Data Contamination Detection

Evading Data Contamination Detection for Language Models is (too) Easy

Authors: Jasper Dekoninck, Mark Niklas Müller, Maximilian Baader, Marc Fischer, Martin Vechev | Published: 2024-02-05 | Updated: 2024-02-12
Data Obfuscation
Data Contamination Detection
Classification of Malicious Actors

Time Travel in LLMs: Tracing Data Contamination in Large Language Models

Authors: Shahriar Golchin, Mihai Surdeanu | Published: 2023-08-16 | Updated: 2024-02-21
Data Contamination Detection
Prompt Injection
Natural Language Processing

On Practical Aspects of Aggregation Defenses against Data Poisoning Attacks

Authors: Wenxiao Wang, Soheil Feizi | Published: 2023-06-28
Data Origins and Evolution
Data Contamination Detection
Backdoor Attack

Protecting Federated Learning from Extreme Model Poisoning Attacks via Multidimensional Time Series Anomaly Detection

Authors: Edoardo Gabrielli, Dimitri Belli, Zoe Matrullo, Vittorio Miori, Gabriele Tolomei | Published: 2023-03-29 | Updated: 2024-12-02
Data Contamination Detection
Poisoning
Convergence Property

Exploring the Limits of Model-Targeted Indiscriminate Data Poisoning Attacks

Authors: Yiwei Lu, Gautam Kamath, Yaoliang Yu | Published: 2023-03-07 | Updated: 2023-06-06
Data Contamination Detection
Poisoning
Poisoning Attack

Performance Weighting for Robust Federated Learning Against Corrupted Sources

Authors: Dimitris Stripelis, Marcin Abram, Jose Luis Ambite | Published: 2022-05-02
Data Contamination Detection
Poisoning
Federated Learning

GFCL: A GRU-based Federated Continual Learning Framework against Data Poisoning Attacks in IoV

Authors: Anum Talpur, Mohan Gurusamy | Published: 2022-04-23 | Updated: 2022-09-12
Data Contamination Detection
Anomaly Detection Method
Vehicle Network Security

An Equivalence Between Data Poisoning and Byzantine Gradient Attacks

Authors: Sadegh Farhadkhani, Rachid Guerraoui, Lê-Nguyên Hoang, Oscar Villemaud | Published: 2022-02-17 | Updated: 2022-07-20
Data Contamination Detection
Poisoning
Convergence Analysis

Excess Capacity and Backdoor Poisoning

Authors: Naren Sarayu Manoj, Avrim Blum | Published: 2021-09-02 | Updated: 2021-11-03
Data Contamination Detection
Backdoor Attack
Adversarial Example

Adversarial Attacks Against Deep Reinforcement Learning Framework in Internet of Vehicles

Authors: Anum Talpur, Mohan Gurusamy | Published: 2021-08-02 | Updated: 2021-09-16
Cyber Threat
Data Contamination Detection
Resource Consumption Analysis