Poisoning

Synthetic flow-based cryptomining attack generation through Generative Adversarial Networks

Authors: Alberto Mozo, Ángel González-Prieto, Antonio Pastor, Sandra Gómez-Canaval, Edgar Talavera | Published: 2021-07-30
Data Generation
Poisoning
Machine Learning Algorithm

PDF-Malware: An Overview on Threats, Detection and Evasion Attacks

Authors: Nicolas Fleury, Theo Dubrunquez, Ihsen Alouani | Published: 2021-07-27
Overview of PDF Format
Poisoning
Malware Detection

LEGATO: A LayerwisE Gradient AggregaTiOn Algorithm for Mitigating Byzantine Attacks in Federated Learning

Authors: Kamala Varma, Yi Zhou, Nathalie Baracaldo, Ali Anwar | Published: 2021-07-26
Poisoning
Attackers and Malicious Devices
Federated Learning

Generative Models for Security: Attacks, Defenses, and Opportunities

Authors: Luke A. Bauer, Vincent Bindschaedler | Published: 2021-07-21 | Updated: 2021-07-29
Poisoning
Attack Method
Generative Model

Understanding the Security of Deepfake Detection

Authors: Xiaoyu Cao, Neil Zhenqiang Gong | Published: 2021-07-05 | Updated: 2021-10-06
Poisoning
Deep Learning Technology
Face Recognition System

Federated Robustness Propagation: Sharing Robustness in Heterogeneous Federated Learning

Authors: Junyuan Hong, Haotao Wang, Zhangyang Wang, Jiayu Zhou | Published: 2021-06-18 | Updated: 2022-07-07
Poisoning
Federated Learning
Adaptive Adversarial Training

Sleeper Agent: Scalable Hidden Trigger Backdoors for Neural Networks Trained from Scratch

Authors: Hossein Souri, Liam Fowl, Rama Chellappa, Micah Goldblum, Tom Goldstein | Published: 2021-06-16 | Updated: 2022-10-13
Backdoor Attack
Poisoning
Machine Learning

Gradient-based Data Subversion Attack Against Binary Classifiers

Authors: Rosni K Vasu, Sanjay Seetharaman, Shubham Malaviya, Manish Shukla, Sachin Lodha | Published: 2021-05-31
Data Contamination Detection
Poisoning
Optimization Methods

Evaluating Resilience of Encrypted Traffic Classification Against Adversarial Evasion Attacks

Authors: Ramy Maarouf, Danish Sattar, Ashraf Matrawy | Published: 2021-05-30
Poisoning
Adversarial attack
Vulnerability Assessment Method

Rethinking Noisy Label Models: Labeler-Dependent Noise with Adversarial Awareness

Authors: Glenn Dawson, Robi Polikar | Published: 2021-05-28 | Updated: 2021-06-05
Poisoning
Label Uncertainty
Adversarial Training