Poisoning

Ares: A System-Oriented Wargame Framework for Adversarial ML

Authors: Farhan Ahmed, Pratik Vaishnavi, Kevin Eykholt, Amir Rahmati | Published: 2022-10-24
Poisoning
Reward Mechanism Design
Evaluation Method

New data poison attacks on machine learning classifiers for mobile exfiltration

Authors: Miguel A. Ramirez, Sangyoung Yoon, Ernesto Damiani, Hussam Al Hamadi, Claudio Agostino Ardagna, Nicola Bena, Young-Ji Byon, Tae-Yeon Kim, Chung-Suk Cho, Chan Yeob Yeun | Published: 2022-10-20
Backdoor Attack
Poisoning
Adversarial Attack Methods

How Does a Deep Learning Model Architecture Impact Its Privacy? A Comprehensive Study of Privacy Attacks on CNNs and Transformers

Authors: Guangsheng Zhang, Bo Liu, Huan Tian, Tianqing Zhu, Ming Ding, Wanlei Zhou | Published: 2022-10-20 | Updated: 2024-02-02
Privacy Risk Management
Poisoning
Membership Inference

MaSS: Multi-attribute Selective Suppression

Authors: Chun-Fu Chen, Shaohan Hu, Zhonghao Shi, Prateek Gulati, Bill Moriarty, Marco Pistoia, Vincenzo Piuri, Pierangela Samarati | Published: 2022-10-18 | Updated: 2022-10-24
Data Privacy Assessment
Poisoning
Performance Evaluation

Federated Learning with Privacy-Preserving Ensemble Attention Distillation

Authors: Xuan Gong, Liangchen Song, Rishi Vedula, Abhishek Sharma, Meng Zheng, Benjamin Planche, Arun Innanje, Terrence Chen, Junsong Yuan, David Doermann, Ziyan Wu | Published: 2022-10-16
Privacy Risk Management
Poisoning
Performance Evaluation

Federated Learning for Tabular Data: Exploring Potential Risk to Privacy

Authors: Han Wu, Zilong Zhao, Lydia Y. Chen, Aad van Moorsel | Published: 2022-10-13
Privacy Risk Management
Poisoning
Generative Adversarial Network

Boosting Adversarial Robustness From The Perspective of Effective Margin Regularization

Authors: Ziquan Liu, Antoni B. Chan | Published: 2022-10-11
Poisoning
Performance Evaluation Metrics
Adversarial attack

DReS-FL: Dropout-Resilient Secure Federated Learning for Non-IID Clients via Secret Data Sharing

Authors: Jiawei Shao, Yuchang Sun, Songze Li, Jun Zhang | Published: 2022-10-06
Privacy Protection Method
Framework
Poisoning

On the Robustness of Deep Clustering Models: Adversarial Attacks and Defenses

Authors: Anshuman Chhabra, Ashwin Sekhari, Prasant Mohapatra | Published: 2022-10-04
Clustering methods
Poisoning
Attack Method

Blockchain-based Monitoring for Poison Attack Detection in Decentralized Federated Learning

Authors: Ranwa Al Mallah, David Lopez | Published: 2022-09-30
Blockchain Economics
Poisoning
Efficiency of Distributed Learning