Backdoor Attack

Dissecting Malware in the Wild

Authors: Hamish Spencer, Wei Wang, Ruoxi Sun, Minhui Xue | Published: 2021-11-28 | Updated: 2021-12-04
Backdoor Attack
Malware Detection Method
Adversarial attack

Bayesian Framework for Gradient Leakage

Authors: Mislav Balunović, Dimitar I. Dimitrov, Robin Staab, Martin Vechev | Published: 2021-11-08 | Updated: 2022-03-17
Backdoor Attack
Poisoning
Defense Mechanism

Get a Model! Model Hijacking Attack Against Machine Learning Models

Authors: Ahmed Salem, Michael Backes, Yang Zhang | Published: 2021-11-08
Dataset evaluation
Backdoor Attack
Adversarial Attack Methods

Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks

Authors: Shawn Shan, Arjun Nitin Bhagoji, Haitao Zheng, Ben Y. Zhao | Published: 2021-10-13 | Updated: 2022-06-15
Backdoor Attack
Forensic Report
Adversarial Attack Methods

Evaluating Deep Learning Models and Adversarial Attacks on Accelerometer-Based Gesture Authentication

Authors: Elliu Huang, Fabio Di Troia, Mark Stamp | Published: 2021-10-03
Backdoor Attack
Adversarial Training
Deep Learning Method

Back in Black: A Comparative Evaluation of Recent State-Of-The-Art Black-Box Attacks

Authors: Kaleel Mahmood, Rigel Mahmood, Ethan Rathbun, Marten van Dijk | Published: 2021-09-29
Backdoor Attack
Poisoning
Adversarial attack

DeSMP: Differential Privacy-exploited Stealthy Model Poisoning Attacks in Federated Learning

Authors: Md Tamjid Hossain, Shafkat Islam, Shahriar Badsha, Haoting Shen | Published: 2021-09-21
Backdoor Attack
Federated Learning
Defense Mechanism

Excess Capacity and Backdoor Poisoning

Authors: Naren Sarayu Manoj, Avrim Blum | Published: 2021-09-02 | Updated: 2021-11-03
Data Contamination Detection
Backdoor Attack
Adversarial Example

Machine Unlearning of Features and Labels

Authors: Alexander Warnecke, Lukas Pirch, Christian Wressnegger, Konrad Rieck | Published: 2021-08-26 | Updated: 2023-08-07
Backdoor Attack
Poisoning
Machine Learning Method

Advances in adversarial attacks and defenses in computer vision: A survey

Authors: Naveed Akhtar, Ajmal Mian, Navid Kardan, Mubarak Shah | Published: 2021-08-01 | Updated: 2021-09-02
Backdoor Attack
Robustness
Adversarial Example