A Geometric Framework for Adversarial Vulnerability in Machine Learning Authors: Brian Bell | Published: 2024-07-03 PoisoningAdversarial ExampleLiterature List 2024.07.03 2025.05.27 Literature Database
Emerging Safety Attack and Defense in Federated Instruction Tuning of Large Language Models Authors: Rui Ye, Jingyi Chai, Xiangrui Liu, Yaodong Yang, Yanfeng Wang, Siheng Chen | Published: 2024-06-15 LLM SecurityPrompt InjectionPoisoning 2024.06.15 2025.05.27 Literature Database
RMF: A Risk Measurement Framework for Machine Learning Models Authors: Jan Schröder, Jakub Breier | Published: 2024-06-15 Backdoor AttackPoisoningRisk Management 2024.06.15 2025.05.27 Literature Database
Lurking in the shadows: Unveiling Stealthy Backdoor Attacks against Personalized Federated Learning Authors: Xiaoting Lyu, Yufei Han, Wei Wang, Jingkai Liu, Yongsheng Zhu, Guangquan Xu, Jiqiang Liu, Xiangliang Zhang | Published: 2024-06-10 Backdoor AttackPoisoning 2024.06.10 2025.05.27 Literature Database
A Survey on Machine Unlearning: Techniques and New Emerged Privacy Risks Authors: Hengzhu Liu, Ping Xiong, Tianqing Zhu, Philip S. Yu | Published: 2024-06-10 Backdoor AttackPoisoningMembership Inference 2024.06.10 2025.05.27 Literature Database
No Vandalism: Privacy-Preserving and Byzantine-Robust Federated Learning Authors: Zhibo Xing, Zijian Zhang, Zi'ang Zhang, Jiamou Liu, Liehuang Zhu, Giovanni Russello | Published: 2024-06-03 WatermarkingBackdoor AttackPoisoning 2024.06.03 2025.05.27 Literature Database
ACE: A Model Poisoning Attack on Contribution Evaluation Methods in Federated Learning Authors: Zhangchen Xu, Fengqing Jiang, Luyao Niu, Jinyuan Jia, Bo Li, Radha Poovendran | Published: 2024-05-31 | Updated: 2024-06-05 PoisoningEvaluation MethodDefense Method 2024.05.31 2025.05.27 Literature Database
PureGen: Universal Data Purification for Train-Time Poison Defense via Generative Model Dynamics Authors: Sunay Bhat, Jeffrey Jiang, Omead Pooladzandi, Alexander Branch, Gregory Pottie | Published: 2024-05-28 | Updated: 2024-06-02 WatermarkingBackdoor AttackPoisoning 2024.05.28 2025.05.27 Literature Database
Revisit, Extend, and Enhance Hessian-Free Influence Functions Authors: Ziao Yang, Han Yue, Jian Chen, Hongfu Liu | Published: 2024-05-25 | Updated: 2024-10-20 PoisoningModel Performance EvaluationEvaluation Method 2024.05.25 2025.05.27 Literature Database
BadGD: A unified data-centric framework to identify gradient descent vulnerabilities Authors: Chi-Hua Wang, Guang Cheng | Published: 2024-05-24 Backdoor AttackPoisoning 2024.05.24 2025.05.27 Literature Database