Open Access iconOpen Access

ARTICLE

Proactive Disentangled Modeling of Trigger–Object Pairings for Backdoor Defense

Kyle Stein1,*, Andrew A. Mahyari1,2, Guillermo Francia III3, Eman El-Sheikh3

1 Department of Intelligent Systems and Robotics, University of West Florida, Pensacola, FL 32514, USA
2 Florida Institute for Human and Machine Cognition (IHMC), Pensacola, FL 32502, USA
3 Center for Cybersecurity, University of West Florida, Pensacola, FL 32502, USA

* Corresponding Author: Kyle Stein. Email: email

(This article belongs to the Special Issue: Towards Privacy-preserving, Secure and Trustworthy AI-enabled Systems)

Computers, Materials & Continua 2025, 85(1), 1001-1018. https://doi.org/10.32604/cmc.2025.068201

Abstract

Deep neural networks (DNNs) and generative AI (GenAI) are increasingly vulnerable to backdoor attacks, where adversaries embed triggers into inputs to cause models to misclassify or misinterpret target labels. Beyond traditional single-trigger scenarios, attackers may inject multiple triggers across various object classes, forming unseen backdoor-object configurations that evade standard detection pipelines. In this paper, we introduce DBOM (Disentangled Backdoor-Object Modeling), a proactive framework that leverages structured disentanglement to identify and neutralize both seen and unseen backdoor threats at the dataset level. Specifically, DBOM factorizes input image representations by modeling triggers and objects as independent primitives in the embedding space through the use of Vision-Language Models (VLMs). By leveraging the frozen, pre-trained encoders of VLMs, our approach decomposes the latent representations into distinct components through a learnable visual prompt repository and prompt prefix tuning, ensuring that the relationships between triggers and objects are explicitly captured. To separate trigger and object representations in the visual prompt repository, we introduce the trigger–object separation and diversity losses that aids in disentangling trigger and object visual features. Next, by aligning image features with feature decomposition and fusion, as well as learned contextual prompt tokens in a shared multimodal space, DBOM enables zero-shot generalization to novel trigger-object pairings that were unseen during training, thereby offering deeper insights into adversarial attack patterns. Experimental results on CIFAR-10 and GTSRB demonstrate that DBOM robustly detects poisoned images prior to downstream training, significantly enhancing the security of DNN training pipelines.

Keywords

Backdoor attacks; generative AI; disentanglement

Cite This Article

APA Style
Stein, K., Mahyari, A.A., Francia III, G., El-Sheikh, E. (2025). Proactive Disentangled Modeling of Trigger–Object Pairings for Backdoor Defense. Computers, Materials & Continua, 85(1), 1001–1018. https://doi.org/10.32604/cmc.2025.068201
Vancouver Style
Stein K, Mahyari AA, Francia III G, El-Sheikh E. Proactive Disentangled Modeling of Trigger–Object Pairings for Backdoor Defense. Comput Mater Contin. 2025;85(1):1001–1018. https://doi.org/10.32604/cmc.2025.068201
IEEE Style
K. Stein, A. A. Mahyari, G. Francia III, and E. El-Sheikh, “Proactive Disentangled Modeling of Trigger–Object Pairings for Backdoor Defense,” Comput. Mater. Contin., vol. 85, no. 1, pp. 1001–1018, 2025. https://doi.org/10.32604/cmc.2025.068201



cc Copyright © 2025 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 2497

    View

  • 2046

    Download

  • 0

    Like

Share Link