Poisoning

Breaking Speaker Recognition with PaddingBack

Authors: Zhe Ye, Diqun Yan, Li Dong, Kailai Shen | Published: 2023-08-08 | Updated: 2024-03-11
Watermarking
Backdoor Attack
Poisoning

When Federated Learning meets Watermarking: A Comprehensive Overview of Techniques for Intellectual Property Protection

Authors: Mohammed Lansari, Reda Bellafqira, Katarzyna Kapusta, Vincent Thouvenot, Olivier Bettan, Gouenou Coatrieux | Published: 2023-08-07
Watermarking
Data Protection Method
Poisoning

Label Inference Attacks against Node-level Vertical Federated GNNs

Authors: Marco Arazzi, Mauro Conti, Stefanos Koffas, Marina Krcek, Antonino Nocera, Stjepan Picek, Jing Xu | Published: 2023-08-04 | Updated: 2024-04-18
Poisoning
Adversarial Attack Methods
Federated Learning

ParaFuzz: An Interpretability-Driven Technique for Detecting Poisoned Samples in NLP

Authors: Lu Yan, Zhuo Zhang, Guanhong Tao, Kaiyuan Zhang, Xuan Chen, Guangyu Shen, Xiangyu Zhang | Published: 2023-08-04 | Updated: 2023-10-27
Fuzzing
Poisoning
Physical layer security

Security and Privacy Issues of Federated Learning

Authors: Jahid Hasan | Published: 2023-07-22
Poisoning
Membership Inference
Federated Learning

Mitigating Communications Threats in Decentralized Federated Learning through Moving Target Defense

Authors: Enrique Tomás Martínez Beltrán, Pedro Miguel Sánchez Sánchez, Sergio López Bernal, Gérôme Bovet, Manuel Gil Pérez, Gregorio Martínez Pérez, Alberto Huertas Celdrán | Published: 2023-07-21 | Updated: 2023-12-09
Secure Communication Channel
Poisoning
Threat modeling

Rethinking Backdoor Attacks

Authors: Alaa Khaddaj, Guillaume Leclerc, Aleksandar Makelov, Kristian Georgiev, Hadi Salman, Andrew Ilyas, Aleksander Madry | Published: 2023-07-19
Data Obfuscation
Backdoor Attack
Poisoning

Defending Against Poisoning Attacks in Federated Learning with Blockchain

Authors: Nanqing Dong, Zhipeng Wang, Jiahao Sun, Michael Kampffmeyer, William Knottenbelt, Eric Xing | Published: 2023-07-02 | Updated: 2024-03-12
Poisoning
Voting Mechanism
Federated Learning

On the Exploitability of Instruction Tuning

Authors: Manli Shu, Jiongxiao Wang, Chen Zhu, Jonas Geiping, Chaowei Xiao, Tom Goldstein | Published: 2023-06-28 | Updated: 2023-10-28
Prompt Injection
Poisoning
Adversarial Attack Detection

Towards Sybil Resilience in Decentralized Learning

Authors: Thomas Werthenbach, Johan Pouwelse | Published: 2023-06-26
Poisoning
Poisoning Attack
Federated Learning