Poisoning

TrojanPuzzle: Covertly Poisoning Code-Suggestion Models

Authors: Hojjat Aghakhani, Wei Dai, Andre Manoel, Xavier Fernandes, Anant Kharkar, Christopher Kruegel, Giovanni Vigna, David Evans, Ben Zorn, Robert Sim | Published: 2023-01-06 | Updated: 2024-01-24
Backdoor Attack
Poisoning
Attack Method

Backdoor Attacks Against Dataset Distillation

Authors: Yugeng Liu, Zheng Li, Michael Backes, Yun Shen, Yang Zhang | Published: 2023-01-03
DNN IP Protection Method
Backdoor Attack
Poisoning

Analysis of Label-Flip Poisoning Attack on Machine Learning Based Malware Detector

Authors: Kshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam | Published: 2023-01-03
Backdoor Attack
Poisoning
Performance Evaluation

Learned Systems Security

Authors: Roei Schuster, Jin Peng Zhou, Thorsten Eisenhofer, Paul Grubbs, Nicolas Papernot | Published: 2022-12-20 | Updated: 2023-01-10
Backdoor Attack
Privacy Enhancing Technology
Poisoning

Amplifying Membership Exposure via Data Poisoning

Authors: Yufei Chen, Chao Shen, Yun Shen, Cong Wang, Yang Zhang | Published: 2022-11-01
Poisoning
Membership Inference
Membership Disclosure Risk

Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning

Authors: Ying Yuan, Giovanni Apruzzese, Mauro Conti | Published: 2022-10-24 | Updated: 2023-10-12
Poisoning
Malicious Website Detection
Attack Scenario Analysis

Ares: A System-Oriented Wargame Framework for Adversarial ML

Authors: Farhan Ahmed, Pratik Vaishnavi, Kevin Eykholt, Amir Rahmati | Published: 2022-10-24
Poisoning
Reward Mechanism Design
Evaluation Method

New data poison attacks on machine learning classifiers for mobile exfiltration

Authors: Miguel A. Ramirez, Sangyoung Yoon, Ernesto Damiani, Hussam Al Hamadi, Claudio Agostino Ardagna, Nicola Bena, Young-Ji Byon, Tae-Yeon Kim, Chung-Suk Cho, Chan Yeob Yeun | Published: 2022-10-20
Backdoor Attack
Poisoning
Adversarial Attack Methods

How Does a Deep Learning Model Architecture Impact Its Privacy? A Comprehensive Study of Privacy Attacks on CNNs and Transformers

Authors: Guangsheng Zhang, Bo Liu, Huan Tian, Tianqing Zhu, Ming Ding, Wanlei Zhou | Published: 2022-10-20 | Updated: 2024-02-02
Privacy Risk Management
Poisoning
Membership Inference

MaSS: Multi-attribute Selective Suppression

Authors: Chun-Fu Chen, Shaohan Hu, Zhonghao Shi, Prateek Gulati, Bill Moriarty, Marco Pistoia, Vincenzo Piuri, Pierangela Samarati | Published: 2022-10-18 | Updated: 2022-10-24
Data Privacy Assessment
Poisoning
Performance Evaluation