Poisoning

RecUP-FL: Reconciling Utility and Privacy in Federated Learning via User-configurable Privacy Defense

Authors: Yue Cui, Syed Irfan Ali Meerza, Zhuohang Li, Luyang Liu, Jiaxin Zhang, Jian Liu | Published: 2023-04-11
Trade-off Analysis
Privacy Technique
Poisoning

Balancing Privacy and Performance for Private Federated Learning Algorithms

Authors: Xiangjian Hou, Sarit Khirirat, Mohammad Yaqub, Samuel Horvath | Published: 2023-04-11 | Updated: 2023-08-18
Privacy Technique
Poisoning
Optimization Methods

Protecting Federated Learning from Extreme Model Poisoning Attacks via Multidimensional Time Series Anomaly Detection

Authors: Edoardo Gabrielli, Dimitri Belli, Zoe Matrullo, Vittorio Miori, Gabriele Tolomei | Published: 2023-03-29 | Updated: 2024-12-02
Data Contamination Detection
Poisoning
Convergence Property

A Survey on Malware Detection with Graph Representation Learning

Authors: Tristan Bilot, Nour El Madhoun, Khaldoun Al Agha, Anis Zouaoui | Published: 2023-03-28 | Updated: 2023-08-17
Graph Embedding
Poisoning
Malware Classification

The Devil’s Advocate: Shattering the Illusion of Unexploitable Data using Diffusion Models

Authors: Hadi M. Dolatabadi, Sarah Erfani, Christopher Leckie | Published: 2023-03-15 | Updated: 2024-01-11
DNN IP Protection Method
Poisoning
Deep Learning Method

Exploring the Limits of Model-Targeted Indiscriminate Data Poisoning Attacks

Authors: Yiwei Lu, Gautam Kamath, Yaoliang Yu | Published: 2023-03-07 | Updated: 2023-06-06
Data Contamination Detection
Poisoning
Poisoning Attack

MultiRobustBench: Benchmarking Robustness Against Multiple Attacks

Authors: Sihui Dai, Saeed Mahloujifar, Chong Xiang, Vikash Sehwag, Pin-Yu Chen, Prateek Mittal | Published: 2023-02-21 | Updated: 2023-07-20
DNN IP Protection Method
Poisoning
Model Performance Evaluation

Poisoning Web-Scale Training Datasets is Practical

Authors: Nicholas Carlini, Matthew Jagielski, Christopher A. Choquette-Choo, Daniel Paleka, Will Pearce, Hyrum Anderson, Andreas Terzis, Kurt Thomas, Florian Tramèr | Published: 2023-02-20 | Updated: 2024-05-06
Poisoning
Attack Scenario Analysis
Adversarial attack

WW-FL: Secure and Private Large-Scale Federated Learning

Authors: Felix Marx, Thomas Schneider, Ajith Suresh, Tobias Wehrle, Christian Weinert, Hossein Yalame | Published: 2023-02-20 | Updated: 2025-10-14
Trigger Detection
Privacy Enhancing Technology
Poisoning

Continuous Learning for Android Malware Detection

Authors: Yizheng Chen, Zhoujie Ding, David Wagner | Published: 2023-02-08 | Updated: 2023-06-14
Online Learning
Poisoning
Model Performance Evaluation