PureGen: Universal Data Purification for Train-Time Poison Defense via Generative Model Dynamics Authors: Sunay Bhat, Jeffrey Jiang, Omead Pooladzandi, Alexander Branch, Gregory Pottie | Published: 2024-05-28 | Updated: 2024-06-02 WatermarkingBackdoor AttackPoisoning 2024.05.28 2025.05.27 Literature Database
Revisit, Extend, and Enhance Hessian-Free Influence Functions Authors: Ziao Yang, Han Yue, Jian Chen, Hongfu Liu | Published: 2024-05-25 | Updated: 2024-10-20 PoisoningModel Performance EvaluationEvaluation Method 2024.05.25 2025.05.27 Literature Database
BadGD: A unified data-centric framework to identify gradient descent vulnerabilities Authors: Chi-Hua Wang, Guang Cheng | Published: 2024-05-24 Backdoor AttackPoisoning 2024.05.24 2025.05.27 Literature Database
A GAN-Based Data Poisoning Attack Against Federated Learning Systems and Its Countermeasure Authors: Wei Sun, Bo Gao, Ke Xiong, Yuwei Wang | Published: 2024-05-19 | Updated: 2024-05-21 Backdoor AttackPoisoningDefense Method 2024.05.19 2025.05.27 Literature Database
Dealing Doubt: Unveiling Threat Models in Gradient Inversion Attacks under Federated Learning, A Survey and Taxonomy Authors: Yichuan Shi, Olivera Kotevska, Viktor Reshniak, Abhishek Singh, Ramesh Raskar | Published: 2024-05-16 PoisoningAttack MethodDefense Method 2024.05.16 2025.05.27 Literature Database
Differentially Private Federated Learning: A Systematic Review Authors: Jie Fu, Yuan Hong, Xinpeng Ling, Leixia Wang, Xun Ran, Zhiyu Sun, Wendy Hui Wang, Zhili Chen, Yang Cao | Published: 2024-05-14 | Updated: 2024-05-20 Privacy Protection MethodPoisoningCommunication Efficiency 2024.05.14 2025.05.27 Literature Database
Adversarial Machine Learning Threats to Spacecraft Authors: Rajiv Thummala, Shristi Sharma, Matteo Calabrese, Gregory Falco | Published: 2024-05-14 CybersecurityPoisoningAttack Method 2024.05.14 2025.05.27 Literature Database
Concealing Backdoor Model Updates in Federated Learning by Trigger-Optimized Data Poisoning Authors: Yujie Zhang, Neil Gong, Michael K. Reiter | Published: 2024-05-10 | Updated: 2024-09-09 Backdoor AttackPoisoning 2024.05.10 2025.05.27 Literature Database
Explainability-Informed Targeted Malware Misclassification Authors: Quincy Card, Kshitiz Aryal, Maanak Gupta | Published: 2024-05-07 PoisoningMalware ClassificationDynamic Analysis 2024.05.07 2025.05.27 Literature Database
The Federation Strikes Back: A Survey of Federated Learning Privacy Attacks, Defenses, Applications, and Policy Landscape Authors: Joshua C. Zhao, Saurabh Bagchi, Salman Avestimehr, Kevin S. Chan, Somali Chaterji, Dimitris Dimitriadis, Jiacheng Li, Ninghui Li, Arash Nourian, Holger R. Roth | Published: 2024-05-06 | Updated: 2025-03-22 Privacy Protection MethodPoisoningMembership Inference 2024.05.06 2025.05.27 Literature Database