Holistic Adversarial Robustness of Deep Learning Models Authors: Pin-Yu Chen, Sijia Liu | Published: 2022-02-15 | Updated: 2023-01-05 PoisoningAdversarial Attack DetectionDefense Method 2022.02.15 2025.05.28 Literature Database
Improved Certified Defenses against Data Poisoning with (Deterministic) Finite Aggregation Authors: Wenxiao Wang, Alexander Levine, Soheil Feizi | Published: 2022-02-05 | Updated: 2022-07-14 Dataset evaluationPoisoningRobustness Evaluation 2022.02.05 2025.05.28 Literature Database
Linear Model Against Malicious Adversaries with Local Differential Privacy Authors: Guanhong Miao, A. Adam Ding, Samuel S. Wu | Published: 2022-02-05 | Updated: 2022-06-29 Privacy Enhancing ProtocolPoisoningCryptographic Protocol 2022.02.05 2025.05.28 Literature Database
Reconstructing Training Data with Informed Adversaries Authors: Borja Balle, Giovanni Cherubin, Jamie Hayes | Published: 2022-01-13 | Updated: 2022-04-25 Data Selection StrategyPoisoningReconstruction Attack 2022.01.13 2025.05.28 Literature Database
Challenges and Approaches for Mitigating Byzantine Attacks in Federated Learning Authors: Junyu Shi, Wei Wan, Shengshan Hu, Jianrong Lu, Leo Yu Zhang | Published: 2021-12-29 | Updated: 2022-10-07 Backdoor AttackPoisoningDefense Method 2021.12.29 2025.05.28 Literature Database
Detect & Reject for Transferability of Black-box Adversarial Attacks Against Network Intrusion Detection Systems Authors: Islam Debicha, Thibault Debatty, Jean-Michel Dricot, Wim Mees, Tayeb Kenaza | Published: 2021-12-22 PoisoningAdversarial LearningDefense Method 2021.12.22 2025.05.28 Literature Database
Distributed Machine Learning and the Semblance of Trust Authors: Dmitrii Usynin, Alexander Ziller, Daniel Rueckert, Jonathan Passerat-Palmbach, Georgios Kaissis | Published: 2021-12-21 Data Management SystemPrivacy ViolationPoisoning 2021.12.21 2025.05.28 Literature Database
Robust and Privacy-Preserving Collaborative Learning: A Comprehensive Survey Authors: Shangwei Guo, Xu Zhang, Fei Yang, Tianwei Zhang, Yan Gan, Tao Xiang, Yang Liu | Published: 2021-12-19 Backdoor AttackPrivacy Risk ManagementPoisoning 2021.12.19 2025.05.28 Literature Database
Robustifying automatic speech recognition by extracting slowly varying features Authors: Matías Pizarro, Dorothea Kolossa, Asja Fischer | Published: 2021-12-14 | Updated: 2024-11-06 PoisoningAdversarial TrainingDefense Method 2021.12.14 2025.05.28 Literature Database
On the Security & Privacy in Federated Learning Authors: Gorka Abad, Stjepan Picek, Víctor Julio Ramírez-Durán, Aitor Urbieta | Published: 2021-12-10 | Updated: 2022-03-16 Backdoor AttackPoisoningDefense Method 2021.12.10 2025.05.28 Literature Database