Shared Adversarial Unlearning: Backdoor Mitigation by Unlearning Shared Adversarial Examples Authors: Shaokui Wei, Mingda Zhang, Hongyuan Zha, Baoyuan Wu | Published: 2023-07-20 Backdoor AttackAdversarial Attack MethodsWatermark Evaluation 2023.07.20 2025.05.28 Literature Database
Rethinking Backdoor Attacks Authors: Alaa Khaddaj, Guillaume Leclerc, Aleksandar Makelov, Kristian Georgiev, Hadi Salman, Andrew Ilyas, Aleksander Madry | Published: 2023-07-19 Data ObfuscationBackdoor AttackPoisoning 2023.07.19 2025.05.28 Literature Database
Application of BadNets in Spam Filters Authors: Swagnik Roychoudhury, Akshaj Kumar Veldanda | Published: 2023-07-18 LSTM Model Performance EvaluationBackdoor AttackImprovement of Learning 2023.07.18 2025.05.28 Literature Database
On Practical Aspects of Aggregation Defenses against Data Poisoning Attacks Authors: Wenxiao Wang, Soheil Feizi | Published: 2023-06-28 Data Origins and EvolutionData Contamination DetectionBackdoor Attack 2023.06.28 2025.05.28 Literature Database
Bkd-FedGNN: A Benchmark for Classification Backdoor Attacks on Federated Graph Neural Network Authors: Fan Liu, Siqi Lai, Yansong Ning, Hao Liu | Published: 2023-06-17 Backdoor AttackFederated Learning 2023.06.17 2025.05.28 Literature Database
Edge Learning for 6G-enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses Authors: Mohamed Amine Ferrag, Othmane Friha, Burak Kantarci, Norbert Tihanyi, Lucas Cordeiro, Merouane Debbah, Djallel Hamouda, Muna Al-Hawawreh, Kim-Kwang Raymond Choo | Published: 2023-06-17 | Updated: 2024-02-08 Backdoor AttackPoisoningFederated Learning 2023.06.17 2025.05.28 Literature Database
Extracting Cloud-based Model with Prior Knowledge Authors: Shiqian Zhao, Kangjie Chen, Meng Hao, Jian Zhang, Guowen Xu, Hongwei Li, Tianwei Zhang | Published: 2023-06-07 | Updated: 2023-06-13 Backdoor AttackAttack EvaluationAdversarial attack 2023.06.07 2025.05.28 Literature Database
Exploring Model Dynamics for Accumulative Poisoning Discovery Authors: Jianing Zhu, Xiawei Guo, Jiangchao Yao, Chao Du, Li He, Shuo Yuan, Tongliang Liu, Liang Wang, Bo Han | Published: 2023-06-06 Backdoor AttackModel Design and AccuracyAdversarial attack 2023.06.06 2025.05.28 Literature Database
A Survey on Federated Learning Poisoning Attacks and Defenses Authors: Junchuan Lianga, Rong Wang, Chaosheng Feng, Chin-Chen Chang | Published: 2023-06-06 Backdoor AttackPoisoningUntargeted Toxicity Attack 2023.06.06 2025.05.28 Literature Database
Poisoning Network Flow Classifiers Authors: Giorgio Severi, Simona Boboila, Alina Oprea, John Holodnak, Kendra Kratkiewicz, Jason Matterer | Published: 2023-06-02 Backdoor AttackPoisoningAdversarial attack 2023.06.02 2025.05.28 Literature Database