On the Detection of Image-Scaling Attacks in Machine Learning Authors: Erwin Quiring, Andreas Müller, Konrad Rieck | Published: 2023-10-23 Backdoor AttackAdversarial Attack DetectionAnalysis of Detection Methods 2023.10.23 2025.05.28 Literature Database
FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks Authors: Jorge Castillo, Phillip Rieger, Hossein Fereidooni, Qian Chen, Ahmad Sadeghi | Published: 2023-10-03 Backdoor AttackPrivacy ProtectionPoisoning 2023.10.03 2025.05.28 Literature Database
Protect Federated Learning Against Backdoor Attacks via Data-Free Trigger Generation Authors: Yanxin Yang, Ming Hu, Yue Cao, Jun Xia, Yihao Huang, Yang Liu, Mingsong Chen | Published: 2023-08-22 Backdoor AttackPoisoningDefense Method 2023.08.22 2025.05.28 Literature Database
SoK: Realistic Adversarial Attacks and Defenses for Intelligent Network Intrusion Detection Authors: João Vitorino, Isabel Praça, Eva Maia | Published: 2023-08-13 Backdoor AttackAdversarial TrainingDefense Method 2023.08.13 2025.05.28 Literature Database
Breaking Speaker Recognition with PaddingBack Authors: Zhe Ye, Diqun Yan, Li Dong, Kailai Shen | Published: 2023-08-08 | Updated: 2024-03-11 WatermarkingBackdoor AttackPoisoning 2023.08.08 2025.05.28 Literature Database
Backdoor Federated Learning by Poisoning Backdoor-Critical Layers Authors: Haomin Zhuang, Mingxian Yu, Hao Wang, Yang Hua, Jian Li, Xu Yuan | Published: 2023-08-08 | Updated: 2024-04-15 Backdoor AttackPoisoning AttackDefense Method 2023.08.08 2025.05.28 Literature Database
Backdoor Attacks for In-Context Learning with Language Models Authors: Nikhil Kandpal, Matthew Jagielski, Florian Tramèr, Nicholas Carlini | Published: 2023-07-27 LLM SecurityBackdoor AttackPrompt Injection 2023.07.27 2025.05.28 Literature Database
Digital Healthcare in The Metaverse: Insights into Privacy and Security Authors: Mehdi Letafati, Safa Otoum | Published: 2023-07-22 | Updated: 2023-08-10 Data Protection MethodBackdoor AttackPrivacy Risk Management 2023.07.22 2025.05.28 Literature Database
Shared Adversarial Unlearning: Backdoor Mitigation by Unlearning Shared Adversarial Examples Authors: Shaokui Wei, Mingda Zhang, Hongyuan Zha, Baoyuan Wu | Published: 2023-07-20 Backdoor AttackAdversarial Attack MethodsWatermark Evaluation 2023.07.20 2025.05.28 Literature Database
Rethinking Backdoor Attacks Authors: Alaa Khaddaj, Guillaume Leclerc, Aleksandar Makelov, Kristian Georgiev, Hadi Salman, Andrew Ilyas, Aleksander Madry | Published: 2023-07-19 Data ObfuscationBackdoor AttackPoisoning 2023.07.19 2025.05.28 Literature Database