Can We Trust Your Explanations? Sanity Checks for Interpreters in Android Malware Analysis Authors: Ming Fan, Wenying Wei, Xiaofei Xie, Yang Liu, Xiaohong Guan, Ting Liu | Published: 2020-08-13 PoisoningEvaluation of Explanatory Approaches 2020.08.13 2025.05.28 Literature Database
WAFFLe: Weight Anonymized Factorization for Federated Learning Authors: Weituo Hao, Nikhil Mehta, Kevin J Liang, Pengyu Cheng, Mostafa El-Khamy, Lawrence Carin | Published: 2020-08-13 PoisoningPersonalization MethodMachine Learning Method 2020.08.13 2025.05.28 Literature Database
Robust Deep Reinforcement Learning through Adversarial Loss Authors: Tuomas Oikarinen, Wang Zhang, Alexandre Megretski, Luca Daniel, Tsui-Wei Weng | Published: 2020-08-05 | Updated: 2021-11-10 PoisoningReinforcement LearningAdversarial Example 2020.08.05 2025.05.28 Literature Database
Towards Class-Oriented Poisoning Attacks Against Neural Networks Authors: Bingyin Zhao, Yingjie Lao | Published: 2020-07-31 | Updated: 2021-10-11 Backdoor AttackPoisoningAttack Method 2020.07.31 2025.05.28 Literature Database
Adversarial Attacks with Multiple Antennas Against Deep Learning-Based Modulation Classifiers Authors: Brian Kim, Yalin E. Sagduyu, Tugba Erpek, Kemal Davaslioglu, Sennur Ulukus | Published: 2020-07-31 PoisoningAttack MethodDeep Learning 2020.07.31 2025.05.28 Literature Database
Practical Detection of Trojan Neural Networks: Data-Limited and Data-Free Cases Authors: Ren Wang, Gaoyuan Zhang, Sijia Liu, Pin-Yu Chen, Jinjun Xiong, Meng Wang | Published: 2020-07-31 Backdoor AttackPoisoningAttack Method 2020.07.31 2025.05.28 Literature Database
Dynamic Defense Against Byzantine Poisoning Attacks in Federated Learning Authors: Nuria Rodríguez-Barroso, Eugenio Martínez-Cámara, M. Victoria Luzón, Francisco Herrera | Published: 2020-07-29 | Updated: 2022-02-24 Byzantine ResiliencePoisoningDefense Mechanism 2020.07.29 2025.05.28 Literature Database
Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review Authors: Yansong Gao, Bao Gia Doan, Zhi Zhang, Siqi Ma, Jiliang Zhang, Anmin Fu, Surya Nepal, Hyoungshick Kim | Published: 2020-07-21 | Updated: 2020-08-02 Backdoor AttackPoisoningAttack Method 2020.07.21 2025.05.28 Literature Database
Adversarial Immunization for Certifiable Robustness on Graphs Authors: Shuchang Tao, Huawei Shen, Qi Cao, Liang Hou, Xueqi Cheng | Published: 2020-07-19 | Updated: 2021-08-25 Graph TransformationPoisoningComputational Complexity 2020.07.19 2025.05.28 Literature Database
Data Poisoning Attacks Against Federated Learning Systems Authors: Vale Tolpegin, Stacey Truex, Mehmet Emre Gursoy, Ling Liu | Published: 2020-07-16 | Updated: 2020-08-11 PoisoningPerformance EvaluationAttack Method 2020.07.16 2025.05.28 Literature Database