Evading Data Contamination Detection for Language Models is (too) Easy Authors: Jasper Dekoninck, Mark Niklas Müller, Maximilian Baader, Marc Fischer, Martin Vechev | Published: 2024-02-05 | Updated: 2024-02-12 Data ObfuscationData Contamination DetectionClassification of Malicious Actors 2024.02.05 2025.05.27 Literature Database
Time Travel in LLMs: Tracing Data Contamination in Large Language Models Authors: Shahriar Golchin, Mihai Surdeanu | Published: 2023-08-16 | Updated: 2024-02-21 Data Contamination DetectionPrompt InjectionNatural Language Processing 2023.08.16 2025.05.28 Literature Database
On Practical Aspects of Aggregation Defenses against Data Poisoning Attacks Authors: Wenxiao Wang, Soheil Feizi | Published: 2023-06-28 Data Origins and EvolutionData Contamination DetectionBackdoor Attack 2023.06.28 2025.05.28 Literature Database
Protecting Federated Learning from Extreme Model Poisoning Attacks via Multidimensional Time Series Anomaly Detection Authors: Edoardo Gabrielli, Dimitri Belli, Zoe Matrullo, Vittorio Miori, Gabriele Tolomei | Published: 2023-03-29 | Updated: 2024-12-02 Data Contamination DetectionPoisoningConvergence Property 2023.03.29 2025.05.28 Literature Database
Exploring the Limits of Model-Targeted Indiscriminate Data Poisoning Attacks Authors: Yiwei Lu, Gautam Kamath, Yaoliang Yu | Published: 2023-03-07 | Updated: 2023-06-06 Data Contamination DetectionPoisoningPoisoning Attack 2023.03.07 2025.05.28 Literature Database
Performance Weighting for Robust Federated Learning Against Corrupted Sources Authors: Dimitris Stripelis, Marcin Abram, Jose Luis Ambite | Published: 2022-05-02 Data Contamination DetectionPoisoningFederated Learning 2022.05.02 2025.05.28 Literature Database
GFCL: A GRU-based Federated Continual Learning Framework against Data Poisoning Attacks in IoV Authors: Anum Talpur, Mohan Gurusamy | Published: 2022-04-23 | Updated: 2022-09-12 Data Contamination DetectionAnomaly Detection MethodVehicle Network Security 2022.04.23 2025.05.28 Literature Database
An Equivalence Between Data Poisoning and Byzantine Gradient Attacks Authors: Sadegh Farhadkhani, Rachid Guerraoui, Lê-Nguyên Hoang, Oscar Villemaud | Published: 2022-02-17 | Updated: 2022-07-20 Data Contamination DetectionPoisoningConvergence Analysis 2022.02.17 2025.05.28 Literature Database
Excess Capacity and Backdoor Poisoning Authors: Naren Sarayu Manoj, Avrim Blum | Published: 2021-09-02 | Updated: 2021-11-03 Data Contamination DetectionBackdoor AttackAdversarial Example 2021.09.02 2025.05.28 Literature Database
Adversarial Attacks Against Deep Reinforcement Learning Framework in Internet of Vehicles Authors: Anum Talpur, Mohan Gurusamy | Published: 2021-08-02 | Updated: 2021-09-16 Cyber ThreatData Contamination DetectionResource Consumption Analysis 2021.08.02 2025.05.28 Literature Database