Analysis of Label-Flip Poisoning Attack on Machine Learning Based Malware Detector Authors: Kshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam | Published: 2023-01-03 Backdoor AttackPoisoningPerformance Evaluation 2023.01.03 2025.05.28 Literature Database
Unlocking Metaverse-as-a-Service The three pillars to watch: Privacy and Security, Edge Computing, and Blockchain Authors: Vesal Ahsani, Ali Rahimi, Mehdi Letafati, Babak Hossein Khalaj | Published: 2023-01-01 | Updated: 2023-01-11 Backdoor AttackPrivacy Enhancing TechnologyBlockchain Integration 2023.01.01 2025.05.28 Literature Database
Learned Systems Security Authors: Roei Schuster, Jin Peng Zhou, Thorsten Eisenhofer, Paul Grubbs, Nicolas Papernot | Published: 2022-12-20 | Updated: 2023-01-10 Backdoor AttackPrivacy Enhancing TechnologyPoisoning 2022.12.20 2025.05.28 Literature Database
New data poison attacks on machine learning classifiers for mobile exfiltration Authors: Miguel A. Ramirez, Sangyoung Yoon, Ernesto Damiani, Hussam Al Hamadi, Claudio Agostino Ardagna, Nicola Bena, Young-Ji Byon, Tae-Yeon Kim, Chung-Suk Cho, Chan Yeob Yeun | Published: 2022-10-20 Backdoor AttackPoisoningAdversarial Attack Methods 2022.10.20 2025.05.28 Literature Database
Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class Authors: Khoa D. Doan, Yingjie Lao, Ping Li | Published: 2022-10-17 Backdoor AttackPerformance Evaluation 2022.10.17 2025.05.28 Literature Database
An Embarrassingly Simple Backdoor Attack on Self-supervised Learning Authors: Changjiang Li, Ren Pang, Zhaohan Xi, Tianyu Du, Shouling Ji, Yuan Yao, Ting Wang | Published: 2022-10-13 | Updated: 2023-08-14 Backdoor AttackAttack MethodSelf-Supervised Learning 2022.10.13 2025.05.28 Literature Database
ImpNet: Imperceptible and blackbox-undetectable backdoors in compiled neural networks Authors: Eleanor Clifford, Ilia Shumailov, Yiren Zhao, Ross Anderson, Robert Mullins | Published: 2022-09-30 | Updated: 2024-03-01 Backdoor AttackModel Design 2022.09.30 2025.05.28 Literature Database
Augmentation Backdoors Authors: Joseph Rance, Yiren Zhao, Ilia Shumailov, Robert Mullins | Published: 2022-09-29 Dataset GenerationData GenerationBackdoor Attack 2022.09.29 2025.05.28 Literature Database
SNAP: Efficient Extraction of Private Properties with Poisoning Authors: Harsh Chaudhari, John Abascal, Alina Oprea, Matthew Jagielski, Florian Tramèr, Jonathan Ullman | Published: 2022-08-25 | Updated: 2023-06-21 Backdoor AttackProperty InferenceAttack Method 2022.08.25 2025.05.28 Literature Database
An anomaly detection approach for backdoored neural networks: face recognition as a case study Authors: Alexander Unnervik, Sébastien Marcel | Published: 2022-08-22 Backdoor AttackAttack DetectionFace Recognition System 2022.08.22 2025.05.28 Literature Database