Poisoning

Gradient-based Data Subversion Attack Against Binary Classifiers

Authors: Rosni K Vasu, Sanjay Seetharaman, Shubham Malaviya, Manish Shukla, Sachin Lodha | Published: 2021-05-31
Data Contamination Detection
Poisoning
Optimization Methods

Evaluating Resilience of Encrypted Traffic Classification Against Adversarial Evasion Attacks

Authors: Ramy Maarouf, Danish Sattar, Ashraf Matrawy | Published: 2021-05-30
Poisoning
Adversarial attack
Vulnerability Assessment Method

Rethinking Noisy Label Models: Labeler-Dependent Noise with Adversarial Awareness

Authors: Glenn Dawson, Robi Polikar | Published: 2021-05-28 | Updated: 2021-06-05
Poisoning
Label Uncertainty
Adversarial Training

Fooling Partial Dependence via Data Poisoning

Authors: Hubert Baniecki, Wojciech Kretowicz, Przemyslaw Biecek | Published: 2021-05-26 | Updated: 2022-07-10
Data Contamination Detection
Poisoning
Vulnerability Assessment Method

Regularization Can Help Mitigate Poisoning Attacks… with the Right Hyperparameters

Authors: Javier Carnerero-Cano, Luis Muñoz-González, Phillippa Spencer, Emil C. Lupu | Published: 2021-05-23
Poisoning
Optimization Methods
Vulnerability Assessment Method

Preventing Machine Learning Poisoning Attacks Using Authentication and Provenance

Authors: Jack W. Stokes, Paul England, Kevin Kane | Published: 2021-05-20
Watermarking
Data Origins and Evolution
Poisoning

Privacy Inference Attacks and Defenses in Cloud-based Deep Neural Network: A Survey

Authors: Xiaoyu Zhang, Chao Chen, Yi Xie, Xiaofeng Chen, Jun Zhang, Yang Xiang | Published: 2021-05-13
Privacy Protection Mechanism
Poisoning
Membership Inference

Mental Models of Adversarial Machine Learning

Authors: Lukas Bieringer, Kathrin Grosse, Michael Backes, Battista Biggio, Katharina Krombholz | Published: 2021-05-08 | Updated: 2022-06-29
Poisoning
Mental Model
Adversarial Example

Incompatibility Clustering as a Defense Against Backdoor Poisoning Attacks

Authors: Charles Jin, Melinda Sun, Martin Rinard | Published: 2021-05-08 | Updated: 2023-04-27
Poisoning
Adversarial attack
Defense Mechanism

De-Pois: An Attack-Agnostic Defense against Data Poisoning Attacks

Authors: Jian Chen, Xuxin Zhang, Rui Zhang, Chen Wang, Ling Liu | Published: 2021-05-08
Poisoning
Content Specialized for Toxicity Attacks
Challenges of Generative Models