Poisoning

Query-Efficient Black-box Adversarial Attacks Guided by a Transfer-based Prior

Authors: Yinpeng Dong, Shuyu Cheng, Tianyu Pang, Hang Su, Jun Zhu | Published: 2022-03-13
Poisoning
Optimization Methods
Deep Learning Technology

Label Leakage and Protection from Forward Embedding in Vertical Federated Learning

Authors: Jiankai Sun, Xin Yang, Yuanshun Yao, Chong Wang | Published: 2022-03-02 | Updated: 2022-05-25
Trade-off Analysis
Poisoning
Label

Transferring Adversarial Robustness Through Robust Representation Matching

Authors: Pratik Vaishnavi, Kevin Eykholt, Amir Rahmati | Published: 2022-02-21 | Updated: 2022-05-05
Poisoning
Robustness
Adaptive Adversarial Training

An Equivalence Between Data Poisoning and Byzantine Gradient Attacks

Authors: Sadegh Farhadkhani, Rachid Guerraoui, Lê-Nguyên Hoang, Oscar Villemaud | Published: 2022-02-17 | Updated: 2022-07-20
Data Contamination Detection
Poisoning
Convergence Analysis

Understanding and Improving Graph Injection Attack by Promoting Unnoticeability

Authors: Yongqiang Chen, Han Yang, Yonggang Zhang, Kaili Ma, Tongliang Liu, Bo Han, James Cheng | Published: 2022-02-16 | Updated: 2022-04-05
Poisoning
Malicious Node Injection
Defense Method

Holistic Adversarial Robustness of Deep Learning Models

Authors: Pin-Yu Chen, Sijia Liu | Published: 2022-02-15 | Updated: 2023-01-05
Poisoning
Adversarial Attack Detection
Defense Method

Improved Certified Defenses against Data Poisoning with (Deterministic) Finite Aggregation

Authors: Wenxiao Wang, Alexander Levine, Soheil Feizi | Published: 2022-02-05 | Updated: 2022-07-14
Dataset evaluation
Poisoning
Robustness Evaluation

Linear Model Against Malicious Adversaries with Local Differential Privacy

Authors: Guanhong Miao, A. Adam Ding, Samuel S. Wu | Published: 2022-02-05 | Updated: 2022-06-29
Privacy Enhancing Protocol
Poisoning
Cryptographic Protocol

Reconstructing Training Data with Informed Adversaries

Authors: Borja Balle, Giovanni Cherubin, Jamie Hayes | Published: 2022-01-13 | Updated: 2022-04-25
Data Selection Strategy
Poisoning
Reconstruction Attack

Challenges and Approaches for Mitigating Byzantine Attacks in Federated Learning

Authors: Junyu Shi, Wei Wan, Shengshan Hu, Jianrong Lu, Leo Yu Zhang | Published: 2021-12-29 | Updated: 2022-10-07
Backdoor Attack
Poisoning
Defense Method