Poisoning

Breaking the De-Pois Poisoning Defense

Authors: Alaa Anani, Mohamed Ghanem, Lotfy Abdel Khaliq | Published: 2022-04-03
Backdoor Attack
Poisoning
Defense Method

Truth Serum: Poisoning Machine Learning Models to Reveal Their Secrets

Authors: Florian Tramèr, Reza Shokri, Ayrton San Joaquin, Hoang Le, Matthew Jagielski, Sanghyun Hong, Nicholas Carlini | Published: 2022-03-31 | Updated: 2022-10-06
Privacy Assessment
Poisoning
Membership Inference

Privacy-Preserving Aggregation in Federated Learning: A Survey

Authors: Ziyao Liu, Jiale Guo, Wenzhuo Yang, Jiani Fan, Kwok-Yan Lam, Jun Zhao | Published: 2022-03-31 | Updated: 2022-07-13
Privacy Enhancing Protocol
Privacy Enhancing Technology
Poisoning

Semi-Targeted Model Poisoning Attack on Federated Learning via Backward Error Analysis

Authors: Yuwei Sun, Hideya Ochiai, Jun Sakuma | Published: 2022-03-22 | Updated: 2022-05-10
Attack Methods against DFL
Poisoning
Semi-Targeted Attack

RES-HD: Resilient Intelligent Fault Diagnosis Against Adversarial Attacks Using Hyper-Dimensional Computing

Authors: Onat Gungor, Tajana Rosing, Baris Aksanli | Published: 2022-03-14
Poisoning
Vulnerability Attack Method
Defense Method

Query-Efficient Black-box Adversarial Attacks Guided by a Transfer-based Prior

Authors: Yinpeng Dong, Shuyu Cheng, Tianyu Pang, Hang Su, Jun Zhu | Published: 2022-03-13
Poisoning
Optimization Methods
Deep Learning Technology

Label Leakage and Protection from Forward Embedding in Vertical Federated Learning

Authors: Jiankai Sun, Xin Yang, Yuanshun Yao, Chong Wang | Published: 2022-03-02 | Updated: 2022-05-25
Trade-off Analysis
Poisoning
Label

Transferring Adversarial Robustness Through Robust Representation Matching

Authors: Pratik Vaishnavi, Kevin Eykholt, Amir Rahmati | Published: 2022-02-21 | Updated: 2022-05-05
Poisoning
Robustness
Adaptive Adversarial Training

An Equivalence Between Data Poisoning and Byzantine Gradient Attacks

Authors: Sadegh Farhadkhani, Rachid Guerraoui, Lê-Nguyên Hoang, Oscar Villemaud | Published: 2022-02-17 | Updated: 2022-07-20
Data Contamination Detection
Poisoning
Convergence Analysis

Understanding and Improving Graph Injection Attack by Promoting Unnoticeability

Authors: Yongqiang Chen, Han Yang, Yonggang Zhang, Kaili Ma, Tongliang Liu, Bo Han, James Cheng | Published: 2022-02-16 | Updated: 2022-04-05
Poisoning
Malicious Node Injection
Defense Method