ImpNet: Imperceptible and blackbox-undetectable backdoors in compiled neural networks Authors: Eleanor Clifford, Ilia Shumailov, Yiren Zhao, Ross Anderson, Robert Mullins | Published: 2022-09-30 | Updated: 2024-03-01 Backdoor AttackModel Design 2022.09.30 2025.05.28 Literature Database
Augmentation Backdoors Authors: Joseph Rance, Yiren Zhao, Ilia Shumailov, Robert Mullins | Published: 2022-09-29 Dataset GenerationData GenerationBackdoor Attack 2022.09.29 2025.05.28 Literature Database
SNAP: Efficient Extraction of Private Properties with Poisoning Authors: Harsh Chaudhari, John Abascal, Alina Oprea, Matthew Jagielski, Florian Tramèr, Jonathan Ullman | Published: 2022-08-25 | Updated: 2023-06-21 Backdoor AttackProperty InferenceAttack Method 2022.08.25 2025.05.28 Literature Database
An anomaly detection approach for backdoored neural networks: face recognition as a case study Authors: Alexander Unnervik, Sébastien Marcel | Published: 2022-08-22 Backdoor AttackAttack DetectionFace Recognition System 2022.08.22 2025.05.28 Literature Database
A Knowledge Distillation-Based Backdoor Attack in Federated Learning Authors: Yifan Wang, Wei Fan, Keke Yang, Naji Alhusaini, Jing Li | Published: 2022-08-12 Backdoor AttackKnowledge Distillation 2022.08.12 2025.05.28 Literature Database
LGV: Boosting Adversarial Example Transferability from Large Geometric Vicinity Authors: Martin Gubri, Maxime Cordy, Mike Papadakis, Yves Le Traon, Koushik Sen | Published: 2022-07-26 Geometry of LGV ModelBackdoor AttackTransfer Learning 2022.07.26 2025.05.28 Literature Database
Federated Unlearning: How to Efficiently Erase a Client in FL? Authors: Anisa Halimi, Swanand Kadhe, Ambrish Rawat, Nathalie Baracaldo | Published: 2022-07-12 | Updated: 2023-10-20 Client Data DeletionBackdoor AttackModel Performance Evaluation 2022.07.12 2025.05.28 Literature Database
Ransomware Classification and Detection With Machine Learning Algorithms Authors: Mohammad Masum, Md Jobair Hossain Faruk, Hossain Shahriar, Kai Qian, Dan Lo, Muhaiminul Islam Adnan | Published: 2022-07-02 Backdoor AttackDynamic AnalysisEvaluation Method 2022.07.02 2025.05.28 Literature Database
A Deep Learning Approach to Create DNS Amplification Attacks Authors: Jared Mathews, Prosenjit Chatterjee, Shankar Banik, Cory Nance | Published: 2022-06-29 Algorithm DesignBackdoor AttackAdversarial Attack Detection 2022.06.29 2025.05.28 Literature Database
Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems Authors: Zeyan Liu, Fengjun Li, Jingqiang Lin, Zhu Li, Bo Luo | Published: 2022-05-31 | Updated: 2022-08-12 Attack Methods against DFLBackdoor AttackUser Activity Analysis 2022.05.31 2025.05.28 Literature Database