71_1","unstructured":"Shanghang Zhang , Guanhang Wu , Jo\u00e3o Paulo Costeira, and Jos\u00e9 M. F. Moura . 2017 . FCN-rLSTM: Deep Spatio-Temporal Neural Networks for Vehicle Counting in City Cameras. ICCV ( 2017), 3687--3696. Shanghang Zhang, Guanhang Wu, Jo\u00e3o Paulo Costeira, and Jos\u00e9 M. F. Moura. 2017. FCN-rLSTM: Deep Spatio-Temporal Neural Networks for Vehicle Counting in City Cameras. ICCV (2017), 3687--3696."},{"volume-title":"Single-Image Crowd Counting via Multi-Column Convolutional Neural Network. CVPR","year":"2016","author":"Zhang Yingying","key":"e_1_3_2_2_72_1","unstructured":"Yingying Zhang , Desen Zhou , Siqin Chen , Shenghua Gao , and Yi Ma. 2016. Single-Image Crowd Counting via Multi-Column Convolutional Neural Network. CVPR ( 2016 ), 589--597. Yingying Zhang, Desen Zhou, Siqin Chen, Shenghua Gao, and Yi Ma. 2016. Single-Image Crowd Counting via Multi-Column Convolutional Neural Network. CVPR (2016), 589--597."},{"volume-title":"How to Inject Backdoors with Better Consistency: Logit Anchoring on Clean Data. ArXiv abs\/2109.01300","year":"2021","author":"Zhang Zhiyuan","key":"e_1_3_2_2_73_1","unstructured":"Zhiyuan Zhang , Lingjuan Lyu , Weiqiang Wang , Lichao Sun , and Xu Sun . 2021. How to Inject Backdoors with Better Consistency: Logit Anchoring on Clean Data. ArXiv abs\/2109.01300 ( 2021 ). Zhiyuan Zhang, Lingjuan Lyu, Weiqiang Wang, Lichao Sun, and Xu Sun. 2021. How to Inject Backdoors with Better Consistency: Logit Anchoring on Clean Data. ArXiv abs\/2109.01300 (2021)."},{"key":"e_1_3_2_2_74_1","doi-asserted-by":"crossref","unstructured":"Shihao Zhao Xingjun Ma Xiang Zheng James Bailey Jingjing Chen and Yu-Gang Jiang. 2020. Clean-label backdoor attacks on video recognition models. In CVPR. 14443--14452. Shihao Zhao Xingjun Ma Xiang Zheng James Bailey Jingjing Chen and Yu-Gang Jiang. 2020. Clean-label backdoor attacks on video recognition models. In CVPR. 14443--14452.","DOI":"10.1109\/CVPR42600.2020.01445"},{"key":"e_1_3_2_2_75_1","unstructured":"Chen Zhu Yu Cheng Zhe Gan Siqi Sun Tom Goldstein and Jingjing Liu. 2020. FreeLB: Enhanced Adversarial Training for Natural Language Understanding. In ICLR. Chen Zhu Yu Cheng Zhe Gan Siqi Sun Tom Goldstein and Jingjing Liu. 2020. FreeLB: Enhanced Adversarial Training for Natural Language Understanding. In ICLR."},{"key":"e_1_3_2_2_76_1","unstructured":"Chen Zhu W Ronny Huang Hengduo Li Gavin Taylor Christoph Studer and Tom Goldstein. 2019. Transferable clean-label poisoning attacks on deep neural nets. In ICML. PMLR 7614--7623. Chen Zhu W Ronny Huang Hengduo Li Gavin Taylor Christoph Studer and Tom Goldstein. 2019. Transferable clean-label poisoning attacks on deep neural nets. In ICML. PMLR 7614--7623."},{"key":"e_1_3_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.08.009"},{"key":"e_1_3_2_2_78_1","doi-asserted-by":"crossref","unstructured":"Zhikang Zou Xiaoye Qu Pan Zhou Shuangjie Xu Xiaoqing Ye Wenhao Wu and Jin Ye. 2021. Coarse to fine: Domain adaptive crowd counting via adversarial scoring network. In ACM MM. 2185--2194. Zhikang Zou Xiaoye Qu Pan Zhou Shuangjie Xu Xiaoqing Ye Wenhao Wu and Jin Ye. 2021. Coarse to fine: Domain adaptive crowd counting via adversarial scoring network. In ACM MM. 2185--2194.","DOI":"10.1145\/3474085.3475377"}],"event":{"name":"MM '22: The 30th ACM International Conference on Multimedia","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Lisboa Portugal","acronym":"MM '22"},"container-title":["Proceedings of the 30th ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3503161.3548296","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,5]],"date-time":"2024-10-05T14:13:15Z","timestamp":1728137595000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503161.3548296"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,10]]},"references-count":78,"alternative-id":["10.1145\/3503161.3548296","10.1145\/3503161"],"URL":"http:\/\/dx.doi.org\/10.1145\/3503161.3548296","relation":{},"subject":[],"published":{"date-parts":[[2022,10,10]]},"assertion":[{"value":"2022-10-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}