Data Taggants: Dataset Ownership Verification via Harmless Targeted Data Poisoning Authors: Wassim Bouaziz, El-Mahdi El-Mhamdi, Nicolas Usunier | Published: 2024-10-09 Poisoning 2024.10.09 2025.05.27 Literature Database
CAT: Concept-level backdoor ATtacks for Concept Bottleneck Models Authors: Songning Lai, Jiayu Yang, Yu Huang, Lijie Hu, Tianlang Xue, Zhangyi Hu, Jiaxu Li, Haicheng Liao, Yutao Yue | Published: 2024-10-07 Backdoor AttackPoisoning 2024.10.07 2025.05.27 Literature Database
Federated Learning Nodes Can Reconstruct Peers’ Image Data Authors: Ethan Wilson, Kai Yue, Chau-Wai Wong, Huaiyu Dai | Published: 2024-10-07 Privacy ProtectionPoisoning 2024.10.07 2025.05.27 Literature Database
Empirical Perturbation Analysis of Linear System Solvers from a Data Poisoning Perspective Authors: Yixin Liu, Arielle Carr, Lichao Sun | Published: 2024-10-01 Backdoor AttackPoisoningLinear Solver 2024.10.01 2025.05.27 Literature Database
Timber! Poisoning Decision Trees Authors: Stefano Calzavara, Lorenzo Cazzaro, Massimo Vettori | Published: 2024-10-01 Backdoor AttackPoisoning 2024.10.01 2025.05.27 Literature Database
The poison of dimensionality Authors: Lê-Nguyên Hoang | Published: 2024-09-25 PoisoningModel Performance EvaluationLoss Function 2024.09.25 2025.05.27 Literature Database
SDBA: A Stealthy and Long-Lasting Durable Backdoor Attack in Federated Learning Authors: Minyeong Choe, Cheolhee Park, Changho Seo, Hyunil Kim | Published: 2024-09-23 | Updated: 2025-07-30 Backdoor AttackPoisoningWatermark Robustness 2024.09.23 2025.08.01 Literature Database
MalMixer: Few-Shot Malware Classification with Retrieval-Augmented Semi-Supervised Learning Authors: Jiliang Li, Yifan Zhang, Yu Huang, Kevin Leach | Published: 2024-09-20 | Updated: 2025-04-17 Data Augmentation MethodPoisoningMalware Detection with Limited Samples 2024.09.20 2025.05.27 Literature Database
Federated Learning for Smart Grid: A Survey on Applications and Potential Vulnerabilities Authors: Zikai Zhang, Suman Rath, Jiaohao Xu, Tingsong Xiao | Published: 2024-09-16 Energy ManagementPrivacy ProtectionPoisoning 2024.09.16 2025.05.27 Literature Database
On the Vulnerability of Applying Retrieval-Augmented Generation within Knowledge-Intensive Application Domains Authors: Xun Xian, Ganghua Wang, Xuan Bi, Jayanth Srinivasa, Ashish Kundu, Charles Fleming, Mingyi Hong, Jie Ding | Published: 2024-09-12 RAGPoisoning 2024.09.12 2025.05.27 Literature Database