Dissecting Malware in the Wild Authors: Hamish Spencer, Wei Wang, Ruoxi Sun, Minhui Xue | Published: 2021-11-28 | Updated: 2021-12-04 Backdoor AttackMalware Detection MethodAdversarial attack 2021.11.28 2025.05.28 Literature Database
Bayesian Framework for Gradient Leakage Authors: Mislav Balunović, Dimitar I. Dimitrov, Robin Staab, Martin Vechev | Published: 2021-11-08 | Updated: 2022-03-17 Backdoor AttackPoisoningDefense Mechanism 2021.11.08 2025.05.28 Literature Database
Get a Model! Model Hijacking Attack Against Machine Learning Models Authors: Ahmed Salem, Michael Backes, Yang Zhang | Published: 2021-11-08 Dataset evaluationBackdoor AttackAdversarial Attack Methods 2021.11.08 2025.05.28 Literature Database
Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks Authors: Shawn Shan, Arjun Nitin Bhagoji, Haitao Zheng, Ben Y. Zhao | Published: 2021-10-13 | Updated: 2022-06-15 Backdoor AttackForensic ReportAdversarial Attack Methods 2021.10.13 2025.05.28 Literature Database
Evaluating Deep Learning Models and Adversarial Attacks on Accelerometer-Based Gesture Authentication Authors: Elliu Huang, Fabio Di Troia, Mark Stamp | Published: 2021-10-03 Backdoor AttackAdversarial TrainingDeep Learning Method 2021.10.03 2025.05.28 Literature Database
Back in Black: A Comparative Evaluation of Recent State-Of-The-Art Black-Box Attacks Authors: Kaleel Mahmood, Rigel Mahmood, Ethan Rathbun, Marten van Dijk | Published: 2021-09-29 Backdoor AttackPoisoningAdversarial attack 2021.09.29 2025.05.28 Literature Database
DeSMP: Differential Privacy-exploited Stealthy Model Poisoning Attacks in Federated Learning Authors: Md Tamjid Hossain, Shafkat Islam, Shahriar Badsha, Haoting Shen | Published: 2021-09-21 Backdoor AttackFederated LearningDefense Mechanism 2021.09.21 2025.05.28 Literature Database
Excess Capacity and Backdoor Poisoning Authors: Naren Sarayu Manoj, Avrim Blum | Published: 2021-09-02 | Updated: 2021-11-03 Data Contamination DetectionBackdoor AttackAdversarial Example 2021.09.02 2025.05.28 Literature Database
Machine Unlearning of Features and Labels Authors: Alexander Warnecke, Lukas Pirch, Christian Wressnegger, Konrad Rieck | Published: 2021-08-26 | Updated: 2023-08-07 Backdoor AttackPoisoningMachine Learning Method 2021.08.26 2025.05.28 Literature Database
Advances in adversarial attacks and defenses in computer vision: A survey Authors: Naveed Akhtar, Ajmal Mian, Navid Kardan, Mubarak Shah | Published: 2021-08-01 | Updated: 2021-09-02 Backdoor AttackRobustnessAdversarial Example 2021.08.01 2025.05.28 Literature Database