Backdoor Attack

A Deep Learning Approach to Create DNS Amplification Attacks

Authors: Jared Mathews, Prosenjit Chatterjee, Shankar Banik, Cory Nance | Published: 2022-06-29
Algorithm Design
Backdoor Attack
Adversarial Attack Detection

Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems

Authors: Zeyan Liu, Fengjun Li, Jingqiang Lin, Zhu Li, Bo Luo | Published: 2022-05-31 | Updated: 2022-08-12
Attack Methods against DFL
Backdoor Attack
User Activity Analysis

SafeNet: The Unreasonable Effectiveness of Ensembles in Private Collaborative Learning

Authors: Harsh Chaudhari, Matthew Jagielski, Alina Oprea | Published: 2022-05-20 | Updated: 2022-09-08
Backdoor Attack
Membership Inference
Robustness Evaluation

Backdoor Attacks on Bayesian Neural Networks using Reverse Distribution

Authors: Zhixin Pan, Prabhat Mishra | Published: 2022-05-18
Attack Methods against DFL
Backdoor Attack
Performance Evaluation

Backdooring Explainable Machine Learning

Authors: Maximilian Noppel, Lukas Peter, Christian Wressnegger | Published: 2022-04-20
Backdoor Attack
Attack Type
Explainability

Special Session: Towards an Agile Design Methodology for Efficient, Reliable, and Secure ML Systems

Authors: Shail Dave, Alberto Marchisio, Muhammad Abdullah Hanif, Amira Guesmi, Aviral Shrivastava, Ihsen Alouani, Muhammad Shafique | Published: 2022-04-18
Backdoor Attack
Membership Inference
Defense Method

An Adaptive Black-box Backdoor Detection Method for Deep Neural Networks

Authors: Xinqiao Zhang, Huili Chen, Ke Huang, Farinaz Koushanfar | Published: 2022-04-08
Trojan Horse Signature
Trojan Detection
Backdoor Attack

Breaking the De-Pois Poisoning Defense

Authors: Alaa Anani, Mohamed Ghanem, Lotfy Abdel Khaliq | Published: 2022-04-03
Backdoor Attack
Poisoning
Defense Method

Distributed data analytics

Authors: Richard Mortier, Hamed Haddadi, Sandra Servia, Liang Wang | Published: 2022-03-26
Backdoor Attack
Privacy Protection
Communication Model

Dynamic Backdoors with Global Average Pooling

Authors: Stefanos Koffas, Stjepan Picek, Mauro Conti | Published: 2022-03-04
Backdoor Attack
Model Architecture