Performance Weighting for Robust Federated Learning Against Corrupted Sources Authors: Dimitris Stripelis, Marcin Abram, Jose Luis Ambite | Published: 2022-05-02 Data Contamination DetectionPoisoningFederated Learning 2022.05.02 2025.05.28 Literature Database
Reducing the Cost of Training Security Classifier (via Optimized Semi-Supervised Learning) Authors: Rui Shu, Tianpei Xia, Huy Tu, Laurie Williams, Tim Menzies | Published: 2022-05-02 Hyperparameter OptimizationPoisoningModel Performance Evaluation 2022.05.02 2025.05.28 Literature Database
Machine Learning Security against Data Poisoning: Are We There Yet? Authors: Antonio Emanuele Cinà, Kathrin Grosse, Ambra Demontis, Battista Biggio, Fabio Roli, Marcello Pelillo | Published: 2022-04-12 | Updated: 2024-03-08 PoisoningAttack TypeDefense Method 2022.04.12 2025.05.28 Literature Database
Breaking the De-Pois Poisoning Defense Authors: Alaa Anani, Mohamed Ghanem, Lotfy Abdel Khaliq | Published: 2022-04-03 Backdoor AttackPoisoningDefense Method 2022.04.03 2025.05.28 Literature Database
Truth Serum: Poisoning Machine Learning Models to Reveal Their Secrets Authors: Florian Tramèr, Reza Shokri, Ayrton San Joaquin, Hoang Le, Matthew Jagielski, Sanghyun Hong, Nicholas Carlini | Published: 2022-03-31 | Updated: 2022-10-06 Privacy AssessmentPoisoningMembership Inference 2022.03.31 2025.05.28 Literature Database
Privacy-Preserving Aggregation in Federated Learning: A Survey Authors: Ziyao Liu, Jiale Guo, Wenzhuo Yang, Jiani Fan, Kwok-Yan Lam, Jun Zhao | Published: 2022-03-31 | Updated: 2022-07-13 Privacy Enhancing ProtocolPrivacy Enhancing TechnologyPoisoning 2022.03.31 2025.05.28 Literature Database
Semi-Targeted Model Poisoning Attack on Federated Learning via Backward Error Analysis Authors: Yuwei Sun, Hideya Ochiai, Jun Sakuma | Published: 2022-03-22 | Updated: 2022-05-10 Attack Methods against DFLPoisoningSemi-Targeted Attack 2022.03.22 2025.05.28 Literature Database
RES-HD: Resilient Intelligent Fault Diagnosis Against Adversarial Attacks Using Hyper-Dimensional Computing Authors: Onat Gungor, Tajana Rosing, Baris Aksanli | Published: 2022-03-14 PoisoningVulnerability Attack MethodDefense Method 2022.03.14 2025.05.28 Literature Database
Query-Efficient Black-box Adversarial Attacks Guided by a Transfer-based Prior Authors: Yinpeng Dong, Shuyu Cheng, Tianyu Pang, Hang Su, Jun Zhu | Published: 2022-03-13 PoisoningOptimization MethodsDeep Learning Technology 2022.03.13 2025.05.28 Literature Database
Label Leakage and Protection from Forward Embedding in Vertical Federated Learning Authors: Jiankai Sun, Xin Yang, Yuanshun Yao, Chong Wang | Published: 2022-03-02 | Updated: 2022-05-25 Trade-off AnalysisPoisoningLabel 2022.03.02 2025.05.28 Literature Database