Query-Efficient Black-box Adversarial Attacks Guided by a Transfer-based Prior Authors: Yinpeng Dong, Shuyu Cheng, Tianyu Pang, Hang Su, Jun Zhu | Published: 2022-03-13 PoisoningOptimization MethodsDeep Learning Technology 2022.03.13 2025.05.28 Literature Database
Label Leakage and Protection from Forward Embedding in Vertical Federated Learning Authors: Jiankai Sun, Xin Yang, Yuanshun Yao, Chong Wang | Published: 2022-03-02 | Updated: 2022-05-25 Trade-off AnalysisPoisoningLabel 2022.03.02 2025.05.28 Literature Database
Transferring Adversarial Robustness Through Robust Representation Matching Authors: Pratik Vaishnavi, Kevin Eykholt, Amir Rahmati | Published: 2022-02-21 | Updated: 2022-05-05 PoisoningRobustnessAdaptive Adversarial Training 2022.02.21 2025.05.28 Literature Database
An Equivalence Between Data Poisoning and Byzantine Gradient Attacks Authors: Sadegh Farhadkhani, Rachid Guerraoui, Lê-Nguyên Hoang, Oscar Villemaud | Published: 2022-02-17 | Updated: 2022-07-20 Data Contamination DetectionPoisoningConvergence Analysis 2022.02.17 2025.05.28 Literature Database
Understanding and Improving Graph Injection Attack by Promoting Unnoticeability Authors: Yongqiang Chen, Han Yang, Yonggang Zhang, Kaili Ma, Tongliang Liu, Bo Han, James Cheng | Published: 2022-02-16 | Updated: 2022-04-05 PoisoningMalicious Node InjectionDefense Method 2022.02.16 2025.05.28 Literature Database
Holistic Adversarial Robustness of Deep Learning Models Authors: Pin-Yu Chen, Sijia Liu | Published: 2022-02-15 | Updated: 2023-01-05 PoisoningAdversarial Attack DetectionDefense Method 2022.02.15 2025.05.28 Literature Database
Improved Certified Defenses against Data Poisoning with (Deterministic) Finite Aggregation Authors: Wenxiao Wang, Alexander Levine, Soheil Feizi | Published: 2022-02-05 | Updated: 2022-07-14 Dataset evaluationPoisoningRobustness Evaluation 2022.02.05 2025.05.28 Literature Database
Linear Model Against Malicious Adversaries with Local Differential Privacy Authors: Guanhong Miao, A. Adam Ding, Samuel S. Wu | Published: 2022-02-05 | Updated: 2022-06-29 Privacy Enhancing ProtocolPoisoningCryptographic Protocol 2022.02.05 2025.05.28 Literature Database
Reconstructing Training Data with Informed Adversaries Authors: Borja Balle, Giovanni Cherubin, Jamie Hayes | Published: 2022-01-13 | Updated: 2022-04-25 Data Selection StrategyPoisoningReconstruction Attack 2022.01.13 2025.05.28 Literature Database
Challenges and Approaches for Mitigating Byzantine Attacks in Federated Learning Authors: Junyu Shi, Wei Wan, Shengshan Hu, Jianrong Lu, Leo Yu Zhang | Published: 2021-12-29 | Updated: 2022-10-07 Backdoor AttackPoisoningDefense Method 2021.12.29 2025.05.28 Literature Database