The Philosopher’s Stone: Trojaning Plugins of Large Language Models Authors: Tian Dong, Minhui Xue, Guoxing Chen, Rayne Holland, Yan Meng, Shaofeng Li, Zhen Liu, Haojin Zhu | Published: 2023-12-01 | Updated: 2024-09-11 Prompt InjectionPoisoningPoisoning Attack 2023.12.01 2025.05.28 Literature Database
Exploring the Robustness of Decentralized Training for Large Language Models Authors: Lin Lu, Chenxi Dai, Wangcheng Tao, Binhang Yuan, Yanan Sun, Pan Zhou | Published: 2023-12-01 Privacy Protection MethodPoisoningPoisoning Attack 2023.12.01 2025.05.28 Literature Database
Understanding Variation in Subpopulation Susceptibility to Poisoning Attacks Authors: Evan Rose, Fnu Suya, David Evans | Published: 2023-11-20 Subpopulation CharacteristicsBackdoor AttackPoisoning Attack 2023.11.20 2025.05.28 Literature Database
Backdoor Federated Learning by Poisoning Backdoor-Critical Layers Authors: Haomin Zhuang, Mingxian Yu, Hao Wang, Yang Hua, Jian Li, Xu Yuan | Published: 2023-08-08 | Updated: 2024-04-15 Backdoor AttackPoisoning AttackDefense Method 2023.08.08 2025.05.28 Literature Database
Towards Sybil Resilience in Decentralized Learning Authors: Thomas Werthenbach, Johan Pouwelse | Published: 2023-06-26 PoisoningPoisoning AttackFederated Learning 2023.06.26 2025.05.28 Literature Database
Exploring the Limits of Model-Targeted Indiscriminate Data Poisoning Attacks Authors: Yiwei Lu, Gautam Kamath, Yaoliang Yu | Published: 2023-03-07 | Updated: 2023-06-06 Data Contamination DetectionPoisoningPoisoning Attack 2023.03.07 2025.05.28 Literature Database
Certified Robust Neural Networks: Generalization and Corruption Resistance Authors: Amine Bennouna, Ryan Lucas, Bart Van Parys | Published: 2023-03-03 | Updated: 2023-05-18 Poisoning AttackLoss FunctionAdversarial Example 2023.03.03 2025.05.28 Literature Database
Attacks in Adversarial Machine Learning: A Systematic Survey from the Life-cycle Perspective Authors: Baoyuan Wu, Zihao Zhu, Li Liu, Qingshan Liu, Zhaofeng He, Siwei Lyu | Published: 2023-02-19 | Updated: 2024-01-04 Backdoor AttackPrompt InjectionPoisoning Attack 2023.02.19 2025.05.28 Literature Database
Mithridates: Auditing and Boosting Backdoor Resistance of Machine Learning Pipelines Authors: Eugene Bagdasaryan, Vitaly Shmatikov | Published: 2023-02-09 | Updated: 2023-12-19 Hyperparameter TuningPoisoning AttackMembership Inference 2023.02.09 2025.05.28 Literature Database
Temporal Robustness against Data Poisoning Authors: Wenxiao Wang, Soheil Feizi | Published: 2023-02-07 | Updated: 2023-12-06 DNN IP Protection MethodPoisoning AttackThreat modeling 2023.02.07 2025.05.28 Literature Database