Backdoor Attack

Towards Backdoor Attacks and Defense in Robust Machine Learning Models

Authors: Ezekiel Soremekun, Sakshi Udeshi, Sudipta Chattopadhyay | Published: 2020-02-25 | Updated: 2023-01-11
Backdoor Attack
Poisoning
Robustness Evaluation

Label-Consistent Backdoor Attacks

Authors: Alexander Turner, Dimitris Tsipras, Aleksander Madry | Published: 2019-12-05 | Updated: 2019-12-06
Backdoor Attack
Poisoning
Adversarial Example

Deep Probabilistic Models to Detect Data Poisoning Attacks

Authors: Mahesh Subedar, Nilesh Ahuja, Ranganath Krishnan, Ibrahima J. Ndiour, Omesh Tickoo | Published: 2019-12-03
Backdoor Attack
Poisoning Attack
Performance Evaluation

Failure Modes in Machine Learning Systems

Authors: Ram Shankar Siva Kumar, David O Brien, Kendra Albert, Salomé Viljöen, Jeffrey Snover | Published: 2019-11-25
Backdoor Attack
Privacy Violation
Adversarial Example

Revealing Perceptible Backdoors, without the Training Set, via the Maximum Achievable Misclassification Fraction Statistic

Authors: Zhen Xiang, David J. Miller, Hang Wang, George Kesidis | Published: 2019-11-18 | Updated: 2020-04-06
Detection and localization of DDIA
Backdoor Attack
Poisoning

A New Ensemble Adversarial Attack Powered by Long-term Gradient Memories

Authors: Zhaohui Che, Ali Borji, Guangtao Zhai, Suiyi Ling, Jing Li, Patrick Le Callet | Published: 2019-11-18
Backdoor Attack
Model Performance Evaluation
Adversarial Attack Methods

Robust Anomaly Detection and Backdoor Attack Detection Via Differential Privacy

Authors: Min Du, Ruoxi Jia, Dawn Song | Published: 2019-11-16
Backdoor Attack
Privacy-Preserving Data Mining
Experimental Validation

Machine Learning Based Network Vulnerability Analysis of Industrial Internet of Things

Authors: Maede Zolanvari, Marcio A. Teixeira, Lav Gupta, Khaled M. Khan, Raj Jain | Published: 2019-11-13
Backdoor Attack
Discussion on Protocol Vulnerabilities and Attack Scenarios
Attacker Behavior Analysis

Eavesdrop the Composition Proportion of Training Labels in Federated Learning

Authors: Lixu Wang, Shichao Xu, Xiao Wang, Qi Zhu | Published: 2019-10-14 | Updated: 2019-10-27
Backdoor Attack
Poisoning
Attack Evaluation

Defending Neural Backdoors via Generative Distribution Modeling

Authors: Ximing Qiao, Yukun Yang, Hai Li | Published: 2019-10-10 | Updated: 2019-11-06
Backdoor Attack
Attack Evaluation
Generative Adversarial Network