Poisoning

Reducing Certified Regression to Certified Classification for General Poisoning Attacks

Authors: Zayd Hammoudeh, Daniel Lowd | Published: 2022-08-29 | Updated: 2022-12-29
Poisoning
Model Architecture
Robust Regression

Membership-Doctor: Comprehensive Assessment of Membership Inference Against Machine Learning Models

Authors: Xinlei He, Zheng Li, Weilin Xu, Cory Cornelius, Yang Zhang | Published: 2022-08-22
Poisoning
Membership Inference
Membership Disclosure Risk

Fed-FSNet: Mitigating Non-I.I.D. Federated Learning via Fuzzy Synthesizing Network

Authors: Jingcai Guo, Song Guo, Jie Zhang, Ziming Liu | Published: 2022-08-21 | Updated: 2023-04-25
Poisoning
Efficiency of Distributed Learning
Machine Learning Technology

Byzantines can also Learn from History: Fall of Centered Clipping in Federated Learning

Authors: Kerem Ozfatura, Emre Ozfatura, Alptekin Kupcu, Deniz Gunduz | Published: 2022-08-21 | Updated: 2024-01-01
Byzantine Resilience
Poisoning
Attack Detection

Label Flipping Data Poisoning Attack Against Wearable Human Activity Recognition System

Authors: Abdur R. Shahid, Ahmed Imteaj, Peter Y. Wu, Diane A. Igoche, Tauhidul Alam | Published: 2022-08-17
Data Protection Method
Poisoning
Attack Detection

FedPerm: Private and Robust Federated Learning by Parameter Permutation

Authors: Hamid Mozaffari, Virendra J. Marathe, Dave Dice | Published: 2022-08-16
Privacy Risk Management
Poisoning
Communication Efficiency

Shielding Federated Learning Systems against Inference Attacks with ARM TrustZone

Authors: Aghiles Ait Messaoud, Sonia Ben Mokhtar, Vlad Nitu, Valerio Schiavoni | Published: 2022-08-11 | Updated: 2022-10-15
Client-Side Defense
Poisoning
Attack Method

Privacy and Transparency in Graph Machine Learning: A Unified Perspective

Authors: Megha Khosla | Published: 2022-07-22 | Updated: 2022-10-19
Explainability of Graph Machine Learning
Privacy Classification
Poisoning

Careful What You Wish For: on the Extraction of Adversarially Trained Models

Authors: Kacem Khaled, Gabriela Nicolescu, Felipe Gohring de Magalhães | Published: 2022-07-21
Poisoning
Attack Method
Adversarial Example

MUD-PQFed: Towards Malicious User Detection in Privacy-Preserving Quantized Federated Learning

Authors: Hua Ma, Qun Li, Yifeng Zheng, Zhi Zhang, Xiaoning Liu, Yansong Gao, Said F. Al-Sarawi, Derek Abbott | Published: 2022-07-19
Attack Methods against DFL
Privacy Enhancing Technology
Poisoning