A Knowledge Distillation-Based Backdoor Attack in Federated Learning Authors: Yifan Wang, Wei Fan, Keke Yang, Naji Alhusaini, Jing Li | Published: 2022-08-12 Backdoor AttackKnowledge Distillation 2022.08.12 2025.05.28 Literature Database
LGV: Boosting Adversarial Example Transferability from Large Geometric Vicinity Authors: Martin Gubri, Maxime Cordy, Mike Papadakis, Yves Le Traon, Koushik Sen | Published: 2022-07-26 Geometry of LGV ModelBackdoor AttackTransfer Learning 2022.07.26 2025.05.28 Literature Database
Federated Unlearning: How to Efficiently Erase a Client in FL? Authors: Anisa Halimi, Swanand Kadhe, Ambrish Rawat, Nathalie Baracaldo | Published: 2022-07-12 | Updated: 2023-10-20 Client Data DeletionBackdoor AttackModel Performance Evaluation 2022.07.12 2025.05.28 Literature Database
Ransomware Classification and Detection With Machine Learning Algorithms Authors: Mohammad Masum, Md Jobair Hossain Faruk, Hossain Shahriar, Kai Qian, Dan Lo, Muhaiminul Islam Adnan | Published: 2022-07-02 Backdoor AttackDynamic AnalysisEvaluation Method 2022.07.02 2025.05.28 Literature Database
A Deep Learning Approach to Create DNS Amplification Attacks Authors: Jared Mathews, Prosenjit Chatterjee, Shankar Banik, Cory Nance | Published: 2022-06-29 Algorithm DesignBackdoor AttackAdversarial Attack Detection 2022.06.29 2025.05.28 Literature Database
Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems Authors: Zeyan Liu, Fengjun Li, Jingqiang Lin, Zhu Li, Bo Luo | Published: 2022-05-31 | Updated: 2022-08-12 Attack Methods against DFLBackdoor AttackUser Activity Analysis 2022.05.31 2025.05.28 Literature Database
SafeNet: The Unreasonable Effectiveness of Ensembles in Private Collaborative Learning Authors: Harsh Chaudhari, Matthew Jagielski, Alina Oprea | Published: 2022-05-20 | Updated: 2022-09-08 Backdoor AttackMembership InferenceRobustness Evaluation 2022.05.20 2025.05.28 Literature Database
Backdoor Attacks on Bayesian Neural Networks using Reverse Distribution Authors: Zhixin Pan, Prabhat Mishra | Published: 2022-05-18 Attack Methods against DFLBackdoor AttackPerformance Evaluation 2022.05.18 2025.05.28 Literature Database
Backdooring Explainable Machine Learning Authors: Maximilian Noppel, Lukas Peter, Christian Wressnegger | Published: 2022-04-20 Backdoor AttackAttack TypeExplainability 2022.04.20 2025.05.28 Literature Database
Special Session: Towards an Agile Design Methodology for Efficient, Reliable, and Secure ML Systems Authors: Shail Dave, Alberto Marchisio, Muhammad Abdullah Hanif, Amira Guesmi, Aviral Shrivastava, Ihsen Alouani, Muhammad Shafique | Published: 2022-04-18 Backdoor AttackMembership InferenceDefense Method 2022.04.18 2025.05.28 Literature Database