An Adaptive Black-box Backdoor Detection Method for Deep Neural Networks Authors: Xinqiao Zhang, Huili Chen, Ke Huang, Farinaz Koushanfar | Published: 2022-04-08 Trojan Horse SignatureTrojan DetectionBackdoor Attack 2022.04.08 2025.05.28 Literature Database
Breaking the De-Pois Poisoning Defense Authors: Alaa Anani, Mohamed Ghanem, Lotfy Abdel Khaliq | Published: 2022-04-03 Backdoor AttackPoisoningDefense Method 2022.04.03 2025.05.28 Literature Database
Distributed data analytics Authors: Richard Mortier, Hamed Haddadi, Sandra Servia, Liang Wang | Published: 2022-03-26 Backdoor AttackPrivacy ProtectionCommunication Model 2022.03.26 2025.05.28 Literature Database
Dynamic Backdoors with Global Average Pooling Authors: Stefanos Koffas, Stjepan Picek, Mauro Conti | Published: 2022-03-04 Backdoor AttackModel Architecture 2022.03.04 2025.05.28 Literature Database
Security for Machine Learning-based Software Systems: a survey of threats, practices and challenges Authors: Huaming Chen, M. Ali Babar | Published: 2022-01-12 | Updated: 2023-12-17 Backdoor AttackMembership InferenceVulnerability Analysis 2022.01.12 2025.05.28 Literature Database
Challenges and Approaches for Mitigating Byzantine Attacks in Federated Learning Authors: Junyu Shi, Wei Wan, Shengshan Hu, Jianrong Lu, Leo Yu Zhang | Published: 2021-12-29 | Updated: 2022-10-07 Backdoor AttackPoisoningDefense Method 2021.12.29 2025.05.28 Literature Database
Robust and Privacy-Preserving Collaborative Learning: A Comprehensive Survey Authors: Shangwei Guo, Xu Zhang, Fei Yang, Tianwei Zhang, Yan Gan, Tao Xiang, Yang Liu | Published: 2021-12-19 Backdoor AttackPrivacy Risk ManagementPoisoning 2021.12.19 2025.05.28 Literature Database
On the Security & Privacy in Federated Learning Authors: Gorka Abad, Stjepan Picek, Víctor Julio Ramírez-Durán, Aitor Urbieta | Published: 2021-12-10 | Updated: 2022-03-16 Backdoor AttackPoisoningDefense Method 2021.12.10 2025.05.28 Literature Database
Adversarial Attacks Against Deep Generative Models on Data: A Survey Authors: Hui Sun, Tianqing Zhu, Zhiqiu Zhang, Dawei Jin. Ping Xiong, Wanlei Zhou | Published: 2021-12-01 Data GenerationBackdoor AttackAdversarial Attack Methods 2021.12.01 2025.05.28 Literature Database
Living-Off-The-Land Command Detection Using Active Learning Authors: Talha Ongun, Jack W. Stokes, Jonathan Bar Or, Ke Tian, Farid Tajaddodianfar, Joshua Neil, Christian Seifert, Alina Oprea, John C. Platt | Published: 2021-11-30 Active LearningBackdoor AttackMalware Detection Method 2021.11.30 2025.05.28 Literature Database