Analyzing Inference Privacy Risks Through Gradients in Machine Learning Authors: Zhuohang Li, Andrew Lowy, Jing Liu, Toshiaki Koike-Akino, Kieran Parsons, Bradley Malin, Ye Wang | Published: 2024-08-29 Privacy Protection MethodPoisoningMembership Inference 2024.08.29 2025.05.27 Literature Database
Large Language Models are Good Attackers: Efficient and Stealthy Textual Backdoor Attacks Authors: Ziqiang Li, Yueqi Zeng, Pengfei Xia, Lei Liu, Zhangjie Fu, Bin Li | Published: 2024-08-21 Backdoor AttackPoisoning 2024.08.21 2025.05.27 Literature Database
Robust Image Classification: Defensive Strategies against FGSM and PGD Adversarial Attacks Authors: Hetvi Waghela, Jaydip Sen, Sneha Rakshit | Published: 2024-08-20 PoisoningAdversarial ExampleDefense Method 2024.08.20 2025.05.27 Literature Database
Transferring Backdoors between Large Language Models by Knowledge Distillation Authors: Pengzhou Cheng, Zongru Wu, Tianjie Ju, Wei Du, Zhuosheng Zhang Gongshen Liu | Published: 2024-08-19 LLM SecurityBackdoor AttackPoisoning 2024.08.19 2025.05.27 Literature Database
Regularization for Adversarial Robust Learning Authors: Jie Wang, Rui Gao, Yao Xie | Published: 2024-08-19 | Updated: 2024-08-22 AlgorithmPoisoningRegularization 2024.08.19 2025.05.27 Literature Database
Random Gradient Masking as a Defensive Measure to Deep Leakage in Federated Learning Authors: Joon Kim, Sejin Park | Published: 2024-08-15 WatermarkingPoisoningDefense Method 2024.08.15 2025.05.27 Literature Database
FedMADE: Robust Federated Learning for Intrusion Detection in IoT Networks Using a Dynamic Aggregation Method Authors: Shihua Sun, Pragya Sharma, Kenechukwu Nwodo, Angelos Stavrou, Haining Wang | Published: 2024-08-13 Client ClusteringPoisoningOptimization Problem 2024.08.13 2025.05.27 Literature Database
Mitigating Malicious Attacks in Federated Learning via Confidence-aware Defense Authors: Qilei Li, Ahmed M. Abdelmoniem | Published: 2024-08-05 | Updated: 2024-08-16 DoS MitigationPoisoningDefense Method 2024.08.05 2025.05.27 Literature Database
Model Hijacking Attack in Federated Learning Authors: Zheng Li, Siyuan Wu, Ruichuan Chen, Paarijaat Aditya, Istemi Ekin Akkus, Manohar Vanga, Min Zhang, Hao Li, Yang Zhang | Published: 2024-08-04 WatermarkingClass Mapping MethodPoisoning 2024.08.04 2025.05.27 Literature Database
Provable Robustness of (Graph) Neural Networks Against Data Poisoning and Backdoor Attacks Authors: Lukas Gosch, Mahalakshmi Sabanayagam, Debarghya Ghoshdastidar, Stephan Günnemann | Published: 2024-07-15 | Updated: 2024-10-14 Backdoor AttackPoisoningOptimization Problem 2024.07.15 2025.05.27 Literature Database