Backdoor Secrets Unveiled: Identifying Backdoor Data with Optimized Scaled Prediction Consistency Authors: Soumyadeep Pal, Yuguang Yao, Ren Wang, Bingquan Shen, Sijia Liu | Published: 2024-03-15 WatermarkingBackdoor AttackPoisoning 2024.03.15 2025.05.27 Literature Database
Visual Privacy Auditing with Diffusion Models Authors: Kristian Schwethelm, Johannes Kaiser, Moritz Knolle, Daniel Rueckert, Georgios Kaissis, Alexander Ziller | Published: 2024-03-12 WatermarkingPoisoningReconstruction Durability 2024.03.12 2025.05.27 Literature Database
Poisoning Programs by Un-Repairing Code: Security Concerns of AI-generated Code Authors: Cristina Improta | Published: 2024-03-11 Security AnalysisBackdoor AttackPoisoning 2024.03.11 2025.05.27 Literature Database
Provable Mutual Benefits from Federated Learning in Privacy-Sensitive Domains Authors: Nikita Tsoy, Anna Mihalkova, Teodora Todorova, Nikola Konstantinov | Published: 2024-03-11 | Updated: 2024-11-07 PoisoningOptimization ProblemFederated Learning 2024.03.11 2025.05.27 Literature Database
Fake or Compromised? Making Sense of Malicious Clients in Federated Learning Authors: Hamid Mozaffari, Sunav Choudhary, Amir Houmansadr | Published: 2024-03-10 Backdoor AttackPoisoningMalicious Client 2024.03.10 2025.05.27 Literature Database
Enhancing Security in Federated Learning through Adaptive Consensus-Based Model Update Validation Authors: Zahir Alsulaimawi | Published: 2024-03-05 PoisoningFederated LearningDefense Method 2024.03.05 2025.05.27 Literature Database
Mitigating Label Flipping Attacks in Malicious URL Detectors Using Ensemble Trees Authors: Ehsan Nowroozi, Nada Jadalla, Samaneh Ghelichkhani, Alireza Jolfaei | Published: 2024-03-05 Backdoor AttackPoisoningDefense Method 2024.03.05 2025.05.27 Literature Database
Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks Authors: Ehsan Nowroozi, Imran Haider, Rahim Taheri, Mauro Conti | Published: 2024-03-05 Backdoor AttackPoisoningFederated Learning 2024.03.05 2025.05.27 Literature Database
Enhancing Data Provenance and Model Transparency in Federated Learning Systems — A Database Approach Authors: Michael Gu, Ramasoumya Naraparaju, Dongfang Zhao | Published: 2024-03-03 Data Origins and EvolutionPoisoningFederated Learning 2024.03.03 2025.05.27 Literature Database
Analysis of Privacy Leakage in Federated Large Language Models Authors: Minh N. Vu, Truc Nguyen, Tre' R. Jeter, My T. Thai | Published: 2024-03-02 Privacy Protection MethodPoisoningFederated Learning 2024.03.02 2025.05.27 Literature Database