A Survey of Data Security: Practices from Cybersecurity and Challenges of Machine Learning Authors: Padmaksha Roy, Jaganmohan Chandrasekaran, Erin Lanus, Laura Freeman, Jeremy Werner | Published: 2023-10-06 | Updated: 2023-12-04 Data Protection MethodPrivacy Protection MethodPoisoning 2023.10.06 2025.05.28 Literature Database
Raze to the Ground: Query-Efficient Adversarial HTML Attacks on Machine-Learning Phishing Webpage Detectors Authors: Biagio Montaruli, Luca Demetrio, Maura Pintor, Luca Compagna, Davide Balzarotti, Battista Biggio | Published: 2023-10-04 | Updated: 2023-10-14 PhishingPoisoningMachine Learning Method 2023.10.04 2025.05.28 Literature Database
FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks Authors: Jorge Castillo, Phillip Rieger, Hossein Fereidooni, Qian Chen, Ahmad Sadeghi | Published: 2023-10-03 Backdoor AttackPrivacy ProtectionPoisoning 2023.10.03 2025.05.28 Literature Database
Byzantine-Resilient Federated PCA and Low Rank Column-wise Sensing Authors: Ankit Pratap Singh, Namrata Vaswani | Published: 2023-09-25 | Updated: 2024-08-09 PoisoningDimensionality Reduction MethodFederated Learning 2023.09.25 2025.05.28 Literature Database
Deep Nonparametric Convexified Filtering for Computational Photography, Image Synthesis and Adversarial Defense Authors: Jianqiao Wangni | Published: 2023-09-13 | Updated: 2023-09-14 WatermarkingPoisoningDeep Learning Method 2023.09.13 2025.05.28 Literature Database
Sample Complexity of Robust Learning against Evasion Attacks Authors: Pascale Gourdeau | Published: 2023-08-23 Sample ComplexityPoisoningAdversarial Example 2023.08.23 2025.05.28 Literature Database
Protect Federated Learning Against Backdoor Attacks via Data-Free Trigger Generation Authors: Yanxin Yang, Ming Hu, Yue Cao, Jun Xia, Yihao Huang, Yang Liu, Mingsong Chen | Published: 2023-08-22 Backdoor AttackPoisoningDefense Method 2023.08.22 2025.05.28 Literature Database
Test-Time Poisoning Attacks Against Test-Time Adaptation Models Authors: Tianshuo Cong, Xinlei He, Yun Shen, Yang Zhang | Published: 2023-08-16 PoisoningModel Performance EvaluationAttack Evaluation 2023.08.16 2025.05.28 Literature Database
A Review of Adversarial Attacks in Computer Vision Authors: Yutong Zhang, Yao Li, Yin Li, Zhichang Guo | Published: 2023-08-15 PoisoningAdversarial Attack MethodsDefense Method 2023.08.15 2025.05.28 Literature Database
A Survey on Decentralized Federated Learning Authors: Edoardo Gabrielli, Giovanni Pica, Gabriele Tolomei | Published: 2023-08-08 Data Protection MethodIntegration of Blockchain and FLPoisoning 2023.08.08 2025.05.28 Literature Database