Poisoning

A Survey of Data Security: Practices from Cybersecurity and Challenges of Machine Learning

Authors: Padmaksha Roy, Jaganmohan Chandrasekaran, Erin Lanus, Laura Freeman, Jeremy Werner | Published: 2023-10-06 | Updated: 2023-12-04
Data Protection Method
Privacy Protection Method
Poisoning

Raze to the Ground: Query-Efficient Adversarial HTML Attacks on Machine-Learning Phishing Webpage Detectors

Authors: Biagio Montaruli, Luca Demetrio, Maura Pintor, Luca Compagna, Davide Balzarotti, Battista Biggio | Published: 2023-10-04 | Updated: 2023-10-14
Phishing
Poisoning
Machine Learning Method

FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks

Authors: Jorge Castillo, Phillip Rieger, Hossein Fereidooni, Qian Chen, Ahmad Sadeghi | Published: 2023-10-03
Backdoor Attack
Privacy Protection
Poisoning

Byzantine-Resilient Federated PCA and Low Rank Column-wise Sensing

Authors: Ankit Pratap Singh, Namrata Vaswani | Published: 2023-09-25 | Updated: 2024-08-09
Poisoning
Dimensionality Reduction Method
Federated Learning

Deep Nonparametric Convexified Filtering for Computational Photography, Image Synthesis and Adversarial Defense

Authors: Jianqiao Wangni | Published: 2023-09-13 | Updated: 2023-09-14
Watermarking
Poisoning
Deep Learning Method

Sample Complexity of Robust Learning against Evasion Attacks

Authors: Pascale Gourdeau | Published: 2023-08-23
Sample Complexity
Poisoning
Adversarial Example

Protect Federated Learning Against Backdoor Attacks via Data-Free Trigger Generation

Authors: Yanxin Yang, Ming Hu, Yue Cao, Jun Xia, Yihao Huang, Yang Liu, Mingsong Chen | Published: 2023-08-22
Backdoor Attack
Poisoning
Defense Method

Test-Time Poisoning Attacks Against Test-Time Adaptation Models

Authors: Tianshuo Cong, Xinlei He, Yun Shen, Yang Zhang | Published: 2023-08-16
Poisoning
Model Performance Evaluation
Attack Evaluation

A Review of Adversarial Attacks in Computer Vision

Authors: Yutong Zhang, Yao Li, Yin Li, Zhichang Guo | Published: 2023-08-15
Poisoning
Adversarial Attack Methods
Defense Method

A Survey on Decentralized Federated Learning

Authors: Edoardo Gabrielli, Giovanni Pica, Gabriele Tolomei | Published: 2023-08-08
Data Protection Method
Integration of Blockchain and FL
Poisoning