Poisoning

Explainable and Transferable Adversarial Attack for ML-Based Network Intrusion Detectors

Authors: Hangsheng Zhang, Dongqi Han, Yinlong Liu, Zhiliang Wang, Jiyan Sun, Shangyuan Zhuang, Jiqiang Liu, Jinsong Dong | Published: 2024-01-19
Poisoning
Model Interpretability
Adversarial attack

Vulnerabilities of Foundation Model Integrated Federated Learning Under Adversarial Threats

Authors: Chen Wu, Xi Li, Jiaqi Wang | Published: 2024-01-18 | Updated: 2024-04-02
Prompt Injection
Poisoning
Federated Learning

Towards Efficient and Certified Recovery from Poisoning Attacks in Federated Learning

Authors: Yu Jiang, Jiyuan Shen, Ziyao Liu, Chee Wei Tan, Kwok-Yan Lam | Published: 2024-01-16 | Updated: 2024-01-19
Poisoning
Poisoning Attack
Federated Learning

Crafter: Facial Feature Crafting against Inversion-based Identity Theft on Deep Models

Authors: Shiming Wang, Zhe Ji, Liyao Xiang, Hao Zhang, Xinbing Wang, Chenghu Zhou, Bo Li | Published: 2024-01-14
Privacy Protection Method
Poisoning
Watermark Evaluation

Brave: Byzantine-Resilient and Privacy-Preserving Peer-to-Peer Federated Learning

Authors: Zhangchen Xu, Fengqing Jiang, Luyao Niu, Jinyuan Jia, Radha Poovendran | Published: 2024-01-10
Byzantine Resilience
Poisoning
Federated Learning

AIJack: Let’s Hijack AI! Security and Privacy Risk Simulator for Machine Learning

Authors: Hideaki Takahashi | Published: 2023-12-29 | Updated: 2024-04-08
Watermarking
Poisoning
Federated Learning

Attack Tree Analysis for Adversarial Evasion Attacks

Authors: Yuki Yamaguchi, Toshiaki Aoki | Published: 2023-12-28
Poisoning
Adversarial attack
Watermark Evaluation

Layer Attack Unlearning: Fast and Accurate Machine Unlearning via Layer Level Attack and Knowledge Distillation

Authors: Hyunjune Kim, Sangyong Lee, Simon S. Woo | Published: 2023-12-28
Poisoning
Machine Unlearning
Watermark Evaluation

Defenses in Adversarial Machine Learning: A Survey

Authors: Baoyuan Wu, Shaokui Wei, Mingli Zhu, Meixi Zheng, Zihao Zhu, Mingda Zhang, Hongrui Chen, Danni Yuan, Li Liu, Qingshan Liu | Published: 2023-12-13
Poisoning
Adversarial Example
Defense Method

MalPurifier: Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks

Authors: Yuyang Zhou, Guang Cheng, Zongyao Chen, Shui Yu | Published: 2023-12-11
Poisoning
Robustness Evaluation
Adversarial attack