Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach Authors: Qi Tan, Qi Li, Yi Zhao, Zhuotao Liu, Xiaobing Guo, Ke Xu | Published: 2024-03-02 Privacy Protection MethodPoisoningFederated Learning 2024.03.02 2025.05.27 Literature Database
Transfer Learning for Security: Challenges and Future Directions Authors: Adrian Shuai Li, Arun Iyengar, Ashish Kundu, Elisa Bertino | Published: 2024-03-01 Security AnalysisPoisoningTransfer Learning 2024.03.01 2025.05.27 Literature Database
Indiscriminate Data Poisoning Attacks on Pre-trained Feature Extractors Authors: Yiwei Lu, Matthew Y. R. Yang, Gautam Kamath, Yaoliang Yu | Published: 2024-02-20 Backdoor AttackPoisoningTransfer Learning 2024.02.20 2025.05.27 Literature Database
FedRDF: A Robust and Dynamic Aggregation Function against Poisoning Attacks in Federated Learning Authors: Enrique Mármol Campos, Aurora González Vidal, José Luis Hernández Ramos, Antonio Skarmeta | Published: 2024-02-15 PoisoningAttack MethodFederated Learning 2024.02.15 2025.05.27 Literature Database
PoisonedRAG: Knowledge Corruption Attacks to Retrieval-Augmented Generation of Large Language Models Authors: Wei Zou, Runpeng Geng, Binghui Wang, Jinyuan Jia | Published: 2024-02-12 | Updated: 2024-08-13 Prompt InjectionPoisoningPoisoning Attack 2024.02.12 2025.05.27 Literature Database
FedMIA: An Effective Membership Inference Attack Exploiting “All for One” Principle in Federated Learning Authors: Gongxi Zhu, Donghao Li, Hanlin Gu, Yuan Yao, Lixin Fan, Yuxing Han | Published: 2024-02-09 | Updated: 2025-03-27 PoisoningMembership InferenceFederated Learning 2024.02.09 2025.05.27 Literature Database
Efficient Availability Attacks against Supervised and Contrastive Learning Simultaneously Authors: Yihan Wang, Yifan Zhu, Xiao-Shan Gao | Published: 2024-02-06 Cyber AttackPoisoningAdversarial Training 2024.02.06 2025.05.27 Literature Database
Data Poisoning for In-context Learning Authors: Pengfei He, Han Xu, Yue Xing, Hui Liu, Makoto Yamada, Jiliang Tang | Published: 2024-02-03 | Updated: 2025-06-02 PoisoningPoisoning AttackDetection of Misinformation 2024.02.03 2025.06.04 Literature Database
Game-Theoretic Unlearnable Example Generator Authors: Shuang Liu, Yihan Wang, Xiao-Shan Gao | Published: 2024-01-31 WatermarkingBackdoor AttackPoisoning 2024.01.31 2025.05.27 Literature Database
Better Representations via Adversarial Training in Pre-Training: A Theoretical Perspective Authors: Yue Xing, Xiaofeng Lin, Qifan Song, Yi Xu, Belinda Zeng, Guang Cheng | Published: 2024-01-26 PoisoningAdversarial TrainingFeature Selection Method 2024.01.26 2025.05.27 Literature Database