Poisoning

Federated Learning Nodes Can Reconstruct Peers’ Image Data

Authors: Ethan Wilson, Kai Yue, Chau-Wai Wong, Huaiyu Dai | Published: 2024-10-07
Privacy Protection
Poisoning

Empirical Perturbation Analysis of Linear System Solvers from a Data Poisoning Perspective

Authors: Yixin Liu, Arielle Carr, Lichao Sun | Published: 2024-10-01
Backdoor Attack
Poisoning
Linear Solver

Timber! Poisoning Decision Trees

Authors: Stefano Calzavara, Lorenzo Cazzaro, Massimo Vettori | Published: 2024-10-01
Backdoor Attack
Poisoning

The poison of dimensionality

Authors: Lê-Nguyên Hoang | Published: 2024-09-25
Poisoning
Model Performance Evaluation
Loss Function

SDBA: A Stealthy and Long-Lasting Durable Backdoor Attack in Federated Learning

Authors: Minyeong Choe, Cheolhee Park, Changho Seo, Hyunil Kim | Published: 2024-09-23 | Updated: 2025-07-30
Backdoor Attack
Poisoning
Watermark Robustness

MalMixer: Few-Shot Malware Classification with Retrieval-Augmented Semi-Supervised Learning

Authors: Jiliang Li, Yifan Zhang, Yu Huang, Kevin Leach | Published: 2024-09-20 | Updated: 2025-04-17
Data Augmentation Method
Poisoning
Malware Detection with Limited Samples

Federated Learning for Smart Grid: A Survey on Applications and Potential Vulnerabilities

Authors: Zikai Zhang, Suman Rath, Jiaohao Xu, Tingsong Xiao | Published: 2024-09-16
Energy Management
Privacy Protection
Poisoning

On the Vulnerability of Applying Retrieval-Augmented Generation within Knowledge-Intensive Application Domains

Authors: Xun Xian, Ganghua Wang, Xuan Bi, Jayanth Srinivasa, Ashish Kundu, Charles Fleming, Mingyi Hong, Jie Ding | Published: 2024-09-12
RAG
Poisoning

Revisiting Static Feature-Based Android Malware Detection

Authors: Md Tanvirul Alam, Dipkamal Bhusal, Nidhi Rastogi | Published: 2024-09-11
Dataset Generation
Poisoning
Model Performance Evaluation

2DSig-Detect: a semi-supervised framework for anomaly detection on image data using 2D-signatures

Authors: Xinheng Xie, Kureha Yamaguchi, Margaux Leblanc, Simon Malzard, Varun Chhabra, Victoria Nockles, Yue Wu | Published: 2024-09-08 | Updated: 2025-03-20
Backdoor Attack
Poisoning
Evaluation Method