Defending Regression Learners Against Poisoning Attacks Authors: Sandamal Weerasinghe, Sarah M. Erfani, Tansu Alpcan, Christopher Leckie, Justin Kopacz | Published: 2020-08-21 Backdoor AttackPoisoningContent Specialized for Toxicity Attacks 2020.08.21 2025.05.28 Literature Database
Toward Smart Security Enhancement of Federated Learning Networks Authors: Junjie Tan, Ying-Chang Liang, Nguyen Cong Luong, Dusit Niyato | Published: 2020-08-19 PoisoningPoisoning AttackFederated Learning 2020.08.19 2025.05.28 Literature Database
WAFFLE: Watermarking in Federated Learning Authors: Buse Gul Atli, Yuxi Xia, Samuel Marchal, N. Asokan | Published: 2020-08-17 | Updated: 2021-07-22 WatermarkingPoisoningMachine Learning Application 2020.08.17 2025.05.28 Literature Database
Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection Authors: Luca Demetrio, Scott E. Coull, Battista Biggio, Giovanni Lagorio, Alessandro Armando, Fabio Roli | Published: 2020-08-17 | Updated: 2021-03-22 PoisoningMalware EvolutionMembership Inference 2020.08.17 2025.05.28 Literature Database
Can We Trust Your Explanations? Sanity Checks for Interpreters in Android Malware Analysis Authors: Ming Fan, Wenying Wei, Xiaofei Xie, Yang Liu, Xiaohong Guan, Ting Liu | Published: 2020-08-13 PoisoningEvaluation of Explanatory Approaches 2020.08.13 2025.05.28 Literature Database
WAFFLe: Weight Anonymized Factorization for Federated Learning Authors: Weituo Hao, Nikhil Mehta, Kevin J Liang, Pengyu Cheng, Mostafa El-Khamy, Lawrence Carin | Published: 2020-08-13 PoisoningPersonalization MethodMachine Learning Method 2020.08.13 2025.05.28 Literature Database
Robust Deep Reinforcement Learning through Adversarial Loss Authors: Tuomas Oikarinen, Wang Zhang, Alexandre Megretski, Luca Daniel, Tsui-Wei Weng | Published: 2020-08-05 | Updated: 2021-11-10 PoisoningReinforcement LearningAdversarial Example 2020.08.05 2025.05.28 Literature Database
Towards Class-Oriented Poisoning Attacks Against Neural Networks Authors: Bingyin Zhao, Yingjie Lao | Published: 2020-07-31 | Updated: 2021-10-11 Backdoor AttackPoisoningAttack Method 2020.07.31 2025.05.28 Literature Database
Adversarial Attacks with Multiple Antennas Against Deep Learning-Based Modulation Classifiers Authors: Brian Kim, Yalin E. Sagduyu, Tugba Erpek, Kemal Davaslioglu, Sennur Ulukus | Published: 2020-07-31 PoisoningAttack MethodDeep Learning 2020.07.31 2025.05.28 Literature Database
Practical Detection of Trojan Neural Networks: Data-Limited and Data-Free Cases Authors: Ren Wang, Gaoyuan Zhang, Sijia Liu, Pin-Yu Chen, Jinjun Xiong, Meng Wang | Published: 2020-07-31 Backdoor AttackPoisoningAttack Method 2020.07.31 2025.05.28 Literature Database