Towards Backdoor Attacks and Defense in Robust Machine Learning Models Authors: Ezekiel Soremekun, Sakshi Udeshi, Sudipta Chattopadhyay | Published: 2020-02-25 | Updated: 2023-01-11 Backdoor AttackPoisoningRobustness Evaluation 2020.02.25 2025.05.28 Literature Database
Label-Consistent Backdoor Attacks Authors: Alexander Turner, Dimitris Tsipras, Aleksander Madry | Published: 2019-12-05 | Updated: 2019-12-06 Backdoor AttackPoisoningAdversarial Example 2019.12.05 2025.05.28 Literature Database
Deep Probabilistic Models to Detect Data Poisoning Attacks Authors: Mahesh Subedar, Nilesh Ahuja, Ranganath Krishnan, Ibrahima J. Ndiour, Omesh Tickoo | Published: 2019-12-03 Backdoor AttackPoisoning AttackPerformance Evaluation 2019.12.03 2025.05.28 Literature Database
Failure Modes in Machine Learning Systems Authors: Ram Shankar Siva Kumar, David O Brien, Kendra Albert, Salomé Viljöen, Jeffrey Snover | Published: 2019-11-25 Backdoor AttackPrivacy ViolationAdversarial Example 2019.11.25 2025.05.28 Literature Database
Revealing Perceptible Backdoors, without the Training Set, via the Maximum Achievable Misclassification Fraction Statistic Authors: Zhen Xiang, David J. Miller, Hang Wang, George Kesidis | Published: 2019-11-18 | Updated: 2020-04-06 Detection and localization of DDIABackdoor AttackPoisoning 2019.11.18 2025.05.28 Literature Database
A New Ensemble Adversarial Attack Powered by Long-term Gradient Memories Authors: Zhaohui Che, Ali Borji, Guangtao Zhai, Suiyi Ling, Jing Li, Patrick Le Callet | Published: 2019-11-18 Backdoor AttackModel Performance EvaluationAdversarial Attack Methods 2019.11.18 2025.05.28 Literature Database
Robust Anomaly Detection and Backdoor Attack Detection Via Differential Privacy Authors: Min Du, Ruoxi Jia, Dawn Song | Published: 2019-11-16 Backdoor AttackPrivacy-Preserving Data MiningExperimental Validation 2019.11.16 2025.05.28 Literature Database
Machine Learning Based Network Vulnerability Analysis of Industrial Internet of Things Authors: Maede Zolanvari, Marcio A. Teixeira, Lav Gupta, Khaled M. Khan, Raj Jain | Published: 2019-11-13 Backdoor AttackDiscussion on Protocol Vulnerabilities and Attack ScenariosAttacker Behavior Analysis 2019.11.13 2025.05.28 Literature Database
Eavesdrop the Composition Proportion of Training Labels in Federated Learning Authors: Lixu Wang, Shichao Xu, Xiao Wang, Qi Zhu | Published: 2019-10-14 | Updated: 2019-10-27 Backdoor AttackPoisoningAttack Evaluation 2019.10.14 2025.05.28 Literature Database
Defending Neural Backdoors via Generative Distribution Modeling Authors: Ximing Qiao, Yukun Yang, Hai Li | Published: 2019-10-10 | Updated: 2019-11-06 Backdoor AttackAttack EvaluationGenerative Adversarial Network 2019.10.10 2025.05.28 Literature Database