Poisoning Attack

The Philosopher’s Stone: Trojaning Plugins of Large Language Models

Authors: Tian Dong, Minhui Xue, Guoxing Chen, Rayne Holland, Yan Meng, Shaofeng Li, Zhen Liu, Haojin Zhu | Published: 2023-12-01 | Updated: 2024-09-11
Prompt Injection
Poisoning
Poisoning Attack

Exploring the Robustness of Decentralized Training for Large Language Models

Authors: Lin Lu, Chenxi Dai, Wangcheng Tao, Binhang Yuan, Yanan Sun, Pan Zhou | Published: 2023-12-01
Privacy Protection Method
Poisoning
Poisoning Attack

Understanding Variation in Subpopulation Susceptibility to Poisoning Attacks

Authors: Evan Rose, Fnu Suya, David Evans | Published: 2023-11-20
Subpopulation Characteristics
Backdoor Attack
Poisoning Attack

Backdoor Federated Learning by Poisoning Backdoor-Critical Layers

Authors: Haomin Zhuang, Mingxian Yu, Hao Wang, Yang Hua, Jian Li, Xu Yuan | Published: 2023-08-08 | Updated: 2024-04-15
Backdoor Attack
Poisoning Attack
Defense Method

Towards Sybil Resilience in Decentralized Learning

Authors: Thomas Werthenbach, Johan Pouwelse | Published: 2023-06-26
Poisoning
Poisoning Attack
Federated Learning

Exploring the Limits of Model-Targeted Indiscriminate Data Poisoning Attacks

Authors: Yiwei Lu, Gautam Kamath, Yaoliang Yu | Published: 2023-03-07 | Updated: 2023-06-06
Data Contamination Detection
Poisoning
Poisoning Attack

Certified Robust Neural Networks: Generalization and Corruption Resistance

Authors: Amine Bennouna, Ryan Lucas, Bart Van Parys | Published: 2023-03-03 | Updated: 2023-05-18
Poisoning Attack
Loss Function
Adversarial Example

Attacks in Adversarial Machine Learning: A Systematic Survey from the Life-cycle Perspective

Authors: Baoyuan Wu, Zihao Zhu, Li Liu, Qingshan Liu, Zhaofeng He, Siwei Lyu | Published: 2023-02-19 | Updated: 2024-01-04
Backdoor Attack
Prompt Injection
Poisoning Attack

Mithridates: Auditing and Boosting Backdoor Resistance of Machine Learning Pipelines

Authors: Eugene Bagdasaryan, Vitaly Shmatikov | Published: 2023-02-09 | Updated: 2023-12-19
Hyperparameter Tuning
Poisoning Attack
Membership Inference

Temporal Robustness against Data Poisoning

Authors: Wenxiao Wang, Soheil Feizi | Published: 2023-02-07 | Updated: 2023-12-06
DNN IP Protection Method
Poisoning Attack
Threat modeling