Federated Robustness Propagation: Sharing Robustness in Heterogeneous Federated Learning Authors: Junyuan Hong, Haotao Wang, Zhangyang Wang, Jiayu Zhou | Published: 2021-06-18 | Updated: 2022-07-07 PoisoningFederated LearningAdaptive Adversarial Training 2021.06.18 2025.05.28 Literature Database
Sleeper Agent: Scalable Hidden Trigger Backdoors for Neural Networks Trained from Scratch Authors: Hossein Souri, Liam Fowl, Rama Chellappa, Micah Goldblum, Tom Goldstein | Published: 2021-06-16 | Updated: 2022-10-13 Backdoor AttackPoisoningMachine Learning 2021.06.16 2025.05.28 Literature Database
Gradient-based Data Subversion Attack Against Binary Classifiers Authors: Rosni K Vasu, Sanjay Seetharaman, Shubham Malaviya, Manish Shukla, Sachin Lodha | Published: 2021-05-31 Data Contamination DetectionPoisoningOptimization Methods 2021.05.31 2025.05.28 Literature Database
Evaluating Resilience of Encrypted Traffic Classification Against Adversarial Evasion Attacks Authors: Ramy Maarouf, Danish Sattar, Ashraf Matrawy | Published: 2021-05-30 PoisoningAdversarial attackVulnerability Assessment Method 2021.05.30 2025.05.28 Literature Database
Rethinking Noisy Label Models: Labeler-Dependent Noise with Adversarial Awareness Authors: Glenn Dawson, Robi Polikar | Published: 2021-05-28 | Updated: 2021-06-05 PoisoningLabel UncertaintyAdversarial Training 2021.05.28 2025.05.28 Literature Database
Fooling Partial Dependence via Data Poisoning Authors: Hubert Baniecki, Wojciech Kretowicz, Przemyslaw Biecek | Published: 2021-05-26 | Updated: 2022-07-10 Data Contamination DetectionPoisoningVulnerability Assessment Method 2021.05.26 2025.05.28 Literature Database
Regularization Can Help Mitigate Poisoning Attacks… with the Right Hyperparameters Authors: Javier Carnerero-Cano, Luis Muñoz-González, Phillippa Spencer, Emil C. Lupu | Published: 2021-05-23 PoisoningOptimization MethodsVulnerability Assessment Method 2021.05.23 2025.05.28 Literature Database
Preventing Machine Learning Poisoning Attacks Using Authentication and Provenance Authors: Jack W. Stokes, Paul England, Kevin Kane | Published: 2021-05-20 WatermarkingData Origins and EvolutionPoisoning 2021.05.20 2025.05.28 Literature Database
Privacy Inference Attacks and Defenses in Cloud-based Deep Neural Network: A Survey Authors: Xiaoyu Zhang, Chao Chen, Yi Xie, Xiaofeng Chen, Jun Zhang, Yang Xiang | Published: 2021-05-13 Privacy Protection MechanismPoisoningMembership Inference 2021.05.13 2025.05.28 Literature Database
Mental Models of Adversarial Machine Learning Authors: Lukas Bieringer, Kathrin Grosse, Michael Backes, Battista Biggio, Katharina Krombholz | Published: 2021-05-08 | Updated: 2022-06-29 PoisoningMental ModelAdversarial Example 2021.05.08 2025.05.28 Literature Database