Differentially Private Federated Learning: A Systematic Review Authors: Jie Fu, Yuan Hong, Xinpeng Ling, Leixia Wang, Xun Ran, Zhiyu Sun, Wendy Hui Wang, Zhili Chen, Yang Cao | Published: 2024-05-14 | Updated: 2024-05-20 Privacy Protection MethodPoisoningCommunication Efficiency 2024.05.14 2025.05.27 Literature Database
Adversarial Machine Learning Threats to Spacecraft Authors: Rajiv Thummala, Shristi Sharma, Matteo Calabrese, Gregory Falco | Published: 2024-05-14 CybersecurityPoisoningAttack Method 2024.05.14 2025.05.27 Literature Database
Concealing Backdoor Model Updates in Federated Learning by Trigger-Optimized Data Poisoning Authors: Yujie Zhang, Neil Gong, Michael K. Reiter | Published: 2024-05-10 | Updated: 2024-09-09 Backdoor AttackPoisoning 2024.05.10 2025.05.27 Literature Database
Explainability-Informed Targeted Malware Misclassification Authors: Quincy Card, Kshitiz Aryal, Maanak Gupta | Published: 2024-05-07 PoisoningMalware ClassificationDynamic Analysis 2024.05.07 2025.05.27 Literature Database
The Federation Strikes Back: A Survey of Federated Learning Privacy Attacks, Defenses, Applications, and Policy Landscape Authors: Joshua C. Zhao, Saurabh Bagchi, Salman Avestimehr, Kevin S. Chan, Somali Chaterji, Dimitris Dimitriadis, Jiacheng Li, Ninghui Li, Arash Nourian, Holger R. Roth | Published: 2024-05-06 | Updated: 2025-03-22 Privacy Protection MethodPoisoningMembership Inference 2024.05.06 2025.05.27 Literature Database
Human-Imperceptible Retrieval Poisoning Attacks in LLM-Powered Applications Authors: Quan Zhang, Binqi Zeng, Chijin Zhou, Gwihwan Go, Heyuan Shi, Yu Jiang | Published: 2024-04-26 Poisoning attack on RAGPrompt leakingPoisoning 2024.04.26 2025.05.27 Literature Database
An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape Authors: Sifat Muhammad Abdullah, Aravind Cheruvu, Shravya Kanchi, Taejoong Chung, Peng Gao, Murtuza Jadliwala, Bimal Viswanath | Published: 2024-04-24 PoisoningWatermark EvaluationDefense Method 2024.04.24 2025.05.27 Literature Database
A Comparative Analysis of Adversarial Robustness for Quantum and Classical Machine Learning Models Authors: Maximilian Wendlinger, Kilian Tscharke, Pascal Debus | Published: 2024-04-24 PoisoningAdversarial TrainingQuantum Framework 2024.04.24 2025.05.27 Literature Database
Watch Out for Your Guidance on Generation! Exploring Conditional Backdoor Attacks against Large Language Models Authors: Jiaming He, Wenbo Jiang, Guanyu Hou, Wenshu Fan, Rui Zhang, Hongwei Li | Published: 2024-04-23 | Updated: 2025-01-08 LLM SecurityBackdoor AttackPoisoning 2024.04.23 2025.05.27 Literature Database
Aggressive or Imperceptible, or Both: Network Pruning Assisted Hybrid Byzantines in Federated Learning Authors: Emre Ozfatura, Kerem Ozfatura, Alptekin Kupcu, Deniz Gunduz | Published: 2024-04-09 PoisoningAttack MethodDefense Method 2024.04.09 2025.05.27 Literature Database