A Deep Learning Approach to Create DNS Amplification Attacks Authors: Jared Mathews, Prosenjit Chatterjee, Shankar Banik, Cory Nance | Published: 2022-06-29 Algorithm DesignBackdoor AttackAdversarial Attack Detection 2022.06.29 2025.05.28 Literature Database
Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems Authors: Zeyan Liu, Fengjun Li, Jingqiang Lin, Zhu Li, Bo Luo | Published: 2022-05-31 | Updated: 2022-08-12 Attack Methods against DFLBackdoor AttackUser Activity Analysis 2022.05.31 2025.05.28 Literature Database
SafeNet: The Unreasonable Effectiveness of Ensembles in Private Collaborative Learning Authors: Harsh Chaudhari, Matthew Jagielski, Alina Oprea | Published: 2022-05-20 | Updated: 2022-09-08 Backdoor AttackMembership InferenceRobustness Evaluation 2022.05.20 2025.05.28 Literature Database
Backdoor Attacks on Bayesian Neural Networks using Reverse Distribution Authors: Zhixin Pan, Prabhat Mishra | Published: 2022-05-18 Attack Methods against DFLBackdoor AttackPerformance Evaluation 2022.05.18 2025.05.28 Literature Database
Backdooring Explainable Machine Learning Authors: Maximilian Noppel, Lukas Peter, Christian Wressnegger | Published: 2022-04-20 Backdoor AttackAttack TypeExplainability 2022.04.20 2025.05.28 Literature Database
Special Session: Towards an Agile Design Methodology for Efficient, Reliable, and Secure ML Systems Authors: Shail Dave, Alberto Marchisio, Muhammad Abdullah Hanif, Amira Guesmi, Aviral Shrivastava, Ihsen Alouani, Muhammad Shafique | Published: 2022-04-18 Backdoor AttackMembership InferenceDefense Method 2022.04.18 2025.05.28 Literature Database
An Adaptive Black-box Backdoor Detection Method for Deep Neural Networks Authors: Xinqiao Zhang, Huili Chen, Ke Huang, Farinaz Koushanfar | Published: 2022-04-08 Trojan Horse SignatureTrojan DetectionBackdoor Attack 2022.04.08 2025.05.28 Literature Database
Breaking the De-Pois Poisoning Defense Authors: Alaa Anani, Mohamed Ghanem, Lotfy Abdel Khaliq | Published: 2022-04-03 Backdoor AttackPoisoningDefense Method 2022.04.03 2025.05.28 Literature Database
Distributed data analytics Authors: Richard Mortier, Hamed Haddadi, Sandra Servia, Liang Wang | Published: 2022-03-26 Backdoor AttackPrivacy ProtectionCommunication Model 2022.03.26 2025.05.28 Literature Database
Dynamic Backdoors with Global Average Pooling Authors: Stefanos Koffas, Stjepan Picek, Mauro Conti | Published: 2022-03-04 Backdoor AttackModel Architecture 2022.03.04 2025.05.28 Literature Database