A Review of Various Datasets for Machine Learning Algorithm-Based Intrusion Detection System: Advances and Challenges Authors: Sudhanshu Sekhar Tripathy, Bichitrananda Behera | Published: 2025-06-03 Trigger DetectionIntrusion Detection SystemAnalysis of Detection Methods 2025.06.03 2025.06.05 Literature Database
Toward Malicious Clients Detection in Federated Learning Authors: Zhihao Dou, Jiaqi Wang, Wei Sun, Zhuqing Liu, Minghong Fang | Published: 2025-05-14 Trigger DetectionPoisoning悪意のあるクライアント検出 2025.05.14 2025.05.28 Literature Database
Bayesian Robust Aggregation for Federated Learning Authors: Aleksandr Karakulev, Usama Zafar, Salman Toor, Prashant Singh | Published: 2025-05-05 Group-Based RobustnessTrigger DetectionAdversarial Learning 2025.05.05 2025.05.27 Literature Database
LMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors Authors: Chengkun Wei, Wenlong Meng, Zhikun Zhang, Min Chen, Minghu Zhao, Wenjing Fang, Lei Wang, Zihui Zhang, Wenzhi Chen | Published: 2023-08-26 | Updated: 2023-10-14 Trigger DetectionBackdoor DetectionAttack Method 2023.08.26 2025.05.28 Literature Database
ONION: A Simple and Effective Defense Against Textual Backdoor Attacks Authors: Fanchao Qi, Yangyi Chen, Mukai Li, Yuan Yao, Zhiyuan Liu, Maosong Sun | Published: 2020-11-20 | Updated: 2021-11-03 Text Perturbation MethodTrigger DetectionBackdoor Detection 2020.11.20 2025.05.28 Literature Database
Eternal Sunshine of the Spotless Net: Selective Forgetting in Deep Networks Authors: Aditya Golatkar, Alessandro Achille, Stefano Soatto | Published: 2019-11-12 | Updated: 2020-03-31 Trigger DetectionMachine learningInformation Security 2019.11.12 2025.05.28 Literature Database
Februus: Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems Authors: Bao Gia Doan, Ehsan Abbasnejad, Damith C. Ranasinghe | Published: 2019-08-09 | Updated: 2020-09-28 Trigger DetectionTrojan DetectionBackdoor Detection 2019.08.09 2025.05.28 Literature Database
Scaling up the randomized gradient-free adversarial attack reveals overestimation of robustness using established attacks Authors: Francesco Croce, Jonas Rauber, Matthias Hein | Published: 2019-03-27 | Updated: 2019-09-25 Trigger DetectionAdversarial LearningAdversarial Attack Detection 2019.03.27 2025.05.28 Literature Database
STRIP: A Defence Against Trojan Attacks on Deep Neural Networks Authors: Yansong Gao, Chang Xu, Derui Wang, Shiping Chen, Damith C. Ranasinghe, Surya Nepal | Published: 2019-02-18 | Updated: 2020-01-17 Trigger DetectionTrojan DetectionBackdoor Detection 2019.02.18 2025.05.28 Literature Database
Discretization based Solutions for Secure Machine Learning against Adversarial Attacks Authors: Priyadarshini Panda, Indranil Chakraborty, Kaushik Roy | Published: 2019-02-08 | Updated: 2019-02-11 Trigger DetectionCertified RobustnessRobustness Improvement Method 2019.02.08 2025.05.28 Literature Database