On the Security & Privacy in Federated LearningGorka Abad and Stjepan Picek and Aitor Urbieta202136 citations
Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic DataGorka Abad and Oguzhan Ersoy and Stjepan Picek and Aitor Urbieta202426 citations
Poster: Backdoor attacks on spiking nns and neuromorphic datasetsGorka Abad and Oguzhan Ersoy and Stjepan Picek and Víctor Julio Ramírez-Durán and Aitor Urbieta202215 citations
Rethinking the trigger-injecting position in graph backdoor attackJing Xu and Gorka Abad and Stjepan Picek202313 citations
Sniper Backdoor: Single Client Targeted Backdoor Attack in Federated LearningGorka Abad and Servio Paguada and Oguzhan Ersoy and Stjepan Picek and Victor Julio Ramírez-Durán and Aitor Urbieta202312 citations
SoK: A Systematic Evaluation of Backdoor Trigger Characteristics in Image ClassificationGorka Abad and Jing Xu and Stefanos Koffas and Behrad Tajalli and Stjepan Picek and Mauro Conti202310 citations
Membership privacy evaluation in deep spiking neural networksJiaxin Li and Gorka Abad and Stjepan Picek and Mauro Conti20254 citations
Tabdoor: Backdoor Vulnerabilities in Transformer-based Neural Networks for Tabular DataBart Pleiter and Behrad Tajalli and Stefanos Koffas and Gorka Abad and Jing Xu and Martha Larson and Stjepan Picek20234 citations
Time-distributed backdoor attacks on federated spiking learningGorka Abad and Stjepan Picek and Aitor Urbieta20253 citations
Poster: Backdoor Attack on Extreme Learning MachinesBehrad Tajalli and Gorka Abad and Stjepan Picek20233 citations
Flashy Backdoor: Real-world Environment Backdoor Attack on SNNs with DVS CamerasRoberto Riaño and Gorka Abad and Stjepan Picek and Aitor Urbieta20242 citations
Context is the Key: Backdoor Attacks for In-Context Learning with Vision TransformersGorka Abad and Stjepan Picek and Lorenzo Cavallaro and Aitor Urbieta20242 citations
ELMs Under Siege: A Study on Backdoor Attacks on Extreme Learning MachinesBehrad Tajalli and Stefanos Koffas and Gorka Abad and Stjepan Picek20241 citation
Backdoor attacks against transformer-based neural networks for tabular dataBart Pleiter and B Tajalli and S Koffas and G Abad and J Xu and M Larson and S Picek20231 citation
SoK: The Last Line of Defense: On Backdoor Defense EvaluationGorka Abad and Marina Krček and Stefanos Koffas and Behrad Tajalli and Marco Arazzi and Roberto Riaño and Xiaoyun Xu and Zhuoran Liu and Antonino Nocera and Stjepan Picek2025