Backdoor Attack

An Adaptive Black-box Backdoor Detection Method for Deep Neural Networks

Authors: Xinqiao Zhang, Huili Chen, Ke Huang, Farinaz Koushanfar | Published: 2022-04-08
Trojan Horse Signature
Trojan Detection
Backdoor Attack

Breaking the De-Pois Poisoning Defense

Authors: Alaa Anani, Mohamed Ghanem, Lotfy Abdel Khaliq | Published: 2022-04-03
Backdoor Attack
Poisoning
Defense Method

Distributed data analytics

Authors: Richard Mortier, Hamed Haddadi, Sandra Servia, Liang Wang | Published: 2022-03-26
Backdoor Attack
Privacy Protection
Communication Model

Dynamic Backdoors with Global Average Pooling

Authors: Stefanos Koffas, Stjepan Picek, Mauro Conti | Published: 2022-03-04
Backdoor Attack
Model Architecture

Security for Machine Learning-based Software Systems: a survey of threats, practices and challenges

Authors: Huaming Chen, M. Ali Babar | Published: 2022-01-12 | Updated: 2023-12-17
Backdoor Attack
Membership Inference
Vulnerability Analysis

Challenges and Approaches for Mitigating Byzantine Attacks in Federated Learning

Authors: Junyu Shi, Wei Wan, Shengshan Hu, Jianrong Lu, Leo Yu Zhang | Published: 2021-12-29 | Updated: 2022-10-07
Backdoor Attack
Poisoning
Defense Method

Robust and Privacy-Preserving Collaborative Learning: A Comprehensive Survey

Authors: Shangwei Guo, Xu Zhang, Fei Yang, Tianwei Zhang, Yan Gan, Tao Xiang, Yang Liu | Published: 2021-12-19
Backdoor Attack
Privacy Risk Management
Poisoning

On the Security & Privacy in Federated Learning

Authors: Gorka Abad, Stjepan Picek, Víctor Julio Ramírez-Durán, Aitor Urbieta | Published: 2021-12-10 | Updated: 2022-03-16
Backdoor Attack
Poisoning
Defense Method

Adversarial Attacks Against Deep Generative Models on Data: A Survey

Authors: Hui Sun, Tianqing Zhu, Zhiqiu Zhang, Dawei Jin. Ping Xiong, Wanlei Zhou | Published: 2021-12-01
Data Generation
Backdoor Attack
Adversarial Attack Methods

Living-Off-The-Land Command Detection Using Active Learning

Authors: Talha Ongun, Jack W. Stokes, Jonathan Bar Or, Ke Tian, Farid Tajaddodianfar, Joshua Neil, Christian Seifert, Alina Oprea, John C. Platt | Published: 2021-11-30
Active Learning
Backdoor Attack
Malware Detection Method