Synthetic flow-based cryptomining attack generation through Generative Adversarial Networks Authors: Alberto Mozo, Ángel González-Prieto, Antonio Pastor, Sandra Gómez-Canaval, Edgar Talavera | Published: 2021-07-30 Data GenerationPoisoningMachine Learning Algorithm 2021.07.30 2025.05.28 Literature Database
PDF-Malware: An Overview on Threats, Detection and Evasion Attacks Authors: Nicolas Fleury, Theo Dubrunquez, Ihsen Alouani | Published: 2021-07-27 Overview of PDF FormatPoisoningMalware Detection 2021.07.27 2025.05.28 Literature Database
LEGATO: A LayerwisE Gradient AggregaTiOn Algorithm for Mitigating Byzantine Attacks in Federated Learning Authors: Kamala Varma, Yi Zhou, Nathalie Baracaldo, Ali Anwar | Published: 2021-07-26 PoisoningAttackers and Malicious DevicesFederated Learning 2021.07.26 2025.05.28 Literature Database
Generative Models for Security: Attacks, Defenses, and Opportunities Authors: Luke A. Bauer, Vincent Bindschaedler | Published: 2021-07-21 | Updated: 2021-07-29 PoisoningAttack MethodGenerative Model 2021.07.21 2025.05.28 Literature Database
Understanding the Security of Deepfake Detection Authors: Xiaoyu Cao, Neil Zhenqiang Gong | Published: 2021-07-05 | Updated: 2021-10-06 PoisoningDeep Learning TechnologyFace Recognition System 2021.07.05 2025.05.28 Literature Database
Federated Robustness Propagation: Sharing Robustness in Heterogeneous Federated Learning Authors: Junyuan Hong, Haotao Wang, Zhangyang Wang, Jiayu Zhou | Published: 2021-06-18 | Updated: 2022-07-07 PoisoningFederated LearningAdaptive Adversarial Training 2021.06.18 2025.05.28 Literature Database
Sleeper Agent: Scalable Hidden Trigger Backdoors for Neural Networks Trained from Scratch Authors: Hossein Souri, Liam Fowl, Rama Chellappa, Micah Goldblum, Tom Goldstein | Published: 2021-06-16 | Updated: 2022-10-13 Backdoor AttackPoisoningMachine Learning 2021.06.16 2025.05.28 Literature Database
Gradient-based Data Subversion Attack Against Binary Classifiers Authors: Rosni K Vasu, Sanjay Seetharaman, Shubham Malaviya, Manish Shukla, Sachin Lodha | Published: 2021-05-31 Data Contamination DetectionPoisoningOptimization Methods 2021.05.31 2025.05.28 Literature Database
Evaluating Resilience of Encrypted Traffic Classification Against Adversarial Evasion Attacks Authors: Ramy Maarouf, Danish Sattar, Ashraf Matrawy | Published: 2021-05-30 PoisoningAdversarial attackVulnerability Assessment Method 2021.05.30 2025.05.28 Literature Database
Rethinking Noisy Label Models: Labeler-Dependent Noise with Adversarial Awareness Authors: Glenn Dawson, Robi Polikar | Published: 2021-05-28 | Updated: 2021-06-05 PoisoningLabel UncertaintyAdversarial Training 2021.05.28 2025.05.28 Literature Database