Poisoning

Universal Multi-Party Poisoning Attacks

Authors: Saeed Mahloujifar, Mohammad Mahmoody, Ameer Mohammed | Published: 2018-09-10 | Updated: 2021-11-10
Poisoning
Multi-Party Attack
Adversarial attack

Towards Query Efficient Black-box Attacks: An Input-free Perspective

Authors: Yali Du, Meng Fang, Jinfeng Yi, Jun Cheng, Dacheng Tao | Published: 2018-09-09
Query Generation Method
Trigger Detection
Poisoning

Adversarial Attacks on Node Embeddings via Graph Poisoning

Authors: Aleksandar Bojchevski, Stephan Günnemann | Published: 2018-09-04 | Updated: 2019-05-27
Poisoning
Certified Robustness
Robustness Analysis

Mitigating Sybils in Federated Learning Poisoning

Authors: Clement Fung, Chris J. M. Yoon, Ivan Beschastnikh | Published: 2018-08-14 | Updated: 2020-07-15
Poisoning
Robustness Analysis
Adversarial attack

Gradient Band-based Adversarial Training for Generalized Attack Immunity of A3C Path Finding

Authors: Tong Chen, Wenjia Niu, Yingxiao Xiang, Xiaoxuan Bai, Jiqiang Liu, Zhen Han, Gang Li | Published: 2018-07-18
Poisoning
Adversarial Learning
Adversarial attack

Copycat CNN: Stealing Knowledge by Persuading Confession with Random Non-Labeled Data

Authors: Jacson Rodrigues Correia-Silva, Rodrigo F. Berriel, Claudine Badue, Alberto F. de Souza, Thiago Oliveira-Santos | Published: 2018-06-14
Poisoning
Certified Robustness
Face Recognition System

Adversarial Regression with Multiple Learners

Authors: Liang Tong, Sixie Yu, Scott Alfeld, Yevgeniy Vorobeychik | Published: 2018-06-06
Poisoning
Loss Function
Adversarial Learning

Adversarial Attacks on Neural Networks for Graph Data

Authors: Daniel Zügner, Amir Akbarnejad, Stephan Günnemann | Published: 2018-05-21 | Updated: 2021-12-09
Poisoning
Certified Robustness
Adversarial Attack Detection

Gradient-Leaks: Understanding and Controlling Deanonymization in Federated Learning

Authors: Tribhuvanesh Orekondy, Seong Joon Oh, Yang Zhang, Bernt Schiele, Mario Fritz | Published: 2018-05-15 | Updated: 2020-09-13
Privacy-Preserving Machine Learning
Poisoning
User Behavior Analysis

Is feature selection secure against training data poisoning?

Authors: Huang Xiao, Battista Biggio, Gavin Brown, Giorgio Fumera, Claudia Eckert, Fabio Roli | Published: 2018-04-21
Poisoning
Detection of Poisonous Data
Content Specialized for Toxicity Attacks