Poisoning Attack

Mithridates: Auditing and Boosting Backdoor Resistance of Machine Learning Pipelines

Authors: Eugene Bagdasaryan, Vitaly Shmatikov | Published: 2023-02-09 | Updated: 2023-12-19
Hyperparameter Tuning
Poisoning Attack
Membership Inference

Temporal Robustness against Data Poisoning

Authors: Wenxiao Wang, Soheil Feizi | Published: 2023-02-07 | Updated: 2023-12-06
DNN IP Protection Method
Poisoning Attack
Threat modeling

SoK: A Systematic Evaluation of Backdoor Trigger Characteristics in Image Classification

Authors: Gorka Abad, Jing Xu, Stefanos Koffas, Behrad Tajalli, Stjepan Picek, Mauro Conti | Published: 2023-02-03 | Updated: 2023-04-21
DNN IP Protection Method
Poisoning
Poisoning Attack

Suppressing Poisoning Attacks on Federated Learning for Medical Imaging

Authors: Naif Alkhunaizi, Dmitry Kamzolov, Martin Takáč, Karthik Nandakumar | Published: 2022-07-15
Byzantine Resilience
Poisoning Attack
Computational Efficiency

SPECTRE: Defending Against Backdoor Attacks Using Robust Statistics

Authors: Jonathan Hayase, Weihao Kong, Raghav Somani, Sewoong Oh | Published: 2021-04-22
Backdoor Attack
Poisoning
Poisoning Attack

Defending Against Adversarial Denial-of-Service Data Poisoning Attacks

Authors: Nicolas M. Müller, Simon Roschmann, Konstantin Böttinger | Published: 2021-04-14 | Updated: 2021-11-30
Backdoor Attack
Poisoning
Poisoning Attack

Fall of Giants: How popular text-based MLaaS fall against a simple evasion attack

Authors: Luca Pajola, Mauro Conti | Published: 2021-04-13
Poisoning Attack
Threat Model
Defense Mechanism

SGBA: A Stealthy Scapegoat Backdoor Attack against Deep Neural Networks

Authors: Ying He, Zhili Shen, Chang Xia, Jingyu Hua, Wei Tong, Sheng Zhong | Published: 2021-04-02 | Updated: 2022-05-16
Backdoor Attack Techniques
Poisoning Attack
Adversarial Example

VenoMave: Targeted Poisoning Against Speech Recognition

Authors: Hojjat Aghakhani, Lea Schönherr, Thorsten Eisenhofer, Dorothea Kolossa, Thorsten Holz, Christopher Kruegel, Giovanni Vigna | Published: 2020-10-21 | Updated: 2023-04-20
Backdoor Attack
Poisoning
Poisoning Attack

Mitigating Sybil Attacks on Differential Privacy based Federated Learning

Authors: Yupeng Jiang, Yong Li, Yipeng Zhou, Xi Zheng | Published: 2020-10-20
Attack Methods against DFL
Poisoning
Poisoning Attack