Toward Smart Security Enhancement of Federated Learning Networks Authors: Junjie Tan, Ying-Chang Liang, Nguyen Cong Luong, Dusit Niyato | Published: 2020-08-19 PoisoningPoisoning AttackFederated Learning 2020.08.19 2025.05.28 Literature Database
Intrinsic Certified Robustness of Bagging against Data Poisoning Attacks Authors: Jinyuan Jia, Xiaoyu Cao, Neil Zhenqiang Gong | Published: 2020-08-11 | Updated: 2020-12-09 Group-Based RobustnessBackdoor AttackPoisoning Attack 2020.08.11 2025.05.28 Literature Database
Scalable and Communication-efficient Decentralized Federated Edge Learning with Multi-blockchain Framework Authors: Jiawen Kang, Zehui Xiong, Chunxiao Jiang, Yi Liu, Song Guo, Yang Zhang, Dusit Niyato, Cyril Leung, Chunyan Miao | Published: 2020-08-10 Poisoning AttackMachine Learning FrameworkCommunication Efficiency 2020.08.10 2025.05.28 Literature Database
Subpopulation Data Poisoning Attacks Authors: Matthew Jagielski, Giorgio Severi, Niklas Pousette Harger, Alina Oprea | Published: 2020-06-24 | Updated: 2021-05-12 Backdoor AttackPoisoningPoisoning Attack 2020.06.24 2025.05.28 Literature Database
Just How Toxic is Data Poisoning? A Unified Benchmark for Backdoor and Data Poisoning Attacks Authors: Avi Schwarzschild, Micah Goldblum, Arjun Gupta, John P Dickerson, Tom Goldstein | Published: 2020-06-22 | Updated: 2021-06-17 PoisoningPoisoning AttackAttack Method 2020.06.22 2025.05.28 Literature Database
With Great Dispersion Comes Greater Resilience: Efficient Poisoning Attacks and Defenses for Linear Regression Models Authors: Jialin Wen, Benjamin Zi Hao Zhao, Minhui Xue, Alina Oprea, Haifeng Qian | Published: 2020-06-21 | Updated: 2021-05-19 PoisoningPoisoning AttackLinear Regression 2020.06.21 2025.05.28 Literature Database
Deep Probabilistic Models to Detect Data Poisoning Attacks Authors: Mahesh Subedar, Nilesh Ahuja, Ranganath Krishnan, Ibrahima J. Ndiour, Omesh Tickoo | Published: 2019-12-03 Backdoor AttackPoisoning AttackPerformance Evaluation 2019.12.03 2025.05.28 Literature Database
Biscotti: A Ledger for Private and Secure Peer-to-Peer Machine Learning Authors: Muhammad Shayan, Clement Fung, Chris J. M. Yoon, Ivan Beschastnikh | Published: 2018-11-24 | Updated: 2019-12-12 Poisoning AttackDifferential PrivacyFederated Learning 2018.11.24 2025.05.28 Literature Database
Dancing in the Dark: Private Multi-Party Machine Learning in an Untrusted Setting Authors: Clement Fung, Jamie Koerner, Stewart Grant, Ivan Beschastnikh | Published: 2018-11-23 | Updated: 2019-02-24 Privacy ProtectionPoisoning AttackModel Extraction Attack 2018.11.23 2025.05.28 Literature Database
Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering Authors: Bryant Chen, Wilka Carvalho, Nathalie Baracaldo, Heiko Ludwig, Benjamin Edwards, Taesung Lee, Ian Molloy, Biplav Srivastava | Published: 2018-11-09 Backdoor Attack MitigationDetection of Poison Data for Backdoor AttacksPoisoning Attack 2018.11.09 2025.05.28 Literature Database