Poisoning

Secure and Efficient Federated Transfer Learning

Authors: Shreya Sharma, Xing Chaoping, Yang Liu, Yan Kang | Published: 2019-10-29 | Updated: 2019-10-30
Privacy Management
Poisoning
Deep Transfer Learning

Label Smoothing and Logit Squeezing: A Replacement for Adversarial Training?

Authors: Ali Shafahi, Amin Ghiasi, Furong Huang, Tom Goldstein | Published: 2019-10-25
Poisoning
Improvement of Learning
Adversarial Example

Abnormal Client Behavior Detection in Federated Learning

Authors: Suyi Li, Yong Cheng, Yang Liu, Wei Wang, Tianjian Chen | Published: 2019-10-22 | Updated: 2019-12-06
Client Contribution Assessment
Poisoning
Anomaly Detection Method

Edge Dithering for Robust Adaptive Graph Convolutional Networks

Authors: Vassilis N. Ioannidis, Georgios B. Giannakis | Published: 2019-10-21
Graph Neural Network
Poisoning
Model Architecture

Recovering Localized Adversarial Attacks

Authors: Jan Philip Göpfert, Heiko Wersing, Barbara Hammer | Published: 2019-10-21
Poisoning
Adversarial Learning
Feature Importance Analysis

Enforcing Linearity in DNN succours Robustness and Adversarial Image Generation

Authors: Anindya Sarkar, Nikhil Kumar Gupta, Raghu Iyengar | Published: 2019-10-17 | Updated: 2019-10-21
Poisoning
Adversarial Learning
Adversarial Example

Confidence-Calibrated Adversarial Training: Generalizing to Unseen Attacks

Authors: David Stutz, Matthias Hein, Bernt Schiele | Published: 2019-10-14 | Updated: 2020-06-30
Poisoning
Attack Evaluation
Adversarial Attack Methods

Eavesdrop the Composition Proportion of Training Labels in Federated Learning

Authors: Lixu Wang, Shichao Xu, Xiao Wang, Qi Zhu | Published: 2019-10-14 | Updated: 2019-10-27
Backdoor Attack
Poisoning
Attack Evaluation

Detecting AI Trojans Using Meta Neural Analysis

Authors: Xiaojun Xu, Qi Wang, Huichen Li, Nikita Borisov, Carl A. Gunter, Bo Li | Published: 2019-10-08 | Updated: 2020-10-01
Backdoor Attack
Poisoning
Attack Evaluation

Adversarial Examples for Cost-Sensitive Classifiers

Authors: Gavin S. Hartnett, Andrew J. Lohn, Alexander P. Sedlack | Published: 2019-10-04
Poisoning
Attack Evaluation
Adversarial Attack Methods