Poisoning

A Linear Approach to Data Poisoning

Authors: Diego Granziol, Donald Flynn | Published: 2025-05-21
Poisoning
Dynamic Analysis
Statistical Analysis

One Shot Dominance: Knowledge Poisoning Attack on Retrieval-Augmented Generation Systems

Authors: Zhiyuan Chang, Mingyang Li, Xiaojun Jia, Junjie Wang, Yuekai Huang, Ziyou Jiang, Yang Liu, Qing Wang | Published: 2025-05-15 | Updated: 2025-05-20
Poisoning attack on RAG
Poisoning
Poisoning Attack

Toward Malicious Clients Detection in Federated Learning

Authors: Zhihao Dou, Jiaqi Wang, Wei Sun, Zhuqing Liu, Minghong Fang | Published: 2025-05-14
Trigger Detection
Poisoning
悪意のあるクライアント検出

Analysis of the vulnerability of machine learning regression models to adversarial attacks using data from 5G wireless networks

Authors: Leonid Legashev, Artur Zhigalov, Denis Parfenov | Published: 2025-05-01
Backdoor Attack
Poisoning
Attack Type

Data Encryption Battlefield: A Deep Dive into the Dynamic Confrontations in Ransomware Attacks

Authors: Arash Mahboubi, Hamed Aboutorab, Seyit Camtepe, Hang Thanh Bui, Khanh Luong, Keyvan Ansari, Shenlu Wang, Bazara Barry | Published: 2025-04-29
Online Learning
Poisoning
Performance Evaluation

Optimizing ML Training with Metagradient Descent

Authors: Logan Engstrom, Andrew Ilyas, Benjamin Chen, Axel Feldmann, William Moses, Aleksander Madry | Published: 2025-03-17
Poisoning
Selection and Evaluation of Optimization Algorithms
Deep Learning

Provably effective detection of effective data poisoning attacks

Authors: Jonathan Gallagher, Yasaman Esfandiari, Callen MacPhee, Michael Warren | Published: 2025-01-21
Backdoor Attack
Poisoning
Experimental Validation

VerifBFL: Leveraging zk-SNARKs for A Verifiable Blockchained Federated Learning

Authors: Ahmed Ayoub Bellachia, Mouhamed Amine Bouchiha, Yacine Ghamri-Doudane, Mourad Rabah | Published: 2025-01-08
Privacy Protection
Framework
Poisoning

Mingling with the Good to Backdoor Federated Learning

Authors: Nuno Neves | Published: 2025-01-03
Backdoor Attack
Poisoning

A Backdoor Attack Scheme with Invisible Triggers Based on Model Architecture Modification

Authors: Yuan Ma, Xu Ma, Jiankang Wei, Jinmeng Tang, Xiaoyu Zhang, Yilun Lyu, Kehao Chen, Jingtong Huang | Published: 2024-12-22 | Updated: 2025-01-06
Backdoor Attack
Poisoning