Live
Black Hat USADark ReadingBlack Hat AsiaAI BusinessThis International Fact-Checking Day, use these 5 tips to spot AI-generated contentFast Company TechRio Receipt Protocol – Cryptographic Proof for AI ActionsHacker News AI TopNew AI testing method flags fairness risks in autonomous systemsTechXplore AIA Differentiable Programming System to Bridge Machine Learning and ScientificComputingDev.to AIGoogle launches Gemma 4, its "most intelligent" open model family, purpose-built for advanced reasoning and agentic workflows, under an Apache 2.0 license (The Keyword)TechmemeWhy Your AI Copilot Builds the Wrong Thing (And How to Fix It)Dev.to AIBuilding Sentinel Gate: A 3-Layer Security Pipeline for AI AgentsDev.to AIHow I Built a Self-Healing Memory System for AI AgentsDev.to AIAXIOM Week 2 Wrap — 65 Articles, 73 Cold Emails, and a New Agent on the NetworkDev.to AIGemma 4 releasedReddit r/LocalLLaMAA Feature I Never Planned Emerged From Persona Interviews — Here's Exactly HowDev.to AIGemma 4 has been releasedReddit r/LocalLLaMABlack Hat USADark ReadingBlack Hat AsiaAI BusinessThis International Fact-Checking Day, use these 5 tips to spot AI-generated contentFast Company TechRio Receipt Protocol – Cryptographic Proof for AI ActionsHacker News AI TopNew AI testing method flags fairness risks in autonomous systemsTechXplore AIA Differentiable Programming System to Bridge Machine Learning and ScientificComputingDev.to AIGoogle launches Gemma 4, its "most intelligent" open model family, purpose-built for advanced reasoning and agentic workflows, under an Apache 2.0 license (The Keyword)TechmemeWhy Your AI Copilot Builds the Wrong Thing (And How to Fix It)Dev.to AIBuilding Sentinel Gate: A 3-Layer Security Pipeline for AI AgentsDev.to AIHow I Built a Self-Healing Memory System for AI AgentsDev.to AIAXIOM Week 2 Wrap — 65 Articles, 73 Cold Emails, and a New Agent on the NetworkDev.to AIGemma 4 releasedReddit r/LocalLLaMAA Feature I Never Planned Emerged From Persona Interviews — Here's Exactly HowDev.to AIGemma 4 has been releasedReddit r/LocalLLaMA
AI NEWS HUBbyEIGENVECTOREigenvector

SNEAKDOOR: Stealthy Backdoor Attacks against Distribution Matching-based Dataset Condensation

arXiv cs.CRby He Yang, Dongyi Lv, Song Ma, Wei Xi, Jizhong ZhaoApril 1, 20261 min read0 views
Source Quiz

arXiv:2603.28824v1 Announce Type: new Abstract: Dataset condensation aims to synthesize compact yet informative datasets that retain the training efficacy of full-scale data, offering substantial gains in efficiency. Recent studies reveal that the condensation process can be vulnerable to backdoor attacks, where malicious triggers are injected into the condensation dataset, manipulating model behavior during inference. While prior approaches have made progress in balancing attack success rate and clean test accuracy, they often fall short in preserving stealthiness, especially in concealing the visual artifacts of condensed data or the perturbations introduced during inference. To address this challenge, we introduce Sneakdoor, which enhances stealthiness without compromising attack effect

View PDF HTML (experimental)

Abstract:Dataset condensation aims to synthesize compact yet informative datasets that retain the training efficacy of full-scale data, offering substantial gains in efficiency. Recent studies reveal that the condensation process can be vulnerable to backdoor attacks, where malicious triggers are injected into the condensation dataset, manipulating model behavior during inference. While prior approaches have made progress in balancing attack success rate and clean test accuracy, they often fall short in preserving stealthiness, especially in concealing the visual artifacts of condensed data or the perturbations introduced during inference. To address this challenge, we introduce Sneakdoor, which enhances stealthiness without compromising attack effectiveness. Sneakdoor exploits the inherent vulnerability of class decision boundaries and incorporates a generative module that constructs input-aware triggers aligned with local feature geometry, thereby minimizing detectability. This joint design enables the attack to remain imperceptible to both human inspection and statistical detection. Extensive experiments across multiple datasets demonstrate that Sneakdoor achieves a compelling balance among attack success rate, clean test accuracy, and stealthiness, substantially improving the invisibility of both the synthetic data and triggered samples while maintaining high attack efficacy. The code is available at this https URL.

Comments: 29 pages, 5 figures, accepted to NeurIPS 2025

Subjects:

Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)

Cite as: arXiv:2603.28824 [cs.CR]

(or arXiv:2603.28824v1 [cs.CR] for this version)

https://doi.org/10.48550/arXiv.2603.28824

arXiv-issued DOI via DataCite

Submission history

From: He Yang [view email] [v1] Sun, 29 Mar 2026 09:00:25 UTC (2,762 KB)

Was this article helpful?

Sign in to highlight and annotate this article

AI
Ask AI about this article
Powered by Eigenvector · full article context loaded
Ready

Conversation starters

Ask anything about this article…

Daily AI Digest

Get the top 5 AI stories delivered to your inbox every morning.

More about

modeltrainingannounce

Knowledge Map

Knowledge Map
TopicsEntitiesSource
SNEAKDOOR: …modeltrainingannounceavailablefeaturearxivarXiv cs.CR

Connected Articles — Knowledge Graph

This article is connected to other articles through shared AI topics and tags.

Knowledge Graph100 articles · 169 connections
Scroll to zoom · drag to pan · click to open

Discussion

Sign in to join the discussion

No comments yet — be the first to share your thoughts!